schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108004",
"label": "benign",
"label_confidence": 0.732,
"severity": "low",
"timestamp": "2026-01-06T13:24:00Z",
"trace_id": "04ed7ad8-b045-2afb-13de-af9e0743807f"
} | {
"account_age_days": 1146,
"account_id": "ACCT-D5DA734B2D93",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.257
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 207,
"timestamp": "2026-01-06T13:24:00Z",
"transaction_amount_usd": 10803.28
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.645,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1901.76,
"financial_exposure_usd": 2469.06,
"recoverable_pct": 0.436
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101734",
"label": "fraudulent",
"label_confidence": 0.795,
"severity": "critical",
"timestamp": "2026-01-02T04:54:00Z",
"trace_id": "cc551adf-77c9-436c-bcfd-17192c102d07"
} | {
"account_age_days": 454,
"account_id": "ACCT-5F84771BFD2E",
"baseline_risk_score": 0.471,
"kyc_tier": "tier_2",
"session_entropy": 0.351
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 549,
"timestamp": "2026-01-02T04:54:00Z",
"transaction_amount_usd": 78703.6
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.352,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 618349.83,
"financial_exposure_usd": 1061238.62,
"recoverable_pct": 0.214
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102984",
"label": "fraudulent",
"label_confidence": 0.945,
"severity": "critical",
"timestamp": "2026-01-03T01:44:00Z",
"trace_id": "e0326572-ec2c-17cb-9732-a9d5c6562b95"
} | {
"account_age_days": 1921,
"account_id": "ACCT-6C88AF9A1278",
"baseline_risk_score": 0.43,
"kyc_tier": "tier_1",
"session_entropy": 0.918
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 370,
"timestamp": "2026-01-03T01:44:00Z",
"transaction_amount_usd": 18953.78
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.946,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 490097.54,
"financial_exposure_usd": 662554.03,
"recoverable_pct": 0.044
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107895",
"label": "benign",
"label_confidence": 0.62,
"severity": "low",
"timestamp": "2026-01-06T11:35:00Z",
"trace_id": "371ca1c8-6f87-947c-585f-c2cac8e40b81"
} | {
"account_age_days": 1715,
"account_id": "ACCT-BA6792F47E77",
"baseline_risk_score": 0.138,
"kyc_tier": "tier_3",
"session_entropy": 0.405
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 385,
"timestamp": "2026-01-06T04:52:00Z",
"transaction_amount_usd": 1.41
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.646,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3312.05,
"financial_exposure_usd": 5406.07,
"recoverable_pct": 0.743
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109617",
"label": "benign",
"label_confidence": 0.738,
"severity": "medium",
"timestamp": "2026-01-07T16:17:00Z",
"trace_id": "9d96656f-91b2-aba6-63a8-8d46cc0b9ffd"
} | {
"account_age_days": 868,
"account_id": "ACCT-947F9F50E145",
"baseline_risk_score": 0.11,
"kyc_tier": "tier_3",
"session_entropy": 0.757
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 282,
"timestamp": "2026-01-07T09:59:00Z",
"transaction_amount_usd": 9.59
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.664,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 8479.19,
"financial_exposure_usd": 8502.61,
"recoverable_pct": 0.622
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108391",
"label": "benign",
"label_confidence": 0.473,
"severity": "high",
"timestamp": "2026-01-06T19:51:00Z",
"trace_id": "057889f0-bf9d-2f86-3932-ca38b2f74125"
} | {
"account_age_days": 1646,
"account_id": "ACCT-948C4A84E198",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.793
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 220,
"timestamp": "2026-01-06T18:20:00Z",
"transaction_amount_usd": 12.91
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.634,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2446.58,
"financial_exposure_usd": 3448.13,
"recoverable_pct": 0.927
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103942",
"label": "fraudulent",
"label_confidence": 0.748,
"severity": "critical",
"timestamp": "2026-01-03T17:42:00Z",
"trace_id": "566f3814-9afc-a40f-fa02-ab264281a01d"
} | {
"account_age_days": 23,
"account_id": "ACCT-1D4A2858D15E",
"baseline_risk_score": 0.062,
"kyc_tier": "tier_2",
"session_entropy": 0.652
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 853,
"timestamp": "2026-01-03T17:42:00Z",
"transaction_amount_usd": 2721533.87
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.933,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1933744.23,
"financial_exposure_usd": 3946459.03,
"recoverable_pct": 0.885
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109576",
"label": "benign",
"label_confidence": 0.651,
"severity": "low",
"timestamp": "2026-01-07T15:36:00Z",
"trace_id": "b061c264-b597-fe18-4a93-27fda1df1b58"
} | {
"account_age_days": 1407,
"account_id": "ACCT-0E38E51498F6",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.861
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 174,
"timestamp": "2026-01-07T07:22:00Z",
"transaction_amount_usd": 19.84
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.625,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 570.24,
"financial_exposure_usd": 1044.96,
"recoverable_pct": 0.682
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-110000",
"label": "benign",
"label_confidence": 0.545,
"severity": "low",
"timestamp": "2026-01-07T22:40:00Z",
"trace_id": "a6310889-0569-7c59-fc8a-26373e8231c8"
} | {
"account_age_days": 429,
"account_id": "ACCT-0E6F2C02D0C3",
"baseline_risk_score": 0.196,
"kyc_tier": "tier_1",
"session_entropy": 0.334
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 141,
"timestamp": "2026-01-07T22:40:00Z",
"transaction_amount_usd": 5664.25
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.772,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 781.22,
"financial_exposure_usd": 1795.06,
"recoverable_pct": 0.802
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106098",
"label": "fraudulent",
"label_confidence": 0.925,
"severity": "low",
"timestamp": "2026-01-05T05:38:00Z",
"trace_id": "46c039ea-909f-dada-090e-808c22bf41a4"
} | {
"account_age_days": 459,
"account_id": "ACCT-C3E790A10246",
"baseline_risk_score": 0.127,
"kyc_tier": "tier_1",
"session_entropy": 0.367
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 220,
"timestamp": "2026-01-05T05:38:00Z",
"transaction_amount_usd": 2225058.37
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.804,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3311508.9,
"financial_exposure_usd": 3521525.48,
"recoverable_pct": 0.964
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101794",
"label": "fraudulent",
"label_confidence": 0.875,
"severity": "critical",
"timestamp": "2026-01-02T05:54:00Z",
"trace_id": "2802581f-9a22-a21d-0522-f4d95da2ada2"
} | {
"account_age_days": 1137,
"account_id": "ACCT-5AAF415AD5C1",
"baseline_risk_score": 0.293,
"kyc_tier": "tier_2",
"session_entropy": 0.428
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "JP",
"latency_ms": 149,
"timestamp": "2026-01-02T05:54:00Z",
"transaction_amount_usd": 4474.59
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.546,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 507913.01,
"financial_exposure_usd": 869097.55,
"recoverable_pct": 0.555
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109131",
"label": "benign",
"label_confidence": 0.663,
"severity": "medium",
"timestamp": "2026-01-07T08:11:00Z",
"trace_id": "5c75ec24-d720-6878-5478-b66f5f6021ca"
} | {
"account_age_days": 704,
"account_id": "ACCT-D8E071137544",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.681
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 387,
"timestamp": "2026-01-07T00:12:00Z",
"transaction_amount_usd": 15.12
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.572,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3672.86,
"financial_exposure_usd": 4006.23,
"recoverable_pct": 0.69
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109433",
"label": "benign",
"label_confidence": 0.739,
"severity": "low",
"timestamp": "2026-01-07T13:13:00Z",
"trace_id": "9f75b069-61fd-7f27-b22a-be314474ec72"
} | {
"account_age_days": 1405,
"account_id": "ACCT-B1E1A9EE982E",
"baseline_risk_score": 0.06,
"kyc_tier": "tier_1",
"session_entropy": 0.178
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 878,
"timestamp": "2026-01-07T13:13:00Z",
"transaction_amount_usd": 5558.01
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.567,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 4711.45,
"financial_exposure_usd": 5556.12,
"recoverable_pct": 0.74
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106646",
"label": "fraudulent",
"label_confidence": 0.677,
"severity": "medium",
"timestamp": "2026-01-05T14:46:00Z",
"trace_id": "55691e08-01d6-15c7-94b8-a56b0fdfe76c"
} | {
"account_age_days": 1476,
"account_id": "ACCT-04BE1FC8FB36",
"baseline_risk_score": 0.286,
"kyc_tier": "tier_1",
"session_entropy": 0.289
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 1081,
"timestamp": "2026-01-05T14:46:00Z",
"transaction_amount_usd": 2376163.79
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.671,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4654418.1,
"financial_exposure_usd": 8146181.2,
"recoverable_pct": 0.506
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101822",
"label": "fraudulent",
"label_confidence": 0.98,
"severity": "medium",
"timestamp": "2026-01-02T06:22:00Z",
"trace_id": "b4324a49-a2b4-4525-ab89-db1591a79182"
} | {
"account_age_days": 1492,
"account_id": "ACCT-9B6650C70619",
"baseline_risk_score": 0.365,
"kyc_tier": "tier_2",
"session_entropy": 0.162
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 979,
"timestamp": "2026-01-02T06:22:00Z",
"transaction_amount_usd": 87313.17
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.737,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 781843.25,
"financial_exposure_usd": 1252838.02,
"recoverable_pct": 0.447
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109839",
"label": "benign",
"label_confidence": 0.573,
"severity": "medium",
"timestamp": "2026-01-07T19:59:00Z",
"trace_id": "b33fe78b-2cc4-c71c-c961-10a7ea43d911"
} | {
"account_age_days": 1022,
"account_id": "ACCT-AC2BD1D935E4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.59
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 210,
"timestamp": "2026-01-07T19:59:00Z",
"transaction_amount_usd": 3549.31
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.664,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3033.18,
"financial_exposure_usd": 6096.95,
"recoverable_pct": 0.958
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101557",
"label": "fraudulent",
"label_confidence": 0.886,
"severity": "high",
"timestamp": "2026-01-02T01:57:00Z",
"trace_id": "f00f3005-430e-a5c9-9eba-d1315a8491ad"
} | {
"account_age_days": 1242,
"account_id": "ACCT-116527A3AD99",
"baseline_risk_score": 0.494,
"kyc_tier": "tier_1",
"session_entropy": 0.544
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 326,
"timestamp": "2026-01-02T01:57:00Z",
"transaction_amount_usd": 57628.27
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.75,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 604748.34,
"financial_exposure_usd": 1105612.22,
"recoverable_pct": 0.11
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103522",
"label": "fraudulent",
"label_confidence": 0.752,
"severity": "critical",
"timestamp": "2026-01-03T10:42:00Z",
"trace_id": "027e13a7-5e1a-34e9-26b3-2b2347f6207a"
} | {
"account_age_days": 378,
"account_id": "ACCT-6DE327C9DA39",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.519
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 930,
"timestamp": "2026-01-03T10:42:00Z",
"transaction_amount_usd": 150030.27
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.913,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2068896.44,
"financial_exposure_usd": 3583660.83,
"recoverable_pct": 0.646
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100877",
"label": "fraudulent",
"label_confidence": 0.925,
"severity": "low",
"timestamp": "2026-01-01T14:37:00Z",
"trace_id": "1b400871-4c54-d7ac-1ac6-439759331d07"
} | {
"account_age_days": 928,
"account_id": "ACCT-79F0BD12AA8D",
"baseline_risk_score": 0.265,
"kyc_tier": "tier_1",
"session_entropy": 0.101
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 175,
"timestamp": "2026-01-01T07:43:00Z",
"transaction_amount_usd": 17.13
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.852,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 222918.45,
"financial_exposure_usd": 539357.55,
"recoverable_pct": 0.245
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100367",
"label": "fraudulent",
"label_confidence": 0.884,
"severity": "critical",
"timestamp": "2026-01-01T06:07:00Z",
"trace_id": "90feec12-96bd-2185-bd10-a6f251dbb17f"
} | {
"account_age_days": 1375,
"account_id": "ACCT-C017367B6FF0",
"baseline_risk_score": 0.542,
"kyc_tier": "tier_2",
"session_entropy": 0.486
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 152,
"timestamp": "2026-01-01T02:59:00Z",
"transaction_amount_usd": 5.15
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.516,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 248111.5,
"financial_exposure_usd": 489943.71,
"recoverable_pct": 0.401
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103066",
"label": "fraudulent",
"label_confidence": 0.864,
"severity": "critical",
"timestamp": "2026-01-03T03:06:00Z",
"trace_id": "00c21bef-0e26-d541-4e8e-d75b47898a76"
} | {
"account_age_days": 989,
"account_id": "ACCT-1B737983F73D",
"baseline_risk_score": 0.327,
"kyc_tier": "tier_2",
"session_entropy": 0.38
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "MY",
"latency_ms": 611,
"timestamp": "2026-01-03T03:06:00Z",
"transaction_amount_usd": 118087.55
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.426,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 386824.66,
"financial_exposure_usd": 628271.18,
"recoverable_pct": 0.379
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104405",
"label": "fraudulent",
"label_confidence": 0.8,
"severity": "critical",
"timestamp": "2026-01-04T01:25:00Z",
"trace_id": "45420602-a1e3-5d64-3480-5bbb5764fbe6"
} | {
"account_age_days": 1190,
"account_id": "ACCT-E1E56CCA127B",
"baseline_risk_score": 0.12,
"kyc_tier": "tier_1",
"session_entropy": 0.115
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 1182,
"timestamp": "2026-01-04T01:25:00Z",
"transaction_amount_usd": 592434.25
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.729,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3118548.41,
"financial_exposure_usd": 3352646.12,
"recoverable_pct": 0.48
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107122",
"label": "benign",
"label_confidence": 0.715,
"severity": "medium",
"timestamp": "2026-01-05T22:42:00Z",
"trace_id": "d774566c-075f-f8c0-42d5-c63b34d29815"
} | {
"account_age_days": 1509,
"account_id": "ACCT-6FD5DDAF56F4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.562
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 185,
"timestamp": "2026-01-05T22:42:00Z",
"transaction_amount_usd": 13602.68
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.74,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 2349.03,
"financial_exposure_usd": 4964.37,
"recoverable_pct": 0.606
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102825",
"label": "fraudulent",
"label_confidence": 0.879,
"severity": "medium",
"timestamp": "2026-01-02T23:05:00Z",
"trace_id": "1ba0519a-8b1d-d477-1f88-a0ec28779782"
} | {
"account_age_days": 1532,
"account_id": "ACCT-542E626A95E8",
"baseline_risk_score": 0.635,
"kyc_tier": "tier_3",
"session_entropy": 0.552
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "DE",
"latency_ms": 133,
"timestamp": "2026-01-02T23:05:00Z",
"transaction_amount_usd": 27307.01
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.806,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 625916.07,
"financial_exposure_usd": 935261.16,
"recoverable_pct": 0.102
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103979",
"label": "fraudulent",
"label_confidence": 0.85,
"severity": "medium",
"timestamp": "2026-01-03T18:19:00Z",
"trace_id": "f6212ef4-7099-bc74-c6dc-de0b3b54f1f6"
} | {
"account_age_days": 1605,
"account_id": "ACCT-13341A155345",
"baseline_risk_score": 0.136,
"kyc_tier": "tier_2",
"session_entropy": 0.911
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 304,
"timestamp": "2026-01-03T16:05:00Z",
"transaction_amount_usd": 19.69
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.812,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2782264.77,
"financial_exposure_usd": 2959924.68,
"recoverable_pct": 0.45
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106299",
"label": "fraudulent",
"label_confidence": 0.704,
"severity": "high",
"timestamp": "2026-01-05T08:59:00Z",
"trace_id": "06aa0d41-8920-cd5f-cb98-e922608ffdc6"
} | {
"account_age_days": 1268,
"account_id": "ACCT-3A7F484E819F",
"baseline_risk_score": 0.428,
"kyc_tier": "tier_2",
"session_entropy": 0.6
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 578,
"timestamp": "2026-01-05T08:59:00Z",
"transaction_amount_usd": 399471.81
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.751,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3470994.72,
"financial_exposure_usd": 3545246.64,
"recoverable_pct": 0.553
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101030",
"label": "fraudulent",
"label_confidence": 0.833,
"severity": "critical",
"timestamp": "2026-01-01T17:10:00Z",
"trace_id": "bbdb4036-443e-61a2-4664-a837a430774c"
} | {
"account_age_days": 1419,
"account_id": "ACCT-D1551DE67BAE",
"baseline_risk_score": 0.282,
"kyc_tier": "tier_2",
"session_entropy": 0.858
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 148,
"timestamp": "2026-01-01T10:18:00Z",
"transaction_amount_usd": 0.98
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.505,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 369752.27,
"financial_exposure_usd": 827378.52,
"recoverable_pct": 0.733
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103583",
"label": "fraudulent",
"label_confidence": 0.896,
"severity": "high",
"timestamp": "2026-01-03T11:43:00Z",
"trace_id": "ceea85bd-b007-14cc-4b8e-46109e102ba4"
} | {
"account_age_days": 1670,
"account_id": "ACCT-63490E6AA97E",
"baseline_risk_score": 0.262,
"kyc_tier": "tier_1",
"session_entropy": 0.228
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 163,
"timestamp": "2026-01-03T11:43:00Z",
"transaction_amount_usd": 1348154.59
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.78,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 2414912.11,
"financial_exposure_usd": 4510488.47,
"recoverable_pct": 0.848
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100290",
"label": "fraudulent",
"label_confidence": 0.771,
"severity": "low",
"timestamp": "2026-01-01T04:50:00Z",
"trace_id": "0ead4e04-a93d-bf91-66bb-1d3c2cad002a"
} | {
"account_age_days": 1542,
"account_id": "ACCT-33A83451F0D8",
"baseline_risk_score": 0.542,
"kyc_tier": "tier_3",
"session_entropy": 0.586
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 828,
"timestamp": "2026-01-01T04:50:00Z",
"transaction_amount_usd": 79844.44
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.894,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 482168.13,
"financial_exposure_usd": 711525.07,
"recoverable_pct": 0.482
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109342",
"label": "benign",
"label_confidence": 0.557,
"severity": "low",
"timestamp": "2026-01-07T11:42:00Z",
"trace_id": "4791ea56-cdb0-df92-5ac4-531ab5cd1b7a"
} | {
"account_age_days": 754,
"account_id": "ACCT-C2AE8E846949",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.152
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 218,
"timestamp": "2026-01-07T08:18:00Z",
"transaction_amount_usd": 7.88
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.754,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1819.74,
"financial_exposure_usd": 1845.36,
"recoverable_pct": 0.898
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100784",
"label": "fraudulent",
"label_confidence": 0.757,
"severity": "medium",
"timestamp": "2026-01-01T13:04:00Z",
"trace_id": "6fef2332-79f4-7bdc-5fa1-c9ff99a5fc7a"
} | {
"account_age_days": 68,
"account_id": "ACCT-FA2097BD1A9F",
"baseline_risk_score": 0.639,
"kyc_tier": "tier_1",
"session_entropy": 0.676
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 218,
"timestamp": "2026-01-01T11:55:00Z",
"transaction_amount_usd": 24.85
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.78,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 719357.16,
"financial_exposure_usd": 772943.56,
"recoverable_pct": 0.678
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109116",
"label": "benign",
"label_confidence": 0.644,
"severity": "medium",
"timestamp": "2026-01-07T07:56:00Z",
"trace_id": "11769a26-d5c2-38e6-47d5-6c6ddfec28d7"
} | {
"account_age_days": 557,
"account_id": "ACCT-701D6E4CA352",
"baseline_risk_score": 0.158,
"kyc_tier": "tier_3",
"session_entropy": 0.426
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 212,
"timestamp": "2026-01-06T19:27:00Z",
"transaction_amount_usd": 16.41
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.593,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1284.69,
"financial_exposure_usd": 2172.5,
"recoverable_pct": 0.774
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105370",
"label": "fraudulent",
"label_confidence": 0.895,
"severity": "low",
"timestamp": "2026-01-04T17:30:00Z",
"trace_id": "cc63e57c-4d22-aeb0-d8f4-64a3bd4b9932"
} | {
"account_age_days": 1860,
"account_id": "ACCT-9FEB693BEAD0",
"baseline_risk_score": 0.069,
"kyc_tier": "tier_3",
"session_entropy": 0.354
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 972,
"timestamp": "2026-01-04T17:30:00Z",
"transaction_amount_usd": 283358.75
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.726,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3790725.45,
"financial_exposure_usd": 6429768.71,
"recoverable_pct": 0.848
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101098",
"label": "fraudulent",
"label_confidence": 0.787,
"severity": "critical",
"timestamp": "2026-01-01T18:18:00Z",
"trace_id": "bf5d7d34-26a0-00b4-7c5b-e3524c1dceed"
} | {
"account_age_days": 134,
"account_id": "ACCT-B8D6E9044BF2",
"baseline_risk_score": 0.271,
"kyc_tier": "tier_1",
"session_entropy": 0.53
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CH",
"latency_ms": 944,
"timestamp": "2026-01-01T18:18:00Z",
"transaction_amount_usd": 52361.59
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.373,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 591125.71,
"financial_exposure_usd": 882951.39,
"recoverable_pct": 0.293
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108398",
"label": "benign",
"label_confidence": 0.66,
"severity": "low",
"timestamp": "2026-01-06T19:58:00Z",
"trace_id": "536b011e-4a2c-523c-6536-c42278c284bf"
} | {
"account_age_days": 1681,
"account_id": "ACCT-D52759DFC1B8",
"baseline_risk_score": 0.186,
"kyc_tier": "tier_3",
"session_entropy": 0.911
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 579,
"timestamp": "2026-01-06T19:58:00Z",
"transaction_amount_usd": 2011.58
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.468,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3028.31,
"financial_exposure_usd": 4156.36,
"recoverable_pct": 0.818
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100973",
"label": "fraudulent",
"label_confidence": 0.816,
"severity": "low",
"timestamp": "2026-01-01T16:13:00Z",
"trace_id": "d11daabb-9112-5dfd-7465-b49f6bdfab27"
} | {
"account_age_days": 1055,
"account_id": "ACCT-BC276E41CD48",
"baseline_risk_score": 0.519,
"kyc_tier": "tier_2",
"session_entropy": 0.331
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 991,
"timestamp": "2026-01-01T16:13:00Z",
"transaction_amount_usd": 21096.73
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.745,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 574928.84,
"financial_exposure_usd": 691068.27,
"recoverable_pct": 0.056
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107449",
"label": "benign",
"label_confidence": 0.592,
"severity": "critical",
"timestamp": "2026-01-06T04:09:00Z",
"trace_id": "7c09e48f-b6a1-8ec5-5606-3472c3e28b43"
} | {
"account_age_days": 668,
"account_id": "ACCT-9EAF741E0AA1",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.743
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 294,
"timestamp": "2026-01-05T22:40:00Z",
"transaction_amount_usd": 1.44
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.607,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 789.23,
"financial_exposure_usd": 965.19,
"recoverable_pct": 0.976
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103327",
"label": "fraudulent",
"label_confidence": 0.944,
"severity": "low",
"timestamp": "2026-01-03T07:27:00Z",
"trace_id": "5c9f6497-b8f2-1004-11e5-6516aafab99e"
} | {
"account_age_days": 1437,
"account_id": "ACCT-0B58DF988F4F",
"baseline_risk_score": 0.29,
"kyc_tier": "tier_1",
"session_entropy": 0.253
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 220,
"timestamp": "2026-01-03T07:27:00Z",
"transaction_amount_usd": 99552.2
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.391,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 273274.74,
"financial_exposure_usd": 360775.89,
"recoverable_pct": 0.772
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103378",
"label": "fraudulent",
"label_confidence": 0.681,
"severity": "high",
"timestamp": "2026-01-03T08:18:00Z",
"trace_id": "641c69b8-415b-ba11-e198-c3f1e10d6906"
} | {
"account_age_days": 339,
"account_id": "ACCT-4FAFE8EA1034",
"baseline_risk_score": 0.424,
"kyc_tier": "tier_3",
"session_entropy": 0.192
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 314,
"timestamp": "2026-01-02T22:42:00Z",
"transaction_amount_usd": 15.05
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.839,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3118831.77,
"financial_exposure_usd": 6736376.82,
"recoverable_pct": 0.861
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108390",
"label": "benign",
"label_confidence": 0.633,
"severity": "low",
"timestamp": "2026-01-06T19:50:00Z",
"trace_id": "26c37abc-012d-302d-dafe-7351c650fbb9"
} | {
"account_age_days": 269,
"account_id": "ACCT-35D6854C36BD",
"baseline_risk_score": 0.104,
"kyc_tier": "tier_2",
"session_entropy": 0.59
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 205,
"timestamp": "2026-01-06T18:08:00Z",
"transaction_amount_usd": 2.38
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.707,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2913.42,
"financial_exposure_usd": 6840.69,
"recoverable_pct": 0.61
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108318",
"label": "benign",
"label_confidence": 0.52,
"severity": "low",
"timestamp": "2026-01-06T18:38:00Z",
"trace_id": "b2d46e80-41df-e93f-30e8-c704e5db83be"
} | {
"account_age_days": 649,
"account_id": "ACCT-9D2ED27E057C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.805
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 220,
"timestamp": "2026-01-06T18:38:00Z",
"transaction_amount_usd": 5796.07
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.563,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3752.75,
"financial_exposure_usd": 4001.55,
"recoverable_pct": 0.987
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106405",
"label": "fraudulent",
"label_confidence": 0.614,
"severity": "high",
"timestamp": "2026-01-05T10:45:00Z",
"trace_id": "4e266f3b-2c00-ef73-fa57-b912ac3784cb"
} | {
"account_age_days": 1017,
"account_id": "ACCT-4171F48D3002",
"baseline_risk_score": 0.068,
"kyc_tier": "tier_2",
"session_entropy": 0.769
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 781,
"timestamp": "2026-01-05T10:45:00Z",
"transaction_amount_usd": 115694.92
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.53,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3057084.27,
"financial_exposure_usd": 4785616.49,
"recoverable_pct": 0.845
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103291",
"label": "fraudulent",
"label_confidence": 0.803,
"severity": "medium",
"timestamp": "2026-01-03T06:51:00Z",
"trace_id": "a5fe829c-d7d8-52bb-5232-8f3b54f5a1b1"
} | {
"account_age_days": 637,
"account_id": "ACCT-4236BFCC14B5",
"baseline_risk_score": 0.422,
"kyc_tier": "tier_2",
"session_entropy": 0.317
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NL",
"latency_ms": 378,
"timestamp": "2026-01-03T06:51:00Z",
"transaction_amount_usd": 52199.05
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.799,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 914388.13,
"financial_exposure_usd": 1325232.14,
"recoverable_pct": 0.631
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102893",
"label": "fraudulent",
"label_confidence": 0.849,
"severity": "high",
"timestamp": "2026-01-03T00:13:00Z",
"trace_id": "6460770f-f4c9-1871-37d4-2946d9f1e772"
} | {
"account_age_days": 927,
"account_id": "ACCT-1FBCF19AF75B",
"baseline_risk_score": 0.59,
"kyc_tier": "tier_2",
"session_entropy": 0.448
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 337,
"timestamp": "2026-01-02T16:30:00Z",
"transaction_amount_usd": 16.7
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.567,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 942561.85,
"financial_exposure_usd": 1014492.52,
"recoverable_pct": 0.729
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100113",
"label": "fraudulent",
"label_confidence": 0.892,
"severity": "critical",
"timestamp": "2026-01-01T01:53:00Z",
"trace_id": "3ed5e52e-aa3d-2111-a123-01935c532042"
} | {
"account_age_days": 1331,
"account_id": "ACCT-E33EA9765862",
"baseline_risk_score": 0.5,
"kyc_tier": "tier_2",
"session_entropy": 0.79
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "FR",
"latency_ms": 926,
"timestamp": "2026-01-01T01:53:00Z",
"transaction_amount_usd": 63793.21
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.879,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 373671.59,
"financial_exposure_usd": 885095.75,
"recoverable_pct": 0.284
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108307",
"label": "benign",
"label_confidence": 0.49,
"severity": "medium",
"timestamp": "2026-01-06T18:27:00Z",
"trace_id": "b3aeb830-1459-c14c-b769-5aa2663efacb"
} | {
"account_age_days": 1462,
"account_id": "ACCT-0E3E4155C774",
"baseline_risk_score": 0.155,
"kyc_tier": "tier_2",
"session_entropy": 0.949
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 83,
"timestamp": "2026-01-06T07:37:00Z",
"transaction_amount_usd": 14.25
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.54,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 838.86,
"financial_exposure_usd": 1002.42,
"recoverable_pct": 0.784
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107914",
"label": "benign",
"label_confidence": 0.631,
"severity": "low",
"timestamp": "2026-01-06T11:54:00Z",
"trace_id": "3319e290-f7b1-76a5-dee3-d49d1129b264"
} | {
"account_age_days": 1685,
"account_id": "ACCT-CABAD18F345C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.633
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 1119,
"timestamp": "2026-01-06T11:54:00Z",
"transaction_amount_usd": 14413.17
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.457,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 923.54,
"financial_exposure_usd": 1791.43,
"recoverable_pct": 0.961
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102392",
"label": "fraudulent",
"label_confidence": 0.88,
"severity": "high",
"timestamp": "2026-01-02T15:52:00Z",
"trace_id": "4401763f-4d2a-eaea-d37c-3732bb0d68ac"
} | {
"account_age_days": 839,
"account_id": "ACCT-902E98982175",
"baseline_risk_score": 0.616,
"kyc_tier": "tier_2",
"session_entropy": 0.241
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 224,
"timestamp": "2026-01-02T14:14:00Z",
"transaction_amount_usd": 16.71
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.798,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 776598.89,
"financial_exposure_usd": 942937.04,
"recoverable_pct": 0.378
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108208",
"label": "benign",
"label_confidence": 0.703,
"severity": "medium",
"timestamp": "2026-01-06T16:48:00Z",
"trace_id": "d9e65921-a7d0-6eca-b9ae-1eb522c12885"
} | {
"account_age_days": 1482,
"account_id": "ACCT-D91D504DC8A6",
"baseline_risk_score": 0.062,
"kyc_tier": "tier_1",
"session_entropy": 0.698
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 255,
"timestamp": "2026-01-06T16:48:00Z",
"transaction_amount_usd": 14848.93
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.683,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1546.55,
"financial_exposure_usd": 2088.96,
"recoverable_pct": 0.671
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103609",
"label": "fraudulent",
"label_confidence": 0.864,
"severity": "low",
"timestamp": "2026-01-03T12:09:00Z",
"trace_id": "112db2e3-16e9-94b9-51c7-8641d98e9167"
} | {
"account_age_days": 986,
"account_id": "ACCT-6C1CD218D08F",
"baseline_risk_score": 0.308,
"kyc_tier": "tier_2",
"session_entropy": 0.782
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 912,
"timestamp": "2026-01-03T12:09:00Z",
"transaction_amount_usd": 1560700.96
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.592,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2646261.4,
"financial_exposure_usd": 3337450.59,
"recoverable_pct": 0.568
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106322",
"label": "fraudulent",
"label_confidence": 0.767,
"severity": "low",
"timestamp": "2026-01-05T09:22:00Z",
"trace_id": "f4817084-5423-c23b-88b4-ef1475c45b78"
} | {
"account_age_days": 1987,
"account_id": "ACCT-16858B26CF82",
"baseline_risk_score": 0.229,
"kyc_tier": "tier_1",
"session_entropy": 0.332
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 218,
"timestamp": "2026-01-05T01:37:00Z",
"transaction_amount_usd": 2.67
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.652,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4198471.67,
"financial_exposure_usd": 4948666.79,
"recoverable_pct": 0.799
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101042",
"label": "fraudulent",
"label_confidence": 0.803,
"severity": "high",
"timestamp": "2026-01-01T17:22:00Z",
"trace_id": "a366c34d-7897-39e8-04a8-b114c07b8191"
} | {
"account_age_days": 1825,
"account_id": "ACCT-BA932914B7B0",
"baseline_risk_score": 0.304,
"kyc_tier": "tier_2",
"session_entropy": 0.734
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 310,
"timestamp": "2026-01-01T15:30:00Z",
"transaction_amount_usd": 18.53
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.944,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 698717.84,
"financial_exposure_usd": 768254.03,
"recoverable_pct": 0.444
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109486",
"label": "benign",
"label_confidence": 0.575,
"severity": "high",
"timestamp": "2026-01-07T14:06:00Z",
"trace_id": "ed515509-3058-2436-f525-ce0d7c046253"
} | {
"account_age_days": 1006,
"account_id": "ACCT-966FBF03EC83",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.334
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 381,
"timestamp": "2026-01-07T14:06:00Z",
"transaction_amount_usd": 14107.53
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.493,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1398.89,
"financial_exposure_usd": 2095.34,
"recoverable_pct": 0.833
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103707",
"label": "fraudulent",
"label_confidence": 0.789,
"severity": "medium",
"timestamp": "2026-01-03T13:47:00Z",
"trace_id": "8f52715b-95cc-36dc-6f85-b32605ce90ad"
} | {
"account_age_days": 996,
"account_id": "ACCT-96F4D42D5B1A",
"baseline_risk_score": 0.336,
"kyc_tier": "tier_1",
"session_entropy": 0.407
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 797,
"timestamp": "2026-01-03T13:47:00Z",
"transaction_amount_usd": 2192116.3
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.406,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1404999.74,
"financial_exposure_usd": 1781927.53,
"recoverable_pct": 0.526
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102142",
"label": "fraudulent",
"label_confidence": 0.798,
"severity": "low",
"timestamp": "2026-01-02T11:42:00Z",
"trace_id": "b0506fc8-9686-adb8-3e48-0c34b52be3ef"
} | {
"account_age_days": 1266,
"account_id": "ACCT-DC5507D6A3B0",
"baseline_risk_score": 0.569,
"kyc_tier": "tier_3",
"session_entropy": 0.87
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 602,
"timestamp": "2026-01-02T11:42:00Z",
"transaction_amount_usd": 103430.34
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.718,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 743102.74,
"financial_exposure_usd": 1146067.64,
"recoverable_pct": 0.08
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100160",
"label": "fraudulent",
"label_confidence": 0.774,
"severity": "high",
"timestamp": "2026-01-01T02:40:00Z",
"trace_id": "f51e2df3-06c3-998e-8f14-aac7e99d6b91"
} | {
"account_age_days": 1899,
"account_id": "ACCT-719DEADD817C",
"baseline_risk_score": 0.349,
"kyc_tier": "tier_1",
"session_entropy": 0.432
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 342,
"timestamp": "2025-12-31T18:58:00Z",
"transaction_amount_usd": 19.67
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.593,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 500947.64,
"financial_exposure_usd": 561498.15,
"recoverable_pct": 0.715
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103042",
"label": "fraudulent",
"label_confidence": 0.912,
"severity": "medium",
"timestamp": "2026-01-03T02:42:00Z",
"trace_id": "c0ecbc6d-be0e-592d-e64b-cbb0cbf71e2e"
} | {
"account_age_days": 538,
"account_id": "ACCT-C088909E6E9E",
"baseline_risk_score": 0.448,
"kyc_tier": "tier_2",
"session_entropy": 0.317
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 864,
"timestamp": "2026-01-03T02:42:00Z",
"transaction_amount_usd": 23853.02
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.456,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 396038.82,
"financial_exposure_usd": 845552.05,
"recoverable_pct": 0.802
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102729",
"label": "fraudulent",
"label_confidence": 0.765,
"severity": "high",
"timestamp": "2026-01-02T21:29:00Z",
"trace_id": "b49058db-f42c-e0d9-c07a-53515df61388"
} | {
"account_age_days": 1696,
"account_id": "ACCT-0119E4C091FF",
"baseline_risk_score": 0.364,
"kyc_tier": "tier_1",
"session_entropy": 0.318
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "LU",
"latency_ms": 218,
"timestamp": "2026-01-02T21:29:00Z",
"transaction_amount_usd": 8168.89
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.795,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 848811.28,
"financial_exposure_usd": 949230.53,
"recoverable_pct": 0.423
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106686",
"label": "benign",
"label_confidence": 0.515,
"severity": "low",
"timestamp": "2026-01-05T15:26:00Z",
"trace_id": "36544422-b878-c86c-f2d0-e3f3f264ecec"
} | {
"account_age_days": 1173,
"account_id": "ACCT-FEACE08CEF6F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.532
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 466,
"timestamp": "2026-01-05T15:26:00Z",
"transaction_amount_usd": 2030.23
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.612,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2902.37,
"financial_exposure_usd": 4965.64,
"recoverable_pct": 0.868
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103188",
"label": "fraudulent",
"label_confidence": 0.918,
"severity": "medium",
"timestamp": "2026-01-03T05:08:00Z",
"trace_id": "96f0d62a-cecd-eb18-21fc-2a20a5ea5580"
} | {
"account_age_days": 811,
"account_id": "ACCT-7C566E83C712",
"baseline_risk_score": 0.431,
"kyc_tier": "tier_2",
"session_entropy": 0.213
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 160,
"timestamp": "2026-01-02T23:12:00Z",
"transaction_amount_usd": 4.76
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.932,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 338670.75,
"financial_exposure_usd": 715241.48,
"recoverable_pct": 0.428
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109339",
"label": "benign",
"label_confidence": 0.556,
"severity": "high",
"timestamp": "2026-01-07T11:39:00Z",
"trace_id": "d59fe150-b862-0e0c-88a6-fbbe51098253"
} | {
"account_age_days": 1487,
"account_id": "ACCT-E647668B0780",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.798
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 245,
"timestamp": "2026-01-07T05:03:00Z",
"transaction_amount_usd": 3.78
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.483,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 509.82,
"financial_exposure_usd": 598.07,
"recoverable_pct": 0.457
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105109",
"label": "fraudulent",
"label_confidence": 0.682,
"severity": "medium",
"timestamp": "2026-01-04T13:09:00Z",
"trace_id": "9b6240c9-4066-3b9d-5f24-743d5567a84c"
} | {
"account_age_days": 651,
"account_id": "ACCT-DA51CC362CA9",
"baseline_risk_score": 0.06,
"kyc_tier": "tier_2",
"session_entropy": 0.872
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 504,
"timestamp": "2026-01-04T13:09:00Z",
"transaction_amount_usd": 1059643.57
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.78,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 3209467.27,
"financial_exposure_usd": 4641597.97,
"recoverable_pct": 0.58
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107703",
"label": "benign",
"label_confidence": 0.493,
"severity": "low",
"timestamp": "2026-01-06T08:23:00Z",
"trace_id": "cc86b20d-3ede-b326-55bb-650b4093bb87"
} | {
"account_age_days": 1637,
"account_id": "ACCT-FFC10B4A7C7D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.415
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 1182,
"timestamp": "2026-01-06T08:23:00Z",
"transaction_amount_usd": 14820.46
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.461,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 405.25,
"financial_exposure_usd": 929.35,
"recoverable_pct": 0.941
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104272",
"label": "fraudulent",
"label_confidence": 0.948,
"severity": "medium",
"timestamp": "2026-01-03T23:12:00Z",
"trace_id": "2d093569-ab42-1e3d-7d5e-b3fc91ee2b92"
} | {
"account_age_days": 988,
"account_id": "ACCT-298016157F7F",
"baseline_risk_score": 0.138,
"kyc_tier": "tier_1",
"session_entropy": 0.781
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 1138,
"timestamp": "2026-01-03T23:12:00Z",
"transaction_amount_usd": 2346800.13
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.554,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3671574.51,
"financial_exposure_usd": 8813120.49,
"recoverable_pct": 0.48
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101086",
"label": "fraudulent",
"label_confidence": 0.966,
"severity": "medium",
"timestamp": "2026-01-01T18:06:00Z",
"trace_id": "7e6c880e-e9da-baae-df88-b46fb1a89539"
} | {
"account_age_days": 1686,
"account_id": "ACCT-88AC8B2F8715",
"baseline_risk_score": 0.51,
"kyc_tier": "tier_3",
"session_entropy": 0.663
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "FR",
"latency_ms": 361,
"timestamp": "2026-01-01T18:06:00Z",
"transaction_amount_usd": 27572.81
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.754,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 564911.89,
"financial_exposure_usd": 854985.83,
"recoverable_pct": 0.156
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103238",
"label": "fraudulent",
"label_confidence": 0.949,
"severity": "medium",
"timestamp": "2026-01-03T05:58:00Z",
"trace_id": "558d0168-2132-f446-d10f-1af910f7ce10"
} | {
"account_age_days": 1940,
"account_id": "ACCT-55299D14665E",
"baseline_risk_score": 0.513,
"kyc_tier": "tier_3",
"session_entropy": 0.237
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 310,
"timestamp": "2026-01-02T22:28:00Z",
"transaction_amount_usd": 15.33
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.543,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 223219.29,
"financial_exposure_usd": 307911.87,
"recoverable_pct": 0.41
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105884",
"label": "fraudulent",
"label_confidence": 0.751,
"severity": "critical",
"timestamp": "2026-01-05T02:04:00Z",
"trace_id": "e2444bff-4693-03ce-9bb9-258065af770a"
} | {
"account_age_days": 604,
"account_id": "ACCT-358DCFEE1FDA",
"baseline_risk_score": 0.414,
"kyc_tier": "tier_3",
"session_entropy": 0.559
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 659,
"timestamp": "2026-01-05T02:04:00Z",
"transaction_amount_usd": 2232152.44
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.537,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 6021032.72,
"financial_exposure_usd": 6331063.4,
"recoverable_pct": 0.457
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105404",
"label": "fraudulent",
"label_confidence": 0.653,
"severity": "high",
"timestamp": "2026-01-04T18:04:00Z",
"trace_id": "a5ef2ef6-a469-76b9-e22e-adffb12e12fe"
} | {
"account_age_days": 1538,
"account_id": "ACCT-3F263CBF7729",
"baseline_risk_score": 0.12,
"kyc_tier": "tier_3",
"session_entropy": 0.752
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 655,
"timestamp": "2026-01-04T18:04:00Z",
"transaction_amount_usd": 259266.58
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.626,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1405231.07,
"financial_exposure_usd": 3168038.85,
"recoverable_pct": 0.735
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103375",
"label": "fraudulent",
"label_confidence": 0.623,
"severity": "low",
"timestamp": "2026-01-03T08:15:00Z",
"trace_id": "11ddb888-c42b-a3c8-0b00-269142907666"
} | {
"account_age_days": 173,
"account_id": "ACCT-7104CFD9268E",
"baseline_risk_score": 0.187,
"kyc_tier": "tier_3",
"session_entropy": 0.865
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 488,
"timestamp": "2026-01-03T08:15:00Z",
"transaction_amount_usd": 800149.62
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.514,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 6373105.6,
"financial_exposure_usd": 7590175.04,
"recoverable_pct": 0.407
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109587",
"label": "benign",
"label_confidence": 0.496,
"severity": "low",
"timestamp": "2026-01-07T15:47:00Z",
"trace_id": "e6a02b68-b973-cc32-ac4f-dbc2ac956494"
} | {
"account_age_days": 461,
"account_id": "ACCT-48C3F2FC54AA",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.283
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 859,
"timestamp": "2026-01-07T15:47:00Z",
"transaction_amount_usd": 9209.14
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.732,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1816.09,
"financial_exposure_usd": 2224.2,
"recoverable_pct": 0.704
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109769",
"label": "benign",
"label_confidence": 0.696,
"severity": "low",
"timestamp": "2026-01-07T18:49:00Z",
"trace_id": "38a0f686-e372-a913-0111-8b2efe3a7c85"
} | {
"account_age_days": 1268,
"account_id": "ACCT-516BB33A1958",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.569
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 378,
"timestamp": "2026-01-07T16:29:00Z",
"transaction_amount_usd": 22.46
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.47,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 1120.49,
"financial_exposure_usd": 1338.16,
"recoverable_pct": 0.555
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107271",
"label": "benign",
"label_confidence": 0.627,
"severity": "low",
"timestamp": "2026-01-06T01:11:00Z",
"trace_id": "5dc1c161-dca4-be81-5b0e-becb7ab457c2"
} | {
"account_age_days": 1273,
"account_id": "ACCT-8B0F5881FB09",
"baseline_risk_score": 0.059,
"kyc_tier": "tier_1",
"session_entropy": 0.475
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 739,
"timestamp": "2026-01-06T01:11:00Z",
"transaction_amount_usd": 9938.05
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.798,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 6904.13,
"financial_exposure_usd": 8252.8,
"recoverable_pct": 0.578
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106975",
"label": "benign",
"label_confidence": 0.478,
"severity": "low",
"timestamp": "2026-01-05T20:15:00Z",
"trace_id": "2d7f863b-1886-1fae-90d6-75ac646cd81f"
} | {
"account_age_days": 1748,
"account_id": "ACCT-C61E45EDD506",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.832
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 182,
"timestamp": "2026-01-05T11:06:00Z",
"transaction_amount_usd": 24.65
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.472,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1269.07,
"financial_exposure_usd": 1474.73,
"recoverable_pct": 0.522
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100909",
"label": "fraudulent",
"label_confidence": 0.958,
"severity": "low",
"timestamp": "2026-01-01T15:09:00Z",
"trace_id": "93472063-9902-3d83-6a1f-6b8705766033"
} | {
"account_age_days": 1340,
"account_id": "ACCT-D01426D4F43B",
"baseline_risk_score": 0.262,
"kyc_tier": "tier_3",
"session_entropy": 0.265
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 212,
"timestamp": "2026-01-01T04:53:00Z",
"transaction_amount_usd": 11.81
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.787,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 723400.5,
"financial_exposure_usd": 925771.83,
"recoverable_pct": 0.105
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108814",
"label": "benign",
"label_confidence": 0.679,
"severity": "low",
"timestamp": "2026-01-07T02:54:00Z",
"trace_id": "caf54f1d-1a01-5324-7255-2433426961b7"
} | {
"account_age_days": 1031,
"account_id": "ACCT-D99FD9DB892D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.68
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 270,
"timestamp": "2026-01-07T02:54:00Z",
"transaction_amount_usd": 14887.33
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.566,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2954.52,
"financial_exposure_usd": 3233.75,
"recoverable_pct": 0.851
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106044",
"label": "fraudulent",
"label_confidence": 0.911,
"severity": "low",
"timestamp": "2026-01-05T04:44:00Z",
"trace_id": "f6bcc24d-6e6b-559a-7b99-210719c5b207"
} | {
"account_age_days": 1896,
"account_id": "ACCT-655CF5BFE0AB",
"baseline_risk_score": 0.072,
"kyc_tier": "tier_3",
"session_entropy": 0.728
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 168,
"timestamp": "2026-01-04T21:38:00Z",
"transaction_amount_usd": 10.75
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.877,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2063464.13,
"financial_exposure_usd": 3291711.66,
"recoverable_pct": 0.786
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107705",
"label": "benign",
"label_confidence": 0.602,
"severity": "medium",
"timestamp": "2026-01-06T08:25:00Z",
"trace_id": "2fe3013a-cfd7-01f9-defc-d6ab4ade1cda"
} | {
"account_age_days": 38,
"account_id": "ACCT-F60DD1015D1A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.593
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 347,
"timestamp": "2026-01-05T22:20:00Z",
"transaction_amount_usd": 3.14
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.689,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3615.83,
"financial_exposure_usd": 5348.01,
"recoverable_pct": 0.661
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102081",
"label": "fraudulent",
"label_confidence": 0.818,
"severity": "high",
"timestamp": "2026-01-02T10:41:00Z",
"trace_id": "84711c30-1686-f97e-9468-bcfae2b20769"
} | {
"account_age_days": 789,
"account_id": "ACCT-785B74D790D2",
"baseline_risk_score": 0.611,
"kyc_tier": "tier_3",
"session_entropy": 0.681
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 1122,
"timestamp": "2026-01-02T10:41:00Z",
"transaction_amount_usd": 4628.05
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.498,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 887982.32,
"financial_exposure_usd": 1039466.58,
"recoverable_pct": 0.743
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103044",
"label": "fraudulent",
"label_confidence": 0.907,
"severity": "high",
"timestamp": "2026-01-03T02:44:00Z",
"trace_id": "548acf7c-53a3-e548-0924-69ee079827ac"
} | {
"account_age_days": 1473,
"account_id": "ACCT-A41B512A0E5B",
"baseline_risk_score": 0.376,
"kyc_tier": "tier_1",
"session_entropy": 0.829
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 200,
"timestamp": "2026-01-03T02:44:00Z",
"transaction_amount_usd": 107815.55
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.431,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 657828.34,
"financial_exposure_usd": 669632.92,
"recoverable_pct": 0.553
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100378",
"label": "fraudulent",
"label_confidence": 0.929,
"severity": "medium",
"timestamp": "2026-01-01T06:18:00Z",
"trace_id": "61e839c5-67f7-7e75-e65c-61892d146d39"
} | {
"account_age_days": 482,
"account_id": "ACCT-379A1AFEFA37",
"baseline_risk_score": 0.364,
"kyc_tier": "tier_1",
"session_entropy": 0.216
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 96,
"timestamp": "2025-12-31T19:15:00Z",
"transaction_amount_usd": 3.16
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.741,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 297299.31,
"financial_exposure_usd": 437665.76,
"recoverable_pct": 0.665
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107698",
"label": "benign",
"label_confidence": 0.495,
"severity": "low",
"timestamp": "2026-01-06T08:18:00Z",
"trace_id": "498f1751-d54e-feb2-8bad-a6dcc14eaeac"
} | {
"account_age_days": 1964,
"account_id": "ACCT-BDA540256230",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.265
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 441,
"timestamp": "2026-01-06T08:18:00Z",
"transaction_amount_usd": 11444.11
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.651,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1963.14,
"financial_exposure_usd": 3303.05,
"recoverable_pct": 0.658
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109208",
"label": "benign",
"label_confidence": 0.558,
"severity": "medium",
"timestamp": "2026-01-07T09:28:00Z",
"trace_id": "8b7ce1bf-80e7-0d49-3960-3dc512b7aaf8"
} | {
"account_age_days": 292,
"account_id": "ACCT-C7D158FCD164",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.374
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 138,
"timestamp": "2026-01-07T05:40:00Z",
"transaction_amount_usd": 10.96
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.569,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 883.82,
"financial_exposure_usd": 2073.77,
"recoverable_pct": 0.57
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109345",
"label": "benign",
"label_confidence": 0.465,
"severity": "high",
"timestamp": "2026-01-07T11:45:00Z",
"trace_id": "aaf3c86b-8afd-bef2-3983-00c5da3ddac1"
} | {
"account_age_days": 1931,
"account_id": "ACCT-8D248D8DCAB5",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.323
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 390,
"timestamp": "2026-01-07T11:45:00Z",
"transaction_amount_usd": 555.66
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.59,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 3012.07,
"financial_exposure_usd": 4208.78,
"recoverable_pct": 0.526
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106764",
"label": "benign",
"label_confidence": 0.606,
"severity": "high",
"timestamp": "2026-01-05T16:44:00Z",
"trace_id": "69d44a8e-e8a9-80ce-fb88-bacb45c08da0"
} | {
"account_age_days": 1236,
"account_id": "ACCT-ECC1EFD12958",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.536
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 276,
"timestamp": "2026-01-05T06:43:00Z",
"transaction_amount_usd": 6.7
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.565,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 4534.87,
"financial_exposure_usd": 6039.73,
"recoverable_pct": 0.685
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104937",
"label": "fraudulent",
"label_confidence": 0.7,
"severity": "critical",
"timestamp": "2026-01-04T10:17:00Z",
"trace_id": "73ef1735-6ad9-c81c-bfcb-d19691a78494"
} | {
"account_age_days": 554,
"account_id": "ACCT-1C8AEFF6B6D9",
"baseline_risk_score": 0.087,
"kyc_tier": "tier_2",
"session_entropy": 0.835
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 257,
"timestamp": "2026-01-04T08:52:00Z",
"transaction_amount_usd": 3.12
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.721,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 7042526.5,
"financial_exposure_usd": 7629357.59,
"recoverable_pct": 0.941
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107145",
"label": "benign",
"label_confidence": 0.579,
"severity": "high",
"timestamp": "2026-01-05T23:05:00Z",
"trace_id": "e4be4c76-888b-5503-2c2d-5aec00576a06"
} | {
"account_age_days": 1827,
"account_id": "ACCT-78980F245C4D",
"baseline_risk_score": 0.154,
"kyc_tier": "tier_2",
"session_entropy": 0.116
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 383,
"timestamp": "2026-01-05T23:05:00Z",
"transaction_amount_usd": 12750.41
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.572,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2543.36,
"financial_exposure_usd": 2553.44,
"recoverable_pct": 0.449
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100898",
"label": "fraudulent",
"label_confidence": 0.805,
"severity": "high",
"timestamp": "2026-01-01T14:58:00Z",
"trace_id": "ac977f70-d11a-68ed-f421-40267ef57e55"
} | {
"account_age_days": 416,
"account_id": "ACCT-DD1BE14276D4",
"baseline_risk_score": 0.51,
"kyc_tier": "tier_1",
"session_entropy": 0.888
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 457,
"timestamp": "2026-01-01T14:58:00Z",
"transaction_amount_usd": 83671.07
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.939,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 1070496.08,
"financial_exposure_usd": 1202361.6,
"recoverable_pct": 0.795
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106315",
"label": "fraudulent",
"label_confidence": 0.87,
"severity": "high",
"timestamp": "2026-01-05T09:15:00Z",
"trace_id": "2e491019-3b23-459a-791b-6c524052d1c7"
} | {
"account_age_days": 1877,
"account_id": "ACCT-71C3360AE7C2",
"baseline_risk_score": 0.121,
"kyc_tier": "tier_3",
"session_entropy": 0.923
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 309,
"timestamp": "2026-01-05T06:51:00Z",
"transaction_amount_usd": 2.02
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.433,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1834296.36,
"financial_exposure_usd": 2843858.6,
"recoverable_pct": 0.6
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100415",
"label": "fraudulent",
"label_confidence": 0.843,
"severity": "medium",
"timestamp": "2026-01-01T06:55:00Z",
"trace_id": "fff3f7ef-9ddc-0c0b-0c25-db04e4c9bdec"
} | {
"account_age_days": 314,
"account_id": "ACCT-80E29C59D300",
"baseline_risk_score": 0.546,
"kyc_tier": "tier_3",
"session_entropy": 0.886
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "BR",
"latency_ms": 913,
"timestamp": "2026-01-01T06:55:00Z",
"transaction_amount_usd": 66109.03
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.73,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 760710.48,
"financial_exposure_usd": 1239944.23,
"recoverable_pct": 0.542
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102676",
"label": "fraudulent",
"label_confidence": 0.86,
"severity": "high",
"timestamp": "2026-01-02T20:36:00Z",
"trace_id": "609b736b-b5e9-92ec-c4e5-4c77f53d391d"
} | {
"account_age_days": 815,
"account_id": "ACCT-111E10EA416B",
"baseline_risk_score": 0.263,
"kyc_tier": "tier_2",
"session_entropy": 0.731
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "SG",
"latency_ms": 1078,
"timestamp": "2026-01-02T20:36:00Z",
"transaction_amount_usd": 53320.84
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.639,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 349921.12,
"financial_exposure_usd": 856544.9,
"recoverable_pct": 0.053
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107234",
"label": "benign",
"label_confidence": 0.558,
"severity": "medium",
"timestamp": "2026-01-06T00:34:00Z",
"trace_id": "5fc6f68f-2418-51cf-c253-9cfe6df104b0"
} | {
"account_age_days": 727,
"account_id": "ACCT-4C3700FAE6BE",
"baseline_risk_score": 0.196,
"kyc_tier": "tier_2",
"session_entropy": 0.126
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 835,
"timestamp": "2026-01-06T00:34:00Z",
"transaction_amount_usd": 7288
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.596,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2770.98,
"financial_exposure_usd": 2874.91,
"recoverable_pct": 0.527
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106880",
"label": "benign",
"label_confidence": 0.716,
"severity": "high",
"timestamp": "2026-01-05T18:40:00Z",
"trace_id": "871ca086-dc7b-c112-b9d8-dfef587895ce"
} | {
"account_age_days": 470,
"account_id": "ACCT-9638D3B51F30",
"baseline_risk_score": 0.099,
"kyc_tier": "tier_2",
"session_entropy": 0.114
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 409,
"timestamp": "2026-01-05T18:40:00Z",
"transaction_amount_usd": 6093.34
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.457,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2109.9,
"financial_exposure_usd": 2716.27,
"recoverable_pct": 0.936
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103453",
"label": "fraudulent",
"label_confidence": 0.933,
"severity": "medium",
"timestamp": "2026-01-03T09:33:00Z",
"trace_id": "2f52ca4a-c1d6-b9db-dfcf-e9c7a16791ac"
} | {
"account_age_days": 1760,
"account_id": "ACCT-525E3D0B8A05",
"baseline_risk_score": 0.374,
"kyc_tier": "tier_3",
"session_entropy": 0.475
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 740,
"timestamp": "2026-01-03T09:33:00Z",
"transaction_amount_usd": 2265687.72
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.49,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 2079257.85,
"financial_exposure_usd": 4884600.51,
"recoverable_pct": 0.622
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109150",
"label": "benign",
"label_confidence": 0.482,
"severity": "high",
"timestamp": "2026-01-07T08:30:00Z",
"trace_id": "97a2eb9d-5b93-655f-d0cf-acc033a872f0"
} | {
"account_age_days": 321,
"account_id": "ACCT-401DE605F24A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.303
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 396,
"timestamp": "2026-01-07T07:01:00Z",
"transaction_amount_usd": 9.08
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.591,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 4004.31,
"financial_exposure_usd": 4540.11,
"recoverable_pct": 0.987
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108261",
"label": "benign",
"label_confidence": 0.672,
"severity": "low",
"timestamp": "2026-01-06T17:41:00Z",
"trace_id": "e71a04bf-e607-1e5f-63ae-360e390fedf6"
} | {
"account_age_days": 1301,
"account_id": "ACCT-6CCB5C526B89",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.593
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 166,
"timestamp": "2026-01-06T17:41:00Z",
"transaction_amount_usd": 7521.74
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.583,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2682.19,
"financial_exposure_usd": 4600.96,
"recoverable_pct": 0.583
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105320",
"label": "fraudulent",
"label_confidence": 0.798,
"severity": "medium",
"timestamp": "2026-01-04T16:40:00Z",
"trace_id": "53ac55a1-eeaf-34c3-96d8-840c4726be84"
} | {
"account_age_days": 267,
"account_id": "ACCT-298E1F75B0AC",
"baseline_risk_score": 0.338,
"kyc_tier": "tier_1",
"session_entropy": 0.612
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 112,
"timestamp": "2026-01-04T13:51:00Z",
"transaction_amount_usd": 10.76
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.914,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5829131.51,
"financial_exposure_usd": 6342255.55,
"recoverable_pct": 0.495
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103003",
"label": "fraudulent",
"label_confidence": 0.828,
"severity": "medium",
"timestamp": "2026-01-03T02:03:00Z",
"trace_id": "9dae42a7-1c8f-392d-e3ce-d691d503ea60"
} | {
"account_age_days": 404,
"account_id": "ACCT-41E4F08C790D",
"baseline_risk_score": 0.334,
"kyc_tier": "tier_3",
"session_entropy": 0.641
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 106,
"timestamp": "2026-01-02T17:51:00Z",
"transaction_amount_usd": 4.25
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.421,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 653144.53,
"financial_exposure_usd": 1038000.82,
"recoverable_pct": 0.592
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107236",
"label": "benign",
"label_confidence": 0.527,
"severity": "medium",
"timestamp": "2026-01-06T00:36:00Z",
"trace_id": "433ebd19-161e-9a9c-8cf5-03a7d04deeb2"
} | {
"account_age_days": 1424,
"account_id": "ACCT-D85203401CBF",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.739
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 928,
"timestamp": "2026-01-06T00:36:00Z",
"transaction_amount_usd": 8284.2
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.735,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2580.28,
"financial_exposure_usd": 4859.69,
"recoverable_pct": 0.744
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103031",
"label": "fraudulent",
"label_confidence": 0.965,
"severity": "critical",
"timestamp": "2026-01-03T02:31:00Z",
"trace_id": "7a10eb58-6d49-123a-1e33-7310e92b8368"
} | {
"account_age_days": 759,
"account_id": "ACCT-21ACC25188EC",
"baseline_risk_score": 0.604,
"kyc_tier": "tier_3",
"session_entropy": 0.597
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 203,
"timestamp": "2026-01-03T01:49:00Z",
"transaction_amount_usd": 15.79
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.689,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 329448.36,
"financial_exposure_usd": 426314.66,
"recoverable_pct": 0.033
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102306",
"label": "fraudulent",
"label_confidence": 0.905,
"severity": "high",
"timestamp": "2026-01-02T14:26:00Z",
"trace_id": "94775528-8d0d-d87f-ae2c-8d9a4b666ff7"
} | {
"account_age_days": 1411,
"account_id": "ACCT-3F61597B5BAD",
"baseline_risk_score": 0.349,
"kyc_tier": "tier_1",
"session_entropy": 0.464
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "US",
"latency_ms": 1016,
"timestamp": "2026-01-02T14:26:00Z",
"transaction_amount_usd": 96325.99
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.484,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 404107.92,
"financial_exposure_usd": 557840.01,
"recoverable_pct": 0.85
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.