schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101386",
"label": "fraudulent",
"label_confidence": 0.788,
"severity": "critical",
"timestamp": "2026-01-01T23:06:00Z",
"trace_id": "c40ae42b-ae02-e7fe-4fbe-af2e0c4642bc"
} | {
"account_age_days": 734,
"account_id": "ACCT-B1E21D6B447C",
"baseline_risk_score": 0.632,
"kyc_tier": "tier_3",
"session_entropy": 0.772
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 179,
"timestamp": "2026-01-01T19:46:00Z",
"transaction_amount_usd": 18.59
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.633,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 649668.84,
"financial_exposure_usd": 1119912.05,
"recoverable_pct": 0.492
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102858",
"label": "fraudulent",
"label_confidence": 0.86,
"severity": "medium",
"timestamp": "2026-01-02T23:38:00Z",
"trace_id": "6db24e0a-cdce-6718-0d8e-da0fd499bae0"
} | {
"account_age_days": 331,
"account_id": "ACCT-AE7BD2042AD2",
"baseline_risk_score": 0.503,
"kyc_tier": "tier_2",
"session_entropy": 0.113
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 307,
"timestamp": "2026-01-02T17:21:00Z",
"transaction_amount_usd": 23.09
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.737,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 272160.81,
"financial_exposure_usd": 612699.2,
"recoverable_pct": 0.014
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102060",
"label": "fraudulent",
"label_confidence": 0.939,
"severity": "high",
"timestamp": "2026-01-02T10:20:00Z",
"trace_id": "599262ac-bc22-4537-20c8-e9da677a9ec2"
} | {
"account_age_days": 526,
"account_id": "ACCT-5000E8F0E15E",
"baseline_risk_score": 0.433,
"kyc_tier": "tier_2",
"session_entropy": 0.505
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 756,
"timestamp": "2026-01-02T10:20:00Z",
"transaction_amount_usd": 26163.04
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.661,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 299183.3,
"financial_exposure_usd": 356126.13,
"recoverable_pct": 0.07
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100634",
"label": "fraudulent",
"label_confidence": 0.919,
"severity": "critical",
"timestamp": "2026-01-01T10:34:00Z",
"trace_id": "c8c3e1df-d4aa-5028-a3d0-74410928f31d"
} | {
"account_age_days": 483,
"account_id": "ACCT-D120C9C56D27",
"baseline_risk_score": 0.595,
"kyc_tier": "tier_2",
"session_entropy": 0.443
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 838,
"timestamp": "2026-01-01T10:34:00Z",
"transaction_amount_usd": 105427.96
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.837,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 672187.59,
"financial_exposure_usd": 770172.41,
"recoverable_pct": 0.159
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106274",
"label": "fraudulent",
"label_confidence": 0.628,
"severity": "medium",
"timestamp": "2026-01-05T08:34:00Z",
"trace_id": "00f55f2d-17ff-05ea-8167-58aba4dc65d1"
} | {
"account_age_days": 1399,
"account_id": "ACCT-02A69AA097BA",
"baseline_risk_score": 0.445,
"kyc_tier": "tier_1",
"session_entropy": 0.681
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 297,
"timestamp": "2026-01-05T08:34:00Z",
"transaction_amount_usd": 1579671.09
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.88,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 1719093.27,
"financial_exposure_usd": 2230886.63,
"recoverable_pct": 0.87
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103801",
"label": "fraudulent",
"label_confidence": 0.641,
"severity": "high",
"timestamp": "2026-01-03T15:21:00Z",
"trace_id": "a1dfa310-e52d-4a3f-643f-005009b3ad45"
} | {
"account_age_days": 1009,
"account_id": "ACCT-4460B08F31F2",
"baseline_risk_score": 0.338,
"kyc_tier": "tier_2",
"session_entropy": 0.334
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 852,
"timestamp": "2026-01-03T15:21:00Z",
"transaction_amount_usd": 432815.49
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.575,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 863620.45,
"financial_exposure_usd": 2070493.83,
"recoverable_pct": 0.531
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100966",
"label": "fraudulent",
"label_confidence": 0.95,
"severity": "critical",
"timestamp": "2026-01-01T16:06:00Z",
"trace_id": "27e5de7f-f9cf-eef7-1de4-e85874aa931b"
} | {
"account_age_days": 531,
"account_id": "ACCT-4FEBD75E4880",
"baseline_risk_score": 0.417,
"kyc_tier": "tier_1",
"session_entropy": 0.452
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 867,
"timestamp": "2026-01-01T16:06:00Z",
"transaction_amount_usd": 101080.95
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.761,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 105713.04,
"financial_exposure_usd": 105907.4,
"recoverable_pct": 0.082
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104510",
"label": "fraudulent",
"label_confidence": 0.819,
"severity": "critical",
"timestamp": "2026-01-04T03:10:00Z",
"trace_id": "5d6e7c4a-54a1-5718-11a6-571c95c18aab"
} | {
"account_age_days": 1708,
"account_id": "ACCT-22765276BB9E",
"baseline_risk_score": 0.229,
"kyc_tier": "tier_2",
"session_entropy": 0.827
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 1187,
"timestamp": "2026-01-04T03:10:00Z",
"transaction_amount_usd": 1968262.04
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.718,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2250679.18,
"financial_exposure_usd": 4499315.04,
"recoverable_pct": 0.554
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100567",
"label": "fraudulent",
"label_confidence": 0.755,
"severity": "critical",
"timestamp": "2026-01-01T09:27:00Z",
"trace_id": "6a5e7b6d-ee07-5a69-3d83-ff769491f0b6"
} | {
"account_age_days": 1632,
"account_id": "ACCT-6EA257C20471",
"baseline_risk_score": 0.261,
"kyc_tier": "tier_2",
"session_entropy": 0.218
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 1011,
"timestamp": "2026-01-01T09:27:00Z",
"transaction_amount_usd": 86922.68
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.581,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 887954.78,
"financial_exposure_usd": 1069334.42,
"recoverable_pct": 0.272
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103386",
"label": "fraudulent",
"label_confidence": 0.704,
"severity": "high",
"timestamp": "2026-01-03T08:26:00Z",
"trace_id": "e60065dd-8185-fce0-35d9-0acdefd02ca4"
} | {
"account_age_days": 1191,
"account_id": "ACCT-57BA25EE78C8",
"baseline_risk_score": 0.212,
"kyc_tier": "tier_2",
"session_entropy": 0.109
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 108,
"timestamp": "2026-01-03T08:26:00Z",
"transaction_amount_usd": 81686.27
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.617,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1921186.43,
"financial_exposure_usd": 3930652.69,
"recoverable_pct": 0.821
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108648",
"label": "benign",
"label_confidence": 0.556,
"severity": "low",
"timestamp": "2026-01-07T00:08:00Z",
"trace_id": "ff5dce3a-19c2-d5d5-6db6-7f22fd3b105a"
} | {
"account_age_days": 601,
"account_id": "ACCT-93D36A066A81",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.795
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 932,
"timestamp": "2026-01-07T00:08:00Z",
"transaction_amount_usd": 2781.09
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.464,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1693.95,
"financial_exposure_usd": 2199.18,
"recoverable_pct": 0.952
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102765",
"label": "fraudulent",
"label_confidence": 0.759,
"severity": "high",
"timestamp": "2026-01-02T22:05:00Z",
"trace_id": "f3056f6c-2549-0b74-40d0-29300eeab12d"
} | {
"account_age_days": 1658,
"account_id": "ACCT-5F353F91D869",
"baseline_risk_score": 0.42,
"kyc_tier": "tier_1",
"session_entropy": 0.103
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 357,
"timestamp": "2026-01-02T22:05:00Z",
"transaction_amount_usd": 19784.43
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.572,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 646661.86,
"financial_exposure_usd": 774751.1,
"recoverable_pct": 0.627
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102341",
"label": "fraudulent",
"label_confidence": 0.788,
"severity": "high",
"timestamp": "2026-01-02T15:01:00Z",
"trace_id": "0628a48e-6be3-c846-536b-24e227e42a9b"
} | {
"account_age_days": 1801,
"account_id": "ACCT-6AFAB5EE09E3",
"baseline_risk_score": 0.359,
"kyc_tier": "tier_2",
"session_entropy": 0.863
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 207,
"timestamp": "2026-01-02T15:01:00Z",
"transaction_amount_usd": 6132.02
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.86,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 971359.11,
"financial_exposure_usd": 1032615.1,
"recoverable_pct": 0.104
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109748",
"label": "benign",
"label_confidence": 0.535,
"severity": "high",
"timestamp": "2026-01-07T18:28:00Z",
"trace_id": "88ce9fcb-90de-9c18-3747-add6851a16f9"
} | {
"account_age_days": 998,
"account_id": "ACCT-3995E4DA68D2",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.177
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 1041,
"timestamp": "2026-01-07T18:28:00Z",
"transaction_amount_usd": 13590.48
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.586,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 5520.88,
"financial_exposure_usd": 6581.4,
"recoverable_pct": 0.875
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100904",
"label": "fraudulent",
"label_confidence": 0.937,
"severity": "high",
"timestamp": "2026-01-01T15:04:00Z",
"trace_id": "9ef2f1c8-380f-6624-5d24-ebb332459db3"
} | {
"account_age_days": 1545,
"account_id": "ACCT-A894644668CD",
"baseline_risk_score": 0.31,
"kyc_tier": "tier_2",
"session_entropy": 0.87
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 933,
"timestamp": "2026-01-01T15:04:00Z",
"transaction_amount_usd": 20077.29
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.373,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 745487.58,
"financial_exposure_usd": 989097.83,
"recoverable_pct": 0.806
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109872",
"label": "benign",
"label_confidence": 0.69,
"severity": "medium",
"timestamp": "2026-01-07T20:32:00Z",
"trace_id": "b68c044e-a0dc-18ba-3379-bafb0d1e351b"
} | {
"account_age_days": 1671,
"account_id": "ACCT-CB93587A89AC",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.841
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 830,
"timestamp": "2026-01-07T20:32:00Z",
"transaction_amount_usd": 8422.86
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.458,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 943.36,
"financial_exposure_usd": 959.64,
"recoverable_pct": 0.647
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108191",
"label": "benign",
"label_confidence": 0.657,
"severity": "high",
"timestamp": "2026-01-06T16:31:00Z",
"trace_id": "12490800-f593-e4ea-aba2-76fa12e95be5"
} | {
"account_age_days": 1449,
"account_id": "ACCT-7AF0D8F165BA",
"baseline_risk_score": 0.17,
"kyc_tier": "tier_1",
"session_entropy": 0.395
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 146,
"timestamp": "2026-01-06T05:15:00Z",
"transaction_amount_usd": 15.17
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.794,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 332.24,
"financial_exposure_usd": 633.79,
"recoverable_pct": 0.646
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102605",
"label": "fraudulent",
"label_confidence": 0.874,
"severity": "critical",
"timestamp": "2026-01-02T19:25:00Z",
"trace_id": "7d981bd9-b162-901e-3a94-0600b5c99e59"
} | {
"account_age_days": 389,
"account_id": "ACCT-1E70579F1B12",
"baseline_risk_score": 0.256,
"kyc_tier": "tier_1",
"session_entropy": 0.941
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 282,
"timestamp": "2026-01-02T19:25:00Z",
"transaction_amount_usd": 108727.81
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.457,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 126987.86,
"financial_exposure_usd": 275285.43,
"recoverable_pct": 0.649
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104525",
"label": "fraudulent",
"label_confidence": 0.771,
"severity": "medium",
"timestamp": "2026-01-04T03:25:00Z",
"trace_id": "f1dbb842-d77e-4122-dba8-81ce7ad68486"
} | {
"account_age_days": 291,
"account_id": "ACCT-15C883FB6AA5",
"baseline_risk_score": 0.415,
"kyc_tier": "tier_1",
"session_entropy": 0.404
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 723,
"timestamp": "2026-01-04T03:25:00Z",
"transaction_amount_usd": 1003878.65
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.756,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 996892.43,
"financial_exposure_usd": 1797225.95,
"recoverable_pct": 0.571
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100253",
"label": "fraudulent",
"label_confidence": 0.797,
"severity": "medium",
"timestamp": "2026-01-01T04:13:00Z",
"trace_id": "de4b2801-38be-318f-96d0-d89df2314c7d"
} | {
"account_age_days": 442,
"account_id": "ACCT-5DB964902C6B",
"baseline_risk_score": 0.581,
"kyc_tier": "tier_2",
"session_entropy": 0.626
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "DE",
"latency_ms": 1113,
"timestamp": "2026-01-01T04:13:00Z",
"transaction_amount_usd": 73148.54
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.787,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 176664.7,
"financial_exposure_usd": 325415.69,
"recoverable_pct": 0.362
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106869",
"label": "benign",
"label_confidence": 0.75,
"severity": "medium",
"timestamp": "2026-01-05T18:29:00Z",
"trace_id": "4e7e0b1a-9969-2d3f-832a-aa5ed135d3d6"
} | {
"account_age_days": 1936,
"account_id": "ACCT-87B9EA3D266F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.546
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 525,
"timestamp": "2026-01-05T18:29:00Z",
"transaction_amount_usd": 1237.39
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.579,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 866.97,
"financial_exposure_usd": 1664.76,
"recoverable_pct": 0.611
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106105",
"label": "fraudulent",
"label_confidence": 0.909,
"severity": "low",
"timestamp": "2026-01-05T05:45:00Z",
"trace_id": "ec467e6e-0072-438e-8564-6d7e37b80e6a"
} | {
"account_age_days": 1551,
"account_id": "ACCT-E070A7A46433",
"baseline_risk_score": 0.388,
"kyc_tier": "tier_1",
"session_entropy": 0.122
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 628,
"timestamp": "2026-01-05T05:45:00Z",
"transaction_amount_usd": 2075196.07
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.586,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3181625.69,
"financial_exposure_usd": 6493355.59,
"recoverable_pct": 0.714
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101373",
"label": "fraudulent",
"label_confidence": 0.768,
"severity": "high",
"timestamp": "2026-01-01T22:53:00Z",
"trace_id": "82c0be26-1667-63d4-a12c-c50c3914e7e6"
} | {
"account_age_days": 1585,
"account_id": "ACCT-01C5E090F2B5",
"baseline_risk_score": 0.346,
"kyc_tier": "tier_1",
"session_entropy": 0.727
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "BR",
"latency_ms": 1045,
"timestamp": "2026-01-01T22:53:00Z",
"transaction_amount_usd": 31008.46
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.428,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 763239.03,
"financial_exposure_usd": 896281.07,
"recoverable_pct": 0.662
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105913",
"label": "fraudulent",
"label_confidence": 0.674,
"severity": "high",
"timestamp": "2026-01-05T02:33:00Z",
"trace_id": "9a7b0e61-4991-fba3-310b-5252dccc88e8"
} | {
"account_age_days": 352,
"account_id": "ACCT-0549C5540505",
"baseline_risk_score": 0.07,
"kyc_tier": "tier_3",
"session_entropy": 0.191
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 1186,
"timestamp": "2026-01-05T02:33:00Z",
"transaction_amount_usd": 2000631.2
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.558,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4348078.74,
"financial_exposure_usd": 5175156.64,
"recoverable_pct": 0.874
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107308",
"label": "benign",
"label_confidence": 0.503,
"severity": "medium",
"timestamp": "2026-01-06T01:48:00Z",
"trace_id": "c84ad433-ad55-17c7-b12a-e081fe9b6741"
} | {
"account_age_days": 1269,
"account_id": "ACCT-9F8CA3556B35",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.673
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 243,
"timestamp": "2026-01-06T01:48:00Z",
"transaction_amount_usd": 13646.59
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.623,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2023.45,
"financial_exposure_usd": 4314.34,
"recoverable_pct": 0.682
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102122",
"label": "fraudulent",
"label_confidence": 0.842,
"severity": "critical",
"timestamp": "2026-01-02T11:22:00Z",
"trace_id": "e80bd269-6301-7663-b833-e32fe41553f8"
} | {
"account_age_days": 989,
"account_id": "ACCT-3024AB7E4CCC",
"baseline_risk_score": 0.274,
"kyc_tier": "tier_1",
"session_entropy": 0.433
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 170,
"timestamp": "2026-01-02T11:22:00Z",
"transaction_amount_usd": 18686.73
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.74,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 398142.43,
"financial_exposure_usd": 509768.72,
"recoverable_pct": 0.586
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102802",
"label": "fraudulent",
"label_confidence": 0.88,
"severity": "critical",
"timestamp": "2026-01-02T22:42:00Z",
"trace_id": "14df7bc6-8871-b594-0a65-176d74594d7a"
} | {
"account_age_days": 1394,
"account_id": "ACCT-C8AF5215689D",
"baseline_risk_score": 0.253,
"kyc_tier": "tier_1",
"session_entropy": 0.848
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 125,
"timestamp": "2026-01-02T17:01:00Z",
"transaction_amount_usd": 13.84
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.426,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 289447.77,
"financial_exposure_usd": 459142.55,
"recoverable_pct": 0.051
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100283",
"label": "fraudulent",
"label_confidence": 0.816,
"severity": "high",
"timestamp": "2026-01-01T04:43:00Z",
"trace_id": "af0caa3c-122f-862e-c495-6e6a21cc0211"
} | {
"account_age_days": 906,
"account_id": "ACCT-4CEDC55B4136",
"baseline_risk_score": 0.371,
"kyc_tier": "tier_2",
"session_entropy": 0.658
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 231,
"timestamp": "2026-01-01T04:43:00Z",
"transaction_amount_usd": 118884.87
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.938,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 425710.28,
"financial_exposure_usd": 558092.28,
"recoverable_pct": 0.16
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104931",
"label": "fraudulent",
"label_confidence": 0.926,
"severity": "high",
"timestamp": "2026-01-04T10:11:00Z",
"trace_id": "ee5bdd44-0858-f05b-efe6-b32c6590d48b"
} | {
"account_age_days": 907,
"account_id": "ACCT-747038B6346D",
"baseline_risk_score": 0.275,
"kyc_tier": "tier_3",
"session_entropy": 0.346
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 788,
"timestamp": "2026-01-04T10:11:00Z",
"transaction_amount_usd": 2979060.38
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.877,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2481602.7,
"financial_exposure_usd": 4214190.08,
"recoverable_pct": 0.565
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106576",
"label": "fraudulent",
"label_confidence": 0.831,
"severity": "high",
"timestamp": "2026-01-05T13:36:00Z",
"trace_id": "224dfb6a-5288-1208-1cbb-93e9176860a2"
} | {
"account_age_days": 1431,
"account_id": "ACCT-800E737CA11B",
"baseline_risk_score": 0.438,
"kyc_tier": "tier_2",
"session_entropy": 0.852
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 647,
"timestamp": "2026-01-05T13:36:00Z",
"transaction_amount_usd": 1526764.06
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.494,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 5897168.79,
"financial_exposure_usd": 6217852.77,
"recoverable_pct": 0.627
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106586",
"label": "fraudulent",
"label_confidence": 0.929,
"severity": "high",
"timestamp": "2026-01-05T13:46:00Z",
"trace_id": "da0a062e-06bb-d38a-1464-e8ed5513648c"
} | {
"account_age_days": 307,
"account_id": "ACCT-51B0103C6032",
"baseline_risk_score": 0.415,
"kyc_tier": "tier_2",
"session_entropy": 0.799
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 276,
"timestamp": "2026-01-05T02:01:00Z",
"transaction_amount_usd": 13.33
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.467,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 9",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3788188.23,
"financial_exposure_usd": 4030506.94,
"recoverable_pct": 0.508
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102304",
"label": "fraudulent",
"label_confidence": 0.791,
"severity": "critical",
"timestamp": "2026-01-02T14:24:00Z",
"trace_id": "4ba45648-d728-dc89-bbb0-96a0680aa47a"
} | {
"account_age_days": 1886,
"account_id": "ACCT-A8F659209991",
"baseline_risk_score": 0.256,
"kyc_tier": "tier_1",
"session_entropy": 0.857
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 794,
"timestamp": "2026-01-02T14:24:00Z",
"transaction_amount_usd": 15066.98
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.363,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 294824.2,
"financial_exposure_usd": 335234.49,
"recoverable_pct": 0.056
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104822",
"label": "fraudulent",
"label_confidence": 0.895,
"severity": "high",
"timestamp": "2026-01-04T08:22:00Z",
"trace_id": "ca209aa2-090b-0a85-642f-f09a1a12bd55"
} | {
"account_age_days": 684,
"account_id": "ACCT-F765C928D6F3",
"baseline_risk_score": 0.097,
"kyc_tier": "tier_1",
"session_entropy": 0.53
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 153,
"timestamp": "2026-01-04T03:52:00Z",
"transaction_amount_usd": 11.85
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.728,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4208200.73,
"financial_exposure_usd": 6272002.38,
"recoverable_pct": 0.784
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104353",
"label": "fraudulent",
"label_confidence": 0.811,
"severity": "high",
"timestamp": "2026-01-04T00:33:00Z",
"trace_id": "41fba597-0130-4b6a-5c07-00d1238e14f5"
} | {
"account_age_days": 225,
"account_id": "ACCT-7AF20E03A142",
"baseline_risk_score": 0.208,
"kyc_tier": "tier_2",
"session_entropy": 0.759
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 1050,
"timestamp": "2026-01-04T00:33:00Z",
"transaction_amount_usd": 697936.61
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.398,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5433420.87,
"financial_exposure_usd": 5879947.99,
"recoverable_pct": 0.501
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101572",
"label": "fraudulent",
"label_confidence": 0.978,
"severity": "critical",
"timestamp": "2026-01-02T02:12:00Z",
"trace_id": "e0e361a4-4004-b2c2-21f2-8f588f71831f"
} | {
"account_age_days": 1819,
"account_id": "ACCT-04ED2E2312BD",
"baseline_risk_score": 0.269,
"kyc_tier": "tier_3",
"session_entropy": 0.779
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 631,
"timestamp": "2026-01-02T02:12:00Z",
"transaction_amount_usd": 71284.07
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.843,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 284884.92,
"financial_exposure_usd": 490001.13,
"recoverable_pct": 0.422
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100559",
"label": "fraudulent",
"label_confidence": 0.847,
"severity": "high",
"timestamp": "2026-01-01T09:19:00Z",
"trace_id": "dc4a7ef6-959f-eb91-123b-e95be6f148b6"
} | {
"account_age_days": 789,
"account_id": "ACCT-874C5653CCC6",
"baseline_risk_score": 0.41,
"kyc_tier": "tier_2",
"session_entropy": 0.362
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 158,
"timestamp": "2026-01-01T03:10:00Z",
"transaction_amount_usd": 12.1
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.522,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 619465.41,
"financial_exposure_usd": 768188.69,
"recoverable_pct": 0.211
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106847",
"label": "benign",
"label_confidence": 0.511,
"severity": "low",
"timestamp": "2026-01-05T18:07:00Z",
"trace_id": "feabad0b-65b9-19f0-eada-65fb5e8839c2"
} | {
"account_age_days": 304,
"account_id": "ACCT-19A49B596785",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.172
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 946,
"timestamp": "2026-01-05T18:07:00Z",
"transaction_amount_usd": 4866.39
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.786,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2290.25,
"financial_exposure_usd": 2391.96,
"recoverable_pct": 0.901
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105418",
"label": "fraudulent",
"label_confidence": 0.734,
"severity": "medium",
"timestamp": "2026-01-04T18:18:00Z",
"trace_id": "a6829e38-b01d-3f89-2927-b84f722a00b3"
} | {
"account_age_days": 218,
"account_id": "ACCT-34C9AC73AB33",
"baseline_risk_score": 0.074,
"kyc_tier": "tier_3",
"session_entropy": 0.407
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 689,
"timestamp": "2026-01-04T18:18:00Z",
"transaction_amount_usd": 1163201.04
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.383,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3913569.06,
"financial_exposure_usd": 5323198.93,
"recoverable_pct": 0.51
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102506",
"label": "fraudulent",
"label_confidence": 0.87,
"severity": "medium",
"timestamp": "2026-01-02T17:46:00Z",
"trace_id": "da8ce671-81af-42db-b034-848cc2ee81bc"
} | {
"account_age_days": 1504,
"account_id": "ACCT-F248EC2CFD19",
"baseline_risk_score": 0.483,
"kyc_tier": "tier_2",
"session_entropy": 0.266
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 514,
"timestamp": "2026-01-02T17:46:00Z",
"transaction_amount_usd": 71358.33
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.466,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 766520.02,
"financial_exposure_usd": 967624.57,
"recoverable_pct": 0.787
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105121",
"label": "fraudulent",
"label_confidence": 0.654,
"severity": "high",
"timestamp": "2026-01-04T13:21:00Z",
"trace_id": "50a8c539-c9f0-f5b2-035e-ba6ed8012bfa"
} | {
"account_age_days": 1723,
"account_id": "ACCT-0371AA26467D",
"baseline_risk_score": 0.071,
"kyc_tier": "tier_3",
"session_entropy": 0.758
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 533,
"timestamp": "2026-01-04T13:21:00Z",
"transaction_amount_usd": 1714315.82
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.671,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 6978491.09,
"financial_exposure_usd": 7281813.08,
"recoverable_pct": 0.98
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102839",
"label": "fraudulent",
"label_confidence": 0.922,
"severity": "high",
"timestamp": "2026-01-02T23:19:00Z",
"trace_id": "0fa1ee63-fe4a-0bf3-b434-65a456246252"
} | {
"account_age_days": 128,
"account_id": "ACCT-D8519895A4DC",
"baseline_risk_score": 0.56,
"kyc_tier": "tier_2",
"session_entropy": 0.676
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 867,
"timestamp": "2026-01-02T23:19:00Z",
"transaction_amount_usd": 70596.7
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.516,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 373523.89,
"financial_exposure_usd": 560625.2,
"recoverable_pct": 0.001
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103147",
"label": "fraudulent",
"label_confidence": 0.893,
"severity": "high",
"timestamp": "2026-01-03T04:27:00Z",
"trace_id": "b3c3c89f-2c8e-faed-3db9-be749d0b98c9"
} | {
"account_age_days": 863,
"account_id": "ACCT-F017B68AC073",
"baseline_risk_score": 0.313,
"kyc_tier": "tier_1",
"session_entropy": 0.721
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 590,
"timestamp": "2026-01-03T04:27:00Z",
"transaction_amount_usd": 71396.46
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.529,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 683404.96,
"financial_exposure_usd": 970507.24,
"recoverable_pct": 0.151
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108732",
"label": "benign",
"label_confidence": 0.672,
"severity": "medium",
"timestamp": "2026-01-07T01:32:00Z",
"trace_id": "4a421ac6-518d-6e01-195b-526bdd0c601c"
} | {
"account_age_days": 864,
"account_id": "ACCT-D88E6298F643",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.742
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 728,
"timestamp": "2026-01-07T01:32:00Z",
"transaction_amount_usd": 5570.02
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.531,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3702.16,
"financial_exposure_usd": 5763.77,
"recoverable_pct": 0.778
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105595",
"label": "fraudulent",
"label_confidence": 0.853,
"severity": "high",
"timestamp": "2026-01-04T21:15:00Z",
"trace_id": "e9815ee1-4ce4-c82f-36a6-8b153f752524"
} | {
"account_age_days": 1676,
"account_id": "ACCT-A61729F0E4F0",
"baseline_risk_score": 0.154,
"kyc_tier": "tier_2",
"session_entropy": 0.531
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 918,
"timestamp": "2026-01-04T21:15:00Z",
"transaction_amount_usd": 1352115.6
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.871,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3343803.39,
"financial_exposure_usd": 4812478.03,
"recoverable_pct": 0.444
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104534",
"label": "fraudulent",
"label_confidence": 0.709,
"severity": "high",
"timestamp": "2026-01-04T03:34:00Z",
"trace_id": "bf17af40-e47b-6f49-b06e-892b91d9de0f"
} | {
"account_age_days": 832,
"account_id": "ACCT-C3156A047C31",
"baseline_risk_score": 0.169,
"kyc_tier": "tier_3",
"session_entropy": 0.652
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 80,
"timestamp": "2026-01-04T03:34:00Z",
"transaction_amount_usd": 638693.37
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.716,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3359474.12,
"financial_exposure_usd": 5835070.68,
"recoverable_pct": 0.499
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109543",
"label": "benign",
"label_confidence": 0.532,
"severity": "low",
"timestamp": "2026-01-07T15:03:00Z",
"trace_id": "2e10c869-9ba5-f44e-8e8f-99283e1a0351"
} | {
"account_age_days": 714,
"account_id": "ACCT-E570F0477B79",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.165
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 403,
"timestamp": "2026-01-07T15:03:00Z",
"transaction_amount_usd": 7820.27
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.652,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 692.47,
"financial_exposure_usd": 1656.89,
"recoverable_pct": 0.853
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102145",
"label": "fraudulent",
"label_confidence": 0.921,
"severity": "high",
"timestamp": "2026-01-02T11:45:00Z",
"trace_id": "a272648e-8db0-1a47-43ec-d153d70699fb"
} | {
"account_age_days": 600,
"account_id": "ACCT-A8BBAD159154",
"baseline_risk_score": 0.314,
"kyc_tier": "tier_1",
"session_entropy": 0.772
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 488,
"timestamp": "2026-01-02T11:45:00Z",
"transaction_amount_usd": 33042.64
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.454,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 528718.09,
"financial_exposure_usd": 605223.05,
"recoverable_pct": 0.761
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101401",
"label": "fraudulent",
"label_confidence": 0.874,
"severity": "high",
"timestamp": "2026-01-01T23:21:00Z",
"trace_id": "a3a0ae3e-f8f8-d2dc-8452-0f04d8ec00dd"
} | {
"account_age_days": 1071,
"account_id": "ACCT-E8693F3AE98D",
"baseline_risk_score": 0.509,
"kyc_tier": "tier_3",
"session_entropy": 0.473
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "US",
"latency_ms": 965,
"timestamp": "2026-01-01T23:21:00Z",
"transaction_amount_usd": 29914.27
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.45,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 324584.95,
"financial_exposure_usd": 528844.5,
"recoverable_pct": 0.569
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103521",
"label": "fraudulent",
"label_confidence": 0.819,
"severity": "medium",
"timestamp": "2026-01-03T10:41:00Z",
"trace_id": "1b159de6-730f-413d-8e2c-60c134f3157f"
} | {
"account_age_days": 421,
"account_id": "ACCT-8387F8B39D04",
"baseline_risk_score": 0.192,
"kyc_tier": "tier_1",
"session_entropy": 0.58
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 683,
"timestamp": "2026-01-03T10:41:00Z",
"transaction_amount_usd": 2054834.67
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.671,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2415977.5,
"financial_exposure_usd": 3775130.76,
"recoverable_pct": 0.413
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106093",
"label": "fraudulent",
"label_confidence": 0.871,
"severity": "high",
"timestamp": "2026-01-05T05:33:00Z",
"trace_id": "001f0c46-65ed-6c24-7427-df760b9d4afc"
} | {
"account_age_days": 1721,
"account_id": "ACCT-E7932B312B2B",
"baseline_risk_score": 0.226,
"kyc_tier": "tier_2",
"session_entropy": 0.522
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 479,
"timestamp": "2026-01-05T05:33:00Z",
"transaction_amount_usd": 1169336.77
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.795,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 6446243.62,
"financial_exposure_usd": 7010803.25,
"recoverable_pct": 0.415
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106116",
"label": "fraudulent",
"label_confidence": 0.807,
"severity": "medium",
"timestamp": "2026-01-05T05:56:00Z",
"trace_id": "ae742902-d3d2-f5f6-3b3a-c84f3b279de9"
} | {
"account_age_days": 284,
"account_id": "ACCT-058E101BC196",
"baseline_risk_score": 0.129,
"kyc_tier": "tier_3",
"session_entropy": 0.351
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 1014,
"timestamp": "2026-01-05T05:56:00Z",
"transaction_amount_usd": 424384.31
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.448,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2224014.46,
"financial_exposure_usd": 3795054.1,
"recoverable_pct": 0.517
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109631",
"label": "benign",
"label_confidence": 0.623,
"severity": "medium",
"timestamp": "2026-01-07T16:31:00Z",
"trace_id": "608f0c7e-77e8-1654-a125-f23bd263616b"
} | {
"account_age_days": 31,
"account_id": "ACCT-3093F46663F1",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.825
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 314,
"timestamp": "2026-01-07T07:15:00Z",
"transaction_amount_usd": 0.49
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.571,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1816.25,
"financial_exposure_usd": 4203.25,
"recoverable_pct": 0.671
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100726",
"label": "fraudulent",
"label_confidence": 0.759,
"severity": "high",
"timestamp": "2026-01-01T12:06:00Z",
"trace_id": "74ca3720-6f4e-0e9f-06a8-94f5d2a5656b"
} | {
"account_age_days": 630,
"account_id": "ACCT-EC3ABE85CD36",
"baseline_risk_score": 0.328,
"kyc_tier": "tier_2",
"session_entropy": 0.284
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "DE",
"latency_ms": 881,
"timestamp": "2026-01-01T12:06:00Z",
"transaction_amount_usd": 117029.63
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.833,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 975054.52,
"financial_exposure_usd": 1119001.12,
"recoverable_pct": 0.744
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109337",
"label": "benign",
"label_confidence": 0.547,
"severity": "medium",
"timestamp": "2026-01-07T11:37:00Z",
"trace_id": "ee922776-0b70-6442-f43f-f3ecc64c1110"
} | {
"account_age_days": 220,
"account_id": "ACCT-717BCAD089EB",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.758
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 507,
"timestamp": "2026-01-07T11:37:00Z",
"transaction_amount_usd": 7813.31
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.66,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 4992.07,
"financial_exposure_usd": 9051.26,
"recoverable_pct": 0.787
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102137",
"label": "fraudulent",
"label_confidence": 0.874,
"severity": "low",
"timestamp": "2026-01-02T11:37:00Z",
"trace_id": "1078decd-266c-d7dd-6c5c-c90ee107c813"
} | {
"account_age_days": 1149,
"account_id": "ACCT-C1BA9A2A198D",
"baseline_risk_score": 0.551,
"kyc_tier": "tier_1",
"session_entropy": 0.454
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 613,
"timestamp": "2026-01-02T11:37:00Z",
"transaction_amount_usd": 113001.74
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.668,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 654178.32,
"financial_exposure_usd": 1470662.28,
"recoverable_pct": 0.576
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100988",
"label": "fraudulent",
"label_confidence": 0.763,
"severity": "medium",
"timestamp": "2026-01-01T16:28:00Z",
"trace_id": "a8c3e7fe-b69f-ed2a-f258-fad71c2a7b24"
} | {
"account_age_days": 1268,
"account_id": "ACCT-2EC91233B091",
"baseline_risk_score": 0.521,
"kyc_tier": "tier_3",
"session_entropy": 0.361
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "HK",
"latency_ms": 774,
"timestamp": "2026-01-01T16:28:00Z",
"transaction_amount_usd": 31020.16
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.568,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 300174.64,
"financial_exposure_usd": 685157.58,
"recoverable_pct": 0.716
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100650",
"label": "fraudulent",
"label_confidence": 0.758,
"severity": "critical",
"timestamp": "2026-01-01T10:50:00Z",
"trace_id": "7695d80a-fe75-3307-0e09-7a609b6b0003"
} | {
"account_age_days": 77,
"account_id": "ACCT-48E4EC7A1351",
"baseline_risk_score": 0.505,
"kyc_tier": "tier_3",
"session_entropy": 0.614
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 130,
"timestamp": "2026-01-01T07:25:00Z",
"transaction_amount_usd": 1.09
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.354,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 407147.51,
"financial_exposure_usd": 618940.42,
"recoverable_pct": 0.302
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101009",
"label": "fraudulent",
"label_confidence": 0.937,
"severity": "critical",
"timestamp": "2026-01-01T16:49:00Z",
"trace_id": "695e15d8-a5aa-338b-d3b7-875bf6c0efba"
} | {
"account_age_days": 1069,
"account_id": "ACCT-280BA7ECBBF0",
"baseline_risk_score": 0.609,
"kyc_tier": "tier_3",
"session_entropy": 0.832
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 576,
"timestamp": "2026-01-01T16:49:00Z",
"transaction_amount_usd": 47377.48
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.469,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 220339.09,
"financial_exposure_usd": 530511.26,
"recoverable_pct": 0.56
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106848",
"label": "benign",
"label_confidence": 0.566,
"severity": "low",
"timestamp": "2026-01-05T18:08:00Z",
"trace_id": "433ea74b-06a6-8227-a1d7-4f1014e2b039"
} | {
"account_age_days": 300,
"account_id": "ACCT-B6906C19AA36",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.411
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 255,
"timestamp": "2026-01-05T18:08:00Z",
"transaction_amount_usd": 990.22
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.556,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 796.13,
"financial_exposure_usd": 1596.35,
"recoverable_pct": 0.702
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103016",
"label": "fraudulent",
"label_confidence": 0.773,
"severity": "high",
"timestamp": "2026-01-03T02:16:00Z",
"trace_id": "8c51e4e8-f8e9-53b8-a242-d6e168442a54"
} | {
"account_age_days": 1615,
"account_id": "ACCT-A9CFDD0EB82C",
"baseline_risk_score": 0.259,
"kyc_tier": "tier_1",
"session_entropy": 0.789
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 342,
"timestamp": "2026-01-03T02:16:00Z",
"transaction_amount_usd": 98688.78
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.698,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 408489.86,
"financial_exposure_usd": 988390.04,
"recoverable_pct": 0.136
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109267",
"label": "benign",
"label_confidence": 0.492,
"severity": "low",
"timestamp": "2026-01-07T10:27:00Z",
"trace_id": "f7b1d7cb-8125-3913-fff5-35b2a1d27f3c"
} | {
"account_age_days": 1001,
"account_id": "ACCT-65BF3A44C8C5",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.414
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 142,
"timestamp": "2026-01-07T03:41:00Z",
"transaction_amount_usd": 2.46
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.526,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 509.65,
"financial_exposure_usd": 950.18,
"recoverable_pct": 0.772
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108068",
"label": "benign",
"label_confidence": 0.554,
"severity": "high",
"timestamp": "2026-01-06T14:28:00Z",
"trace_id": "06bbe5c7-3165-9f2f-b265-7a688f68172a"
} | {
"account_age_days": 1138,
"account_id": "ACCT-BAA5438CCF66",
"baseline_risk_score": 0.097,
"kyc_tier": "tier_1",
"session_entropy": 0.286
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 468,
"timestamp": "2026-01-06T14:28:00Z",
"transaction_amount_usd": 3970.93
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.633,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 801.41,
"financial_exposure_usd": 862.6,
"recoverable_pct": 0.478
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107444",
"label": "benign",
"label_confidence": 0.575,
"severity": "high",
"timestamp": "2026-01-06T04:04:00Z",
"trace_id": "d7f96fa4-e287-5108-6e1e-dd5f1dde1c95"
} | {
"account_age_days": 1372,
"account_id": "ACCT-07159848F8FF",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.367
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 1046,
"timestamp": "2026-01-06T04:04:00Z",
"transaction_amount_usd": 12846.98
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.553,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1354.96,
"financial_exposure_usd": 2936.93,
"recoverable_pct": 0.978
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106056",
"label": "fraudulent",
"label_confidence": 0.846,
"severity": "medium",
"timestamp": "2026-01-05T04:56:00Z",
"trace_id": "77639eba-4706-611f-7347-41e8faf19758"
} | {
"account_age_days": 297,
"account_id": "ACCT-3744231F1F6A",
"baseline_risk_score": 0.384,
"kyc_tier": "tier_1",
"session_entropy": 0.722
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 369,
"timestamp": "2026-01-05T04:56:00Z",
"transaction_amount_usd": 2038661.49
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.914,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4853422.51,
"financial_exposure_usd": 6747739.43,
"recoverable_pct": 0.985
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101613",
"label": "fraudulent",
"label_confidence": 0.879,
"severity": "critical",
"timestamp": "2026-01-02T02:53:00Z",
"trace_id": "d149f273-62f6-105e-3ac0-b53a99c5eb1b"
} | {
"account_age_days": 1391,
"account_id": "ACCT-7E04EC0ED993",
"baseline_risk_score": 0.295,
"kyc_tier": "tier_3",
"session_entropy": 0.573
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 243,
"timestamp": "2026-01-01T23:47:00Z",
"transaction_amount_usd": 8.74
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.549,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 293126.2,
"financial_exposure_usd": 729168.5,
"recoverable_pct": 0.554
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100782",
"label": "fraudulent",
"label_confidence": 0.772,
"severity": "critical",
"timestamp": "2026-01-01T13:02:00Z",
"trace_id": "0ae985ca-c5f8-bce7-b68b-a6b6f301b46d"
} | {
"account_age_days": 1622,
"account_id": "ACCT-444BA860EE9D",
"baseline_risk_score": 0.531,
"kyc_tier": "tier_3",
"session_entropy": 0.504
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 849,
"timestamp": "2026-01-01T13:02:00Z",
"transaction_amount_usd": 75996.9
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.78,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 223275.68,
"financial_exposure_usd": 312024.16,
"recoverable_pct": 0.435
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100979",
"label": "fraudulent",
"label_confidence": 0.944,
"severity": "medium",
"timestamp": "2026-01-01T16:19:00Z",
"trace_id": "231bb7d0-7c1a-53d1-030c-b0a726a94d9e"
} | {
"account_age_days": 998,
"account_id": "ACCT-51580BD35EF9",
"baseline_risk_score": 0.501,
"kyc_tier": "tier_1",
"session_entropy": 0.658
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 177,
"timestamp": "2026-01-01T16:19:00Z",
"transaction_amount_usd": 38460.82
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.423,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 574038.96,
"financial_exposure_usd": 890631,
"recoverable_pct": 0.002
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107330",
"label": "benign",
"label_confidence": 0.694,
"severity": "low",
"timestamp": "2026-01-06T02:10:00Z",
"trace_id": "14b6d474-45e2-14cf-b885-51a03a893bbd"
} | {
"account_age_days": 1387,
"account_id": "ACCT-E41A56BDA401",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.348
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 1084,
"timestamp": "2026-01-06T02:10:00Z",
"transaction_amount_usd": 1121.86
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.701,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3506.86,
"financial_exposure_usd": 7960.51,
"recoverable_pct": 0.974
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102237",
"label": "fraudulent",
"label_confidence": 0.907,
"severity": "high",
"timestamp": "2026-01-02T13:17:00Z",
"trace_id": "8713d0e7-d259-585f-c867-e71e4b5a5ee9"
} | {
"account_age_days": 1390,
"account_id": "ACCT-4AB8382D26F8",
"baseline_risk_score": 0.363,
"kyc_tier": "tier_2",
"session_entropy": 0.823
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 458,
"timestamp": "2026-01-02T13:17:00Z",
"transaction_amount_usd": 3996.16
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.379,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 954942.38,
"financial_exposure_usd": 984404.48,
"recoverable_pct": 0.017
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103230",
"label": "fraudulent",
"label_confidence": 0.926,
"severity": "high",
"timestamp": "2026-01-03T05:50:00Z",
"trace_id": "d8f7cf63-cabe-5a0e-60c6-32fdd1f10cba"
} | {
"account_age_days": 353,
"account_id": "ACCT-717150197F2A",
"baseline_risk_score": 0.4,
"kyc_tier": "tier_1",
"session_entropy": 0.554
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 1166,
"timestamp": "2026-01-03T05:50:00Z",
"transaction_amount_usd": 75101.03
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.796,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 197762.36,
"financial_exposure_usd": 256504.82,
"recoverable_pct": 0.733
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102614",
"label": "fraudulent",
"label_confidence": 0.788,
"severity": "critical",
"timestamp": "2026-01-02T19:34:00Z",
"trace_id": "93915dc5-b7ed-1092-e14a-db69fde99fb8"
} | {
"account_age_days": 1311,
"account_id": "ACCT-8AD6AD28F3B6",
"baseline_risk_score": 0.351,
"kyc_tier": "tier_1",
"session_entropy": 0.441
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "US",
"latency_ms": 524,
"timestamp": "2026-01-02T19:34:00Z",
"transaction_amount_usd": 2335.42
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.492,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 677914.61,
"financial_exposure_usd": 754996.18,
"recoverable_pct": 0.324
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101081",
"label": "fraudulent",
"label_confidence": 0.933,
"severity": "critical",
"timestamp": "2026-01-01T18:01:00Z",
"trace_id": "a5e6d983-6053-c8ba-c981-58d30f61b5b9"
} | {
"account_age_days": 1217,
"account_id": "ACCT-26F9A22141FD",
"baseline_risk_score": 0.403,
"kyc_tier": "tier_3",
"session_entropy": 0.594
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 1084,
"timestamp": "2026-01-01T18:01:00Z",
"transaction_amount_usd": 87108.11
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.937,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 329729.01,
"financial_exposure_usd": 369781.51,
"recoverable_pct": 0.502
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107043",
"label": "benign",
"label_confidence": 0.679,
"severity": "low",
"timestamp": "2026-01-05T21:23:00Z",
"trace_id": "b7472d12-0aa8-45cf-0199-8c883a3dc20d"
} | {
"account_age_days": 1583,
"account_id": "ACCT-F93637860EB4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.784
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 617,
"timestamp": "2026-01-05T21:23:00Z",
"transaction_amount_usd": 1034.02
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.636,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 5643.49,
"financial_exposure_usd": 6137.75,
"recoverable_pct": 0.533
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108096",
"label": "benign",
"label_confidence": 0.488,
"severity": "low",
"timestamp": "2026-01-06T14:56:00Z",
"trace_id": "f5f98828-49cb-0d90-6925-294378d3ca4e"
} | {
"account_age_days": 607,
"account_id": "ACCT-F09EDBB89C4E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.515
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 192,
"timestamp": "2026-01-06T14:56:00Z",
"transaction_amount_usd": 7536.21
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.753,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 243.03,
"financial_exposure_usd": 338.38,
"recoverable_pct": 0.435
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100671",
"label": "fraudulent",
"label_confidence": 0.876,
"severity": "high",
"timestamp": "2026-01-01T11:11:00Z",
"trace_id": "b01c040a-72f6-ce92-cfbb-37c4229e82a9"
} | {
"account_age_days": 1259,
"account_id": "ACCT-1D15A56C8DBF",
"baseline_risk_score": 0.39,
"kyc_tier": "tier_1",
"session_entropy": 0.479
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CA",
"latency_ms": 130,
"timestamp": "2026-01-01T11:11:00Z",
"transaction_amount_usd": 24773.85
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.803,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 588925.17,
"financial_exposure_usd": 763784.24,
"recoverable_pct": 0.768
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106327",
"label": "fraudulent",
"label_confidence": 0.68,
"severity": "low",
"timestamp": "2026-01-05T09:27:00Z",
"trace_id": "3c175e42-d22d-a76d-137f-bdf2501a762a"
} | {
"account_age_days": 1430,
"account_id": "ACCT-571A245E3035",
"baseline_risk_score": 0.217,
"kyc_tier": "tier_1",
"session_entropy": 0.628
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 257,
"timestamp": "2026-01-05T04:53:00Z",
"transaction_amount_usd": 14.18
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.422,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 9",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1682703.4,
"financial_exposure_usd": 2435172.45,
"recoverable_pct": 0.895
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108624",
"label": "benign",
"label_confidence": 0.629,
"severity": "medium",
"timestamp": "2026-01-06T23:44:00Z",
"trace_id": "57572a2c-d29a-0582-7b06-f625e19f6af6"
} | {
"account_age_days": 399,
"account_id": "ACCT-BD63719620A6",
"baseline_risk_score": 0.074,
"kyc_tier": "tier_1",
"session_entropy": 0.272
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 514,
"timestamp": "2026-01-06T23:44:00Z",
"transaction_amount_usd": 4098.01
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.766,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 694.32,
"financial_exposure_usd": 1141.1,
"recoverable_pct": 0.402
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108343",
"label": "benign",
"label_confidence": 0.632,
"severity": "medium",
"timestamp": "2026-01-06T19:03:00Z",
"trace_id": "b6c46706-92ed-e74a-1fbb-eb5244584544"
} | {
"account_age_days": 1292,
"account_id": "ACCT-353F1DCC43C8",
"baseline_risk_score": 0.183,
"kyc_tier": "tier_2",
"session_entropy": 0.783
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 147,
"timestamp": "2026-01-06T19:03:00Z",
"transaction_amount_usd": 9340.28
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.549,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 4511.73,
"financial_exposure_usd": 4826.4,
"recoverable_pct": 0.93
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103465",
"label": "fraudulent",
"label_confidence": 0.748,
"severity": "medium",
"timestamp": "2026-01-03T09:45:00Z",
"trace_id": "c2210954-1b54-29e8-be74-994210717dee"
} | {
"account_age_days": 1345,
"account_id": "ACCT-01F0B65E051C",
"baseline_risk_score": 0.054,
"kyc_tier": "tier_1",
"session_entropy": 0.816
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 518,
"timestamp": "2026-01-03T09:45:00Z",
"transaction_amount_usd": 1686671.01
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.443,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3066646.73,
"financial_exposure_usd": 3178767.21,
"recoverable_pct": 0.709
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105262",
"label": "fraudulent",
"label_confidence": 0.84,
"severity": "medium",
"timestamp": "2026-01-04T15:42:00Z",
"trace_id": "b1d8ea37-d028-111d-1d31-33e954afddfe"
} | {
"account_age_days": 1145,
"account_id": "ACCT-169127936E1E",
"baseline_risk_score": 0.166,
"kyc_tier": "tier_3",
"session_entropy": 0.472
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 965,
"timestamp": "2026-01-04T15:42:00Z",
"transaction_amount_usd": 1423399.6
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.93,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 4703319.89,
"financial_exposure_usd": 5247370.06,
"recoverable_pct": 0.413
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109687",
"label": "benign",
"label_confidence": 0.641,
"severity": "low",
"timestamp": "2026-01-07T17:27:00Z",
"trace_id": "a0a1230c-fe99-7c9a-e7aa-976dbf5ad386"
} | {
"account_age_days": 434,
"account_id": "ACCT-0DFE3BD29B22",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.596
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 523,
"timestamp": "2026-01-07T17:27:00Z",
"transaction_amount_usd": 3788.45
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.567,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1206.3,
"financial_exposure_usd": 1564.42,
"recoverable_pct": 0.922
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100002",
"label": "fraudulent",
"label_confidence": 0.965,
"severity": "medium",
"timestamp": "2026-01-01T00:02:00Z",
"trace_id": "8a14be62-295b-4715-c333-e8615fb8d16c"
} | {
"account_age_days": 1656,
"account_id": "ACCT-3E3511287900",
"baseline_risk_score": 0.303,
"kyc_tier": "tier_2",
"session_entropy": 0.767
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 709,
"timestamp": "2026-01-01T00:02:00Z",
"transaction_amount_usd": 72073.88
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.407,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 685529.81,
"financial_exposure_usd": 1119088.85,
"recoverable_pct": 0.349
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108954",
"label": "benign",
"label_confidence": 0.703,
"severity": "low",
"timestamp": "2026-01-07T05:14:00Z",
"trace_id": "941cb18a-a8b4-e386-c6b7-b4d8755f456b"
} | {
"account_age_days": 795,
"account_id": "ACCT-53FE17FE593F",
"baseline_risk_score": 0.108,
"kyc_tier": "tier_1",
"session_entropy": 0.761
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 384,
"timestamp": "2026-01-07T03:13:00Z",
"transaction_amount_usd": 5.78
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.576,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1524.48,
"financial_exposure_usd": 2250.59,
"recoverable_pct": 0.848
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100702",
"label": "fraudulent",
"label_confidence": 0.891,
"severity": "medium",
"timestamp": "2026-01-01T11:42:00Z",
"trace_id": "0dc29c55-0d20-274e-0b82-a3123962d144"
} | {
"account_age_days": 168,
"account_id": "ACCT-7646D1F8E3F2",
"baseline_risk_score": 0.496,
"kyc_tier": "tier_3",
"session_entropy": 0.711
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "BR",
"latency_ms": 568,
"timestamp": "2026-01-01T11:42:00Z",
"transaction_amount_usd": 31712.64
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.866,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 881473.5,
"financial_exposure_usd": 1325739.51,
"recoverable_pct": 0.666
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106838",
"label": "benign",
"label_confidence": 0.498,
"severity": "low",
"timestamp": "2026-01-05T17:58:00Z",
"trace_id": "0f303e82-2a41-40e7-dabd-c9965eee980e"
} | {
"account_age_days": 762,
"account_id": "ACCT-660E86AC0444",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.198
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 379,
"timestamp": "2026-01-05T17:58:00Z",
"transaction_amount_usd": 10198.9
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.471,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3346.16,
"financial_exposure_usd": 4070.7,
"recoverable_pct": 0.939
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100586",
"label": "fraudulent",
"label_confidence": 0.877,
"severity": "medium",
"timestamp": "2026-01-01T09:46:00Z",
"trace_id": "6085811b-67a4-fdb6-60dc-3d2b994fe7dc"
} | {
"account_age_days": 551,
"account_id": "ACCT-7CCBCC753E7D",
"baseline_risk_score": 0.584,
"kyc_tier": "tier_1",
"session_entropy": 0.428
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 1042,
"timestamp": "2026-01-01T09:46:00Z",
"transaction_amount_usd": 26685.07
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.848,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 220074.74,
"financial_exposure_usd": 257843.84,
"recoverable_pct": 0.187
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103795",
"label": "fraudulent",
"label_confidence": 0.856,
"severity": "medium",
"timestamp": "2026-01-03T15:15:00Z",
"trace_id": "70bf7009-0150-88ad-cca6-9fc434be4648"
} | {
"account_age_days": 1899,
"account_id": "ACCT-E2DA3D1AFD97",
"baseline_risk_score": 0.063,
"kyc_tier": "tier_1",
"session_entropy": 0.69
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 1076,
"timestamp": "2026-01-03T15:15:00Z",
"transaction_amount_usd": 1812358.18
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.522,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 5843870.18,
"financial_exposure_usd": 6073007.84,
"recoverable_pct": 0.89
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102972",
"label": "fraudulent",
"label_confidence": 0.827,
"severity": "low",
"timestamp": "2026-01-03T01:32:00Z",
"trace_id": "ecc5e4e9-35f3-1e50-146e-77437c8510a9"
} | {
"account_age_days": 218,
"account_id": "ACCT-24DBAEE2ACE5",
"baseline_risk_score": 0.37,
"kyc_tier": "tier_2",
"session_entropy": 0.622
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 1168,
"timestamp": "2026-01-03T01:32:00Z",
"transaction_amount_usd": 38132.47
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.518,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 941746.67,
"financial_exposure_usd": 1012569.38,
"recoverable_pct": 0.46
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102276",
"label": "fraudulent",
"label_confidence": 0.927,
"severity": "high",
"timestamp": "2026-01-02T13:56:00Z",
"trace_id": "adfae807-ee0d-9cd1-0fe7-ce5614155b06"
} | {
"account_age_days": 242,
"account_id": "ACCT-DAA5D339F04B",
"baseline_risk_score": 0.261,
"kyc_tier": "tier_2",
"session_entropy": 0.252
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NL",
"latency_ms": 1088,
"timestamp": "2026-01-02T13:56:00Z",
"transaction_amount_usd": 23062.53
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.607,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 578831.36,
"financial_exposure_usd": 588938.56,
"recoverable_pct": 0.829
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100613",
"label": "fraudulent",
"label_confidence": 0.92,
"severity": "high",
"timestamp": "2026-01-01T10:13:00Z",
"trace_id": "20923175-1ba6-373c-6bf4-c68b3812bd11"
} | {
"account_age_days": 1354,
"account_id": "ACCT-5E7E0704FC6C",
"baseline_risk_score": 0.567,
"kyc_tier": "tier_3",
"session_entropy": 0.318
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 806,
"timestamp": "2026-01-01T10:13:00Z",
"transaction_amount_usd": 60319.14
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.829,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 893066.95,
"financial_exposure_usd": 991047.36,
"recoverable_pct": 0.792
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105962",
"label": "fraudulent",
"label_confidence": 0.645,
"severity": "critical",
"timestamp": "2026-01-05T03:22:00Z",
"trace_id": "5b31c78b-a6bc-3620-fa9a-61555157e006"
} | {
"account_age_days": 1101,
"account_id": "ACCT-812D893945E7",
"baseline_risk_score": 0.11,
"kyc_tier": "tier_3",
"session_entropy": 0.692
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 961,
"timestamp": "2026-01-05T03:22:00Z",
"transaction_amount_usd": 2452062.24
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.519,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1282338.28,
"financial_exposure_usd": 2630239.89,
"recoverable_pct": 0.47
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103388",
"label": "fraudulent",
"label_confidence": 0.782,
"severity": "high",
"timestamp": "2026-01-03T08:28:00Z",
"trace_id": "45f2f483-ba21-7bc4-a48e-7b8eac276124"
} | {
"account_age_days": 1792,
"account_id": "ACCT-F686601078E2",
"baseline_risk_score": 0.36,
"kyc_tier": "tier_3",
"session_entropy": 0.718
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 148,
"timestamp": "2026-01-03T04:04:00Z",
"transaction_amount_usd": 1.59
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.361,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3525614.87,
"financial_exposure_usd": 6396645.67,
"recoverable_pct": 0.558
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101079",
"label": "fraudulent",
"label_confidence": 0.92,
"severity": "critical",
"timestamp": "2026-01-01T17:59:00Z",
"trace_id": "9ed26f3d-6399-7cfe-4815-a8e770456859"
} | {
"account_age_days": 295,
"account_id": "ACCT-6876BAAAFD64",
"baseline_risk_score": 0.457,
"kyc_tier": "tier_1",
"session_entropy": 0.471
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 209,
"timestamp": "2026-01-01T17:59:00Z",
"transaction_amount_usd": 59721.34
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.863,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 1311456.07,
"financial_exposure_usd": 1322450.43,
"recoverable_pct": 0.544
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104433",
"label": "fraudulent",
"label_confidence": 0.878,
"severity": "high",
"timestamp": "2026-01-04T01:53:00Z",
"trace_id": "025dbcb3-8da1-462c-4d90-6b4ef3618fd2"
} | {
"account_age_days": 552,
"account_id": "ACCT-B49951CD45F0",
"baseline_risk_score": 0.073,
"kyc_tier": "tier_2",
"session_entropy": 0.439
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 1165,
"timestamp": "2026-01-04T01:53:00Z",
"transaction_amount_usd": 2731541.26
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.494,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5711421.06,
"financial_exposure_usd": 5739254.07,
"recoverable_pct": 0.897
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102818",
"label": "fraudulent",
"label_confidence": 0.814,
"severity": "critical",
"timestamp": "2026-01-02T22:58:00Z",
"trace_id": "7d46a6b2-a888-15f1-013d-09dddbd2e24e"
} | {
"account_age_days": 426,
"account_id": "ACCT-D89DB10AA407",
"baseline_risk_score": 0.292,
"kyc_tier": "tier_2",
"session_entropy": 0.893
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 348,
"timestamp": "2026-01-02T22:58:00Z",
"transaction_amount_usd": 20296.31
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.415,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 262885.87,
"financial_exposure_usd": 318321.04,
"recoverable_pct": 0.819
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108028",
"label": "benign",
"label_confidence": 0.48,
"severity": "low",
"timestamp": "2026-01-06T13:48:00Z",
"trace_id": "ad9d14b3-f082-1451-e4cc-818c5f537445"
} | {
"account_age_days": 157,
"account_id": "ACCT-5E8D981A3B72",
"baseline_risk_score": 0.143,
"kyc_tier": "tier_1",
"session_entropy": 0.747
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 375,
"timestamp": "2026-01-06T13:48:00Z",
"transaction_amount_usd": 14546.41
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.683,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 514.05,
"financial_exposure_usd": 1087.14,
"recoverable_pct": 0.949
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109127",
"label": "benign",
"label_confidence": 0.534,
"severity": "high",
"timestamp": "2026-01-07T08:07:00Z",
"trace_id": "f2bf0fc9-d273-a104-1617-090dfca99391"
} | {
"account_age_days": 663,
"account_id": "ACCT-A559AB89809D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.654
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 655,
"timestamp": "2026-01-07T08:07:00Z",
"transaction_amount_usd": 3360.32
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.775,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3572.12,
"financial_exposure_usd": 3644.46,
"recoverable_pct": 0.464
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100590",
"label": "fraudulent",
"label_confidence": 0.92,
"severity": "medium",
"timestamp": "2026-01-01T09:50:00Z",
"trace_id": "f08cce25-bb96-6c6e-7202-d068469eb6ca"
} | {
"account_age_days": 608,
"account_id": "ACCT-DF93998B6912",
"baseline_risk_score": 0.422,
"kyc_tier": "tier_1",
"session_entropy": 0.777
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "JP",
"latency_ms": 1071,
"timestamp": "2026-01-01T09:50:00Z",
"transaction_amount_usd": 100379.53
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.444,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 934605.92,
"financial_exposure_usd": 1150238.23,
"recoverable_pct": 0.179
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103241",
"label": "fraudulent",
"label_confidence": 0.782,
"severity": "high",
"timestamp": "2026-01-03T06:01:00Z",
"trace_id": "d2539311-9622-06ab-24ab-99a2e6b3057f"
} | {
"account_age_days": 1699,
"account_id": "ACCT-45977E712D4C",
"baseline_risk_score": 0.282,
"kyc_tier": "tier_3",
"session_entropy": 0.63
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 303,
"timestamp": "2026-01-02T20:06:00Z",
"transaction_amount_usd": 21.29
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.481,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 407840.96,
"financial_exposure_usd": 653885.8,
"recoverable_pct": 0.829
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102326",
"label": "fraudulent",
"label_confidence": 0.912,
"severity": "low",
"timestamp": "2026-01-02T14:46:00Z",
"trace_id": "971ce449-b8b4-8afa-991d-3c9a9c4457c3"
} | {
"account_age_days": 1391,
"account_id": "ACCT-D1A694F986B2",
"baseline_risk_score": 0.585,
"kyc_tier": "tier_1",
"session_entropy": 0.939
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 442,
"timestamp": "2026-01-02T14:46:00Z",
"transaction_amount_usd": 62217.15
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.691,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 228654.21,
"financial_exposure_usd": 509708.03,
"recoverable_pct": 0.576
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.