schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104532",
"label": "fraudulent",
"label_confidence": 0.602,
"severity": "low",
"timestamp": "2026-01-04T03:32:00Z",
"trace_id": "c36a3ff1-548a-656b-0ae1-2dfddff43dce"
} | {
"account_age_days": 1027,
"account_id": "ACCT-F9BD299443C9",
"baseline_risk_score": 0.244,
"kyc_tier": "tier_3",
"session_entropy": 0.203
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 1105,
"timestamp": "2026-01-04T03:32:00Z",
"transaction_amount_usd": 1838835.33
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.883,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4777241.16,
"financial_exposure_usd": 5161171.23,
"recoverable_pct": 0.527
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100485",
"label": "fraudulent",
"label_confidence": 0.797,
"severity": "high",
"timestamp": "2026-01-01T08:05:00Z",
"trace_id": "888b464b-35e6-168c-83bf-5845cf89e41a"
} | {
"account_age_days": 440,
"account_id": "ACCT-86B3468821FE",
"baseline_risk_score": 0.395,
"kyc_tier": "tier_3",
"session_entropy": 0.943
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "FR",
"latency_ms": 1077,
"timestamp": "2026-01-01T08:05:00Z",
"transaction_amount_usd": 76336.77
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.373,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 668233.31,
"financial_exposure_usd": 869908.01,
"recoverable_pct": 0.516
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102613",
"label": "fraudulent",
"label_confidence": 0.84,
"severity": "high",
"timestamp": "2026-01-02T19:33:00Z",
"trace_id": "1a06dff3-ea17-a576-facf-3a6a38b9468d"
} | {
"account_age_days": 929,
"account_id": "ACCT-8FDAE31ED074",
"baseline_risk_score": 0.29,
"kyc_tier": "tier_2",
"session_entropy": 0.639
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 842,
"timestamp": "2026-01-02T19:33:00Z",
"transaction_amount_usd": 77403.71
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.527,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 309514.08,
"financial_exposure_usd": 734468.58,
"recoverable_pct": 0.095
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108432",
"label": "benign",
"label_confidence": 0.466,
"severity": "medium",
"timestamp": "2026-01-06T20:32:00Z",
"trace_id": "2473d9f4-ebaf-add7-21cb-7fed696895ee"
} | {
"account_age_days": 1825,
"account_id": "ACCT-A18422895748",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.344
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 314,
"timestamp": "2026-01-06T11:01:00Z",
"transaction_amount_usd": 23.28
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.456,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1773.66,
"financial_exposure_usd": 2772.52,
"recoverable_pct": 0.629
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105604",
"label": "fraudulent",
"label_confidence": 0.68,
"severity": "medium",
"timestamp": "2026-01-04T21:24:00Z",
"trace_id": "5c8d8a05-961b-db30-d668-e72c6f764a51"
} | {
"account_age_days": 391,
"account_id": "ACCT-5531D0D2EB5C",
"baseline_risk_score": 0.056,
"kyc_tier": "tier_3",
"session_entropy": 0.368
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 154,
"timestamp": "2026-01-04T21:24:00Z",
"transaction_amount_usd": 2217270.51
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.646,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 7009897.16,
"financial_exposure_usd": 7256809.81,
"recoverable_pct": 0.561
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103281",
"label": "fraudulent",
"label_confidence": 0.841,
"severity": "high",
"timestamp": "2026-01-03T06:41:00Z",
"trace_id": "bc6bea55-2438-f396-e876-873d7d06d0aa"
} | {
"account_age_days": 1884,
"account_id": "ACCT-A886BDA42CBF",
"baseline_risk_score": 0.64,
"kyc_tier": "tier_1",
"session_entropy": 0.867
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 228,
"timestamp": "2026-01-03T06:41:00Z",
"transaction_amount_usd": 60382.1
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.602,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 392681.31,
"financial_exposure_usd": 773850.11,
"recoverable_pct": 0.57
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100881",
"label": "fraudulent",
"label_confidence": 0.864,
"severity": "high",
"timestamp": "2026-01-01T14:41:00Z",
"trace_id": "37bad42e-6e87-5016-a672-1c8c77ca6681"
} | {
"account_age_days": 1154,
"account_id": "ACCT-A02698EA985C",
"baseline_risk_score": 0.289,
"kyc_tier": "tier_3",
"session_entropy": 0.563
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 372,
"timestamp": "2026-01-01T14:41:00Z",
"transaction_amount_usd": 86190.08
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.827,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 305744.49,
"financial_exposure_usd": 328283.89,
"recoverable_pct": 0.073
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107493",
"label": "benign",
"label_confidence": 0.743,
"severity": "high",
"timestamp": "2026-01-06T04:53:00Z",
"trace_id": "77bf62a5-13fe-2e30-d7c0-e4c69c211ca2"
} | {
"account_age_days": 319,
"account_id": "ACCT-1772432C2CFA",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.881
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 112,
"timestamp": "2026-01-05T17:00:00Z",
"transaction_amount_usd": 3.25
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.64,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1468.22,
"financial_exposure_usd": 2794.91,
"recoverable_pct": 0.935
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108693",
"label": "benign",
"label_confidence": 0.728,
"severity": "medium",
"timestamp": "2026-01-07T00:53:00Z",
"trace_id": "0b25f70b-5d8f-d077-d20c-cb8f4e1fd417"
} | {
"account_age_days": 69,
"account_id": "ACCT-B0BC42DDD9E0",
"baseline_risk_score": 0.061,
"kyc_tier": "tier_1",
"session_entropy": 0.773
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 126,
"timestamp": "2026-01-07T00:53:00Z",
"transaction_amount_usd": 14419.45
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.644,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1205.26,
"financial_exposure_usd": 1482.08,
"recoverable_pct": 0.918
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109606",
"label": "benign",
"label_confidence": 0.537,
"severity": "medium",
"timestamp": "2026-01-07T16:06:00Z",
"trace_id": "db9adf05-cf9b-8899-6d10-ce60cae7817c"
} | {
"account_age_days": 1995,
"account_id": "ACCT-BD88894D39DA",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.167
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 94,
"timestamp": "2026-01-07T16:06:00Z",
"transaction_amount_usd": 14931.72
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.474,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1131.21,
"financial_exposure_usd": 2467.9,
"recoverable_pct": 0.479
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104218",
"label": "fraudulent",
"label_confidence": 0.828,
"severity": "low",
"timestamp": "2026-01-03T22:18:00Z",
"trace_id": "4c0f157c-08ed-8339-0090-310aee9269ba"
} | {
"account_age_days": 309,
"account_id": "ACCT-6C26ACEB740F",
"baseline_risk_score": 0.215,
"kyc_tier": "tier_3",
"session_entropy": 0.277
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 141,
"timestamp": "2026-01-03T13:11:00Z",
"transaction_amount_usd": 19.1
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.367,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3247370.28,
"financial_exposure_usd": 3399834.07,
"recoverable_pct": 0.988
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100543",
"label": "fraudulent",
"label_confidence": 0.941,
"severity": "critical",
"timestamp": "2026-01-01T09:03:00Z",
"trace_id": "e6e1396c-33c2-5f22-07e4-3911349e3a21"
} | {
"account_age_days": 1030,
"account_id": "ACCT-F8E46F694145",
"baseline_risk_score": 0.57,
"kyc_tier": "tier_2",
"session_entropy": 0.418
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 144,
"timestamp": "2026-01-01T04:10:00Z",
"transaction_amount_usd": 8.46
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.423,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 250997.59,
"financial_exposure_usd": 437063.32,
"recoverable_pct": 0.458
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105697",
"label": "fraudulent",
"label_confidence": 0.858,
"severity": "medium",
"timestamp": "2026-01-04T22:57:00Z",
"trace_id": "d9dff366-55bb-fab3-8634-d40382505d24"
} | {
"account_age_days": 854,
"account_id": "ACCT-501CDDBEEE3F",
"baseline_risk_score": 0.219,
"kyc_tier": "tier_3",
"session_entropy": 0.514
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 949,
"timestamp": "2026-01-04T22:57:00Z",
"transaction_amount_usd": 166109.36
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.596,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3617335.86,
"financial_exposure_usd": 5432672.28,
"recoverable_pct": 0.573
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102260",
"label": "fraudulent",
"label_confidence": 0.765,
"severity": "critical",
"timestamp": "2026-01-02T13:40:00Z",
"trace_id": "5eec1f7f-d5a5-f4b4-149e-4e0285d245f8"
} | {
"account_age_days": 1256,
"account_id": "ACCT-7D5327D7A4CF",
"baseline_risk_score": 0.304,
"kyc_tier": "tier_3",
"session_entropy": 0.446
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 719,
"timestamp": "2026-01-02T13:40:00Z",
"transaction_amount_usd": 52142.15
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.703,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 379336.09,
"financial_exposure_usd": 871023.03,
"recoverable_pct": 0.206
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103704",
"label": "fraudulent",
"label_confidence": 0.618,
"severity": "critical",
"timestamp": "2026-01-03T13:44:00Z",
"trace_id": "b2fbfd61-ed67-12c1-6227-7e897f70d85b"
} | {
"account_age_days": 1317,
"account_id": "ACCT-6501EBC4265A",
"baseline_risk_score": 0.405,
"kyc_tier": "tier_3",
"session_entropy": 0.79
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 1126,
"timestamp": "2026-01-03T13:44:00Z",
"transaction_amount_usd": 1585036.22
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.766,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2742100.82,
"financial_exposure_usd": 5397796.83,
"recoverable_pct": 0.985
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100016",
"label": "fraudulent",
"label_confidence": 0.928,
"severity": "critical",
"timestamp": "2026-01-01T00:16:00Z",
"trace_id": "0986bbeb-f23e-323d-0b9b-d93423c86d30"
} | {
"account_age_days": 299,
"account_id": "ACCT-00B9D4A39892",
"baseline_risk_score": 0.343,
"kyc_tier": "tier_1",
"session_entropy": 0.336
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 1009,
"timestamp": "2026-01-01T00:16:00Z",
"transaction_amount_usd": 14376.4
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.5,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 304158.48,
"financial_exposure_usd": 652762.51,
"recoverable_pct": 0.736
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101208",
"label": "fraudulent",
"label_confidence": 0.82,
"severity": "medium",
"timestamp": "2026-01-01T20:08:00Z",
"trace_id": "5bae0474-8fb1-6f45-59b3-fe2ee708da56"
} | {
"account_age_days": 355,
"account_id": "ACCT-DBFC1C2DEE70",
"baseline_risk_score": 0.568,
"kyc_tier": "tier_3",
"session_entropy": 0.726
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 1154,
"timestamp": "2026-01-01T20:08:00Z",
"transaction_amount_usd": 35166.03
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.719,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 191647.99,
"financial_exposure_usd": 289014.71,
"recoverable_pct": 0.34
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100993",
"label": "fraudulent",
"label_confidence": 0.792,
"severity": "critical",
"timestamp": "2026-01-01T16:33:00Z",
"trace_id": "485070d9-07d6-aa28-7372-0283ac20edfb"
} | {
"account_age_days": 845,
"account_id": "ACCT-3D5B0DFD83C8",
"baseline_risk_score": 0.532,
"kyc_tier": "tier_2",
"session_entropy": 0.612
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "HK",
"latency_ms": 583,
"timestamp": "2026-01-01T16:33:00Z",
"transaction_amount_usd": 90904.81
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.792,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 302600.24,
"financial_exposure_usd": 388371,
"recoverable_pct": 0.58
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109232",
"label": "benign",
"label_confidence": 0.466,
"severity": "low",
"timestamp": "2026-01-07T09:52:00Z",
"trace_id": "6ce4c70c-9238-0be4-c7cd-d16a970b3ffe"
} | {
"account_age_days": 1465,
"account_id": "ACCT-51C3E509DCC3",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.468
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 233,
"timestamp": "2026-01-07T09:52:00Z",
"transaction_amount_usd": 3936.64
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.631,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2516.31,
"financial_exposure_usd": 3369.03,
"recoverable_pct": 0.597
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106599",
"label": "fraudulent",
"label_confidence": 0.822,
"severity": "medium",
"timestamp": "2026-01-05T13:59:00Z",
"trace_id": "e627eaee-9876-deeb-5e3e-4e9aefe07262"
} | {
"account_age_days": 13,
"account_id": "ACCT-34F5A1C23530",
"baseline_risk_score": 0.169,
"kyc_tier": "tier_1",
"session_entropy": 0.934
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 200,
"timestamp": "2026-01-05T13:59:00Z",
"transaction_amount_usd": 2964142.72
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.916,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2037609.44,
"financial_exposure_usd": 3185809.95,
"recoverable_pct": 0.602
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106640",
"label": "fraudulent",
"label_confidence": 0.745,
"severity": "medium",
"timestamp": "2026-01-05T14:40:00Z",
"trace_id": "8982ac1c-650b-d505-0df3-09a649b284da"
} | {
"account_age_days": 1598,
"account_id": "ACCT-F98B7D419C68",
"baseline_risk_score": 0.355,
"kyc_tier": "tier_1",
"session_entropy": 0.285
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 360,
"timestamp": "2026-01-05T14:40:00Z",
"transaction_amount_usd": 2996762.1
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.702,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3460468.15,
"financial_exposure_usd": 5801318.38,
"recoverable_pct": 0.632
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109284",
"label": "benign",
"label_confidence": 0.615,
"severity": "high",
"timestamp": "2026-01-07T10:44:00Z",
"trace_id": "aeefb375-3822-08e1-1754-0e7a688714a6"
} | {
"account_age_days": 1401,
"account_id": "ACCT-D334141E1DBD",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.878
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 263,
"timestamp": "2026-01-07T10:44:00Z",
"transaction_amount_usd": 7042.24
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.664,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 723.46,
"financial_exposure_usd": 750.11,
"recoverable_pct": 0.938
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105711",
"label": "fraudulent",
"label_confidence": 0.67,
"severity": "high",
"timestamp": "2026-01-04T23:11:00Z",
"trace_id": "5e93fa93-1778-efb6-e5cd-5f721a27dbb3"
} | {
"account_age_days": 1111,
"account_id": "ACCT-421DBEEC5807",
"baseline_risk_score": 0.25,
"kyc_tier": "tier_3",
"session_entropy": 0.945
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 315,
"timestamp": "2026-01-04T12:32:00Z",
"transaction_amount_usd": 4.17
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.44,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 4979689.45,
"financial_exposure_usd": 6858790.18,
"recoverable_pct": 0.672
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102771",
"label": "fraudulent",
"label_confidence": 0.929,
"severity": "critical",
"timestamp": "2026-01-02T22:11:00Z",
"trace_id": "74fa8489-79d8-8eae-fd18-da5a0121ab0e"
} | {
"account_age_days": 659,
"account_id": "ACCT-53BD978AF7A7",
"baseline_risk_score": 0.412,
"kyc_tier": "tier_3",
"session_entropy": 0.141
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 231,
"timestamp": "2026-01-02T12:16:00Z",
"transaction_amount_usd": 1
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_c... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.751,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 504240.75,
"financial_exposure_usd": 858161.99,
"recoverable_pct": 0.618
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108628",
"label": "benign",
"label_confidence": 0.502,
"severity": "high",
"timestamp": "2026-01-06T23:48:00Z",
"trace_id": "efb5985e-48c8-88c9-1c27-c4370b8f7ac1"
} | {
"account_age_days": 96,
"account_id": "ACCT-99819811353C",
"baseline_risk_score": 0.19,
"kyc_tier": "tier_2",
"session_entropy": 0.905
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 416,
"timestamp": "2026-01-06T23:48:00Z",
"transaction_amount_usd": 1188.21
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.464,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3608.07,
"financial_exposure_usd": 6418.11,
"recoverable_pct": 0.515
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102652",
"label": "fraudulent",
"label_confidence": 0.912,
"severity": "critical",
"timestamp": "2026-01-02T20:12:00Z",
"trace_id": "24b70c6f-5f33-91ef-2a1c-07920940368d"
} | {
"account_age_days": 1325,
"account_id": "ACCT-828BF4589239",
"baseline_risk_score": 0.388,
"kyc_tier": "tier_2",
"session_entropy": 0.477
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 353,
"timestamp": "2026-01-02T16:40:00Z",
"transaction_amount_usd": 4.5
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.665,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 511958.63,
"financial_exposure_usd": 691210.92,
"recoverable_pct": 0.306
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108612",
"label": "benign",
"label_confidence": 0.65,
"severity": "low",
"timestamp": "2026-01-06T23:32:00Z",
"trace_id": "ec70c0d8-a0fe-57ba-8966-5735a545f6b6"
} | {
"account_age_days": 264,
"account_id": "ACCT-6FAA1D041055",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.628
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 842,
"timestamp": "2026-01-06T23:32:00Z",
"transaction_amount_usd": 3330.77
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.785,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3111.56,
"financial_exposure_usd": 6197.65,
"recoverable_pct": 0.587
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109015",
"label": "benign",
"label_confidence": 0.675,
"severity": "high",
"timestamp": "2026-01-07T06:15:00Z",
"trace_id": "475de55f-52fe-c25b-430f-4a2205f89160"
} | {
"account_age_days": 1652,
"account_id": "ACCT-CED928BD5219",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.213
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 176,
"timestamp": "2026-01-07T06:15:00Z",
"transaction_amount_usd": 11795.89
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.524,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3079.52,
"financial_exposure_usd": 4464.2,
"recoverable_pct": 0.977
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101176",
"label": "fraudulent",
"label_confidence": 0.764,
"severity": "high",
"timestamp": "2026-01-01T19:36:00Z",
"trace_id": "67430aef-b2ba-071f-edc8-7fdd726fc505"
} | {
"account_age_days": 925,
"account_id": "ACCT-92341486CB1E",
"baseline_risk_score": 0.55,
"kyc_tier": "tier_3",
"session_entropy": 0.88
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 330,
"timestamp": "2026-01-01T14:17:00Z",
"transaction_amount_usd": 11.35
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.867,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 526110.12,
"financial_exposure_usd": 647924.26,
"recoverable_pct": 0.36
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103755",
"label": "fraudulent",
"label_confidence": 0.644,
"severity": "high",
"timestamp": "2026-01-03T14:35:00Z",
"trace_id": "ea2bd496-ea4a-1d6a-a6b4-8f0282c6e087"
} | {
"account_age_days": 69,
"account_id": "ACCT-EA00BEC1E06E",
"baseline_risk_score": 0.276,
"kyc_tier": "tier_1",
"session_entropy": 0.32
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 1040,
"timestamp": "2026-01-03T14:35:00Z",
"transaction_amount_usd": 1217484.26
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.776,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5825203.84,
"financial_exposure_usd": 7001652.57,
"recoverable_pct": 0.558
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102272",
"label": "fraudulent",
"label_confidence": 0.825,
"severity": "low",
"timestamp": "2026-01-02T13:52:00Z",
"trace_id": "ab74097a-bfa5-fb28-8dc3-0d7a16241c38"
} | {
"account_age_days": 1662,
"account_id": "ACCT-40440A95C7DF",
"baseline_risk_score": 0.45,
"kyc_tier": "tier_3",
"session_entropy": 0.851
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 360,
"timestamp": "2026-01-02T05:12:00Z",
"transaction_amount_usd": 22.74
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.838,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 683558.51,
"financial_exposure_usd": 1256764.15,
"recoverable_pct": 0.754
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107151",
"label": "benign",
"label_confidence": 0.484,
"severity": "medium",
"timestamp": "2026-01-05T23:11:00Z",
"trace_id": "1fbb049b-6585-da84-d28a-b669abcdd420"
} | {
"account_age_days": 810,
"account_id": "ACCT-6E6DDD59A09D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.91
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 1007,
"timestamp": "2026-01-05T23:11:00Z",
"transaction_amount_usd": 9917.68
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.55,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 1539.38,
"financial_exposure_usd": 3344.16,
"recoverable_pct": 0.557
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100583",
"label": "fraudulent",
"label_confidence": 0.772,
"severity": "critical",
"timestamp": "2026-01-01T09:43:00Z",
"trace_id": "43086251-7133-dbef-1a99-71a4a31bc1cd"
} | {
"account_age_days": 410,
"account_id": "ACCT-EE1A7DCD3BE6",
"baseline_risk_score": 0.423,
"kyc_tier": "tier_1",
"session_entropy": 0.289
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 857,
"timestamp": "2026-01-01T09:43:00Z",
"transaction_amount_usd": 24310.57
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.808,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 648898.3,
"financial_exposure_usd": 964117.52,
"recoverable_pct": 0.646
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102796",
"label": "fraudulent",
"label_confidence": 0.792,
"severity": "high",
"timestamp": "2026-01-02T22:36:00Z",
"trace_id": "e5f9175b-24ed-d774-4705-7d0198e4755b"
} | {
"account_age_days": 1458,
"account_id": "ACCT-12D44323ACA4",
"baseline_risk_score": 0.382,
"kyc_tier": "tier_2",
"session_entropy": 0.877
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 389,
"timestamp": "2026-01-02T14:22:00Z",
"transaction_amount_usd": 1.97
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.406,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 521680.18,
"financial_exposure_usd": 906200.98,
"recoverable_pct": 0.729
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109064",
"label": "benign",
"label_confidence": 0.609,
"severity": "low",
"timestamp": "2026-01-07T07:04:00Z",
"trace_id": "2a7784cb-cf39-2f2c-ae89-875cde571389"
} | {
"account_age_days": 64,
"account_id": "ACCT-AEE3169C0CEA",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.521
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 263,
"timestamp": "2026-01-07T03:16:00Z",
"transaction_amount_usd": 13.24
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.561,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 892.86,
"financial_exposure_usd": 2100.9,
"recoverable_pct": 0.934
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101985",
"label": "fraudulent",
"label_confidence": 0.856,
"severity": "medium",
"timestamp": "2026-01-02T09:05:00Z",
"trace_id": "f9b6be73-26f7-6ba5-6b6d-6fc5a177f656"
} | {
"account_age_days": 1983,
"account_id": "ACCT-E7AA38701561",
"baseline_risk_score": 0.549,
"kyc_tier": "tier_2",
"session_entropy": 0.409
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 412,
"timestamp": "2026-01-02T09:05:00Z",
"transaction_amount_usd": 45872.81
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.567,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 348424.99,
"financial_exposure_usd": 575113.93,
"recoverable_pct": 0.44
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103274",
"label": "fraudulent",
"label_confidence": 0.957,
"severity": "medium",
"timestamp": "2026-01-03T06:34:00Z",
"trace_id": "8f7d509d-c885-86e5-4816-f76da8cc9fd0"
} | {
"account_age_days": 820,
"account_id": "ACCT-78B1A801C839",
"baseline_risk_score": 0.277,
"kyc_tier": "tier_3",
"session_entropy": 0.496
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 1155,
"timestamp": "2026-01-03T06:34:00Z",
"transaction_amount_usd": 112027.71
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.576,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 561270.11,
"financial_exposure_usd": 1222773.26,
"recoverable_pct": 0.122
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106421",
"label": "fraudulent",
"label_confidence": 0.75,
"severity": "high",
"timestamp": "2026-01-05T11:01:00Z",
"trace_id": "cd3d3c8e-dd56-6fa1-bce8-d270d90bfb79"
} | {
"account_age_days": 134,
"account_id": "ACCT-B253475555B2",
"baseline_risk_score": 0.227,
"kyc_tier": "tier_3",
"session_entropy": 0.513
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 538,
"timestamp": "2026-01-05T11:01:00Z",
"transaction_amount_usd": 227963.14
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.926,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2696667.63,
"financial_exposure_usd": 3347134.51,
"recoverable_pct": 0.682
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103996",
"label": "fraudulent",
"label_confidence": 0.731,
"severity": "medium",
"timestamp": "2026-01-03T18:36:00Z",
"trace_id": "00fbe031-3338-6e63-b52a-1cda06b9df74"
} | {
"account_age_days": 877,
"account_id": "ACCT-4A0474BD9B32",
"baseline_risk_score": 0.226,
"kyc_tier": "tier_3",
"session_entropy": 0.578
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 529,
"timestamp": "2026-01-03T18:36:00Z",
"transaction_amount_usd": 2197217.24
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.563,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1032225.38,
"financial_exposure_usd": 2501963.84,
"recoverable_pct": 0.927
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108812",
"label": "benign",
"label_confidence": 0.612,
"severity": "high",
"timestamp": "2026-01-07T02:52:00Z",
"trace_id": "e01b13c4-b568-dc3c-82f3-3d552ddc2292"
} | {
"account_age_days": 651,
"account_id": "ACCT-47D2872C4226",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.107
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 711,
"timestamp": "2026-01-07T02:52:00Z",
"transaction_amount_usd": 7147.51
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.645,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1590.42,
"financial_exposure_usd": 1675.68,
"recoverable_pct": 0.809
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104901",
"label": "fraudulent",
"label_confidence": 0.641,
"severity": "high",
"timestamp": "2026-01-04T09:41:00Z",
"trace_id": "26abed8e-2ca0-9426-6bd2-56a283ca3e6a"
} | {
"account_age_days": 209,
"account_id": "ACCT-F3C483D27F7B",
"baseline_risk_score": 0.244,
"kyc_tier": "tier_1",
"session_entropy": 0.589
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 236,
"timestamp": "2026-01-04T07:02:00Z",
"transaction_amount_usd": 14.18
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.483,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 7019305.58,
"financial_exposure_usd": 7107468.18,
"recoverable_pct": 0.518
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107778",
"label": "benign",
"label_confidence": 0.549,
"severity": "low",
"timestamp": "2026-01-06T09:38:00Z",
"trace_id": "f30ae156-9092-9b5e-0e6c-97fe9cfea389"
} | {
"account_age_days": 978,
"account_id": "ACCT-C0D205659660",
"baseline_risk_score": 0.054,
"kyc_tier": "tier_1",
"session_entropy": 0.418
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 893,
"timestamp": "2026-01-06T09:38:00Z",
"transaction_amount_usd": 7027.39
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.604,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 4833.92,
"financial_exposure_usd": 7020.25,
"recoverable_pct": 0.743
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107160",
"label": "benign",
"label_confidence": 0.453,
"severity": "high",
"timestamp": "2026-01-05T23:20:00Z",
"trace_id": "835d742a-4c5b-38bb-0332-f88ae63fbb24"
} | {
"account_age_days": 620,
"account_id": "ACCT-034807E8E6CB",
"baseline_risk_score": 0.124,
"kyc_tier": "tier_1",
"session_entropy": 0.474
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 86,
"timestamp": "2026-01-05T18:09:00Z",
"transaction_amount_usd": 14.26
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.796,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1399.08,
"financial_exposure_usd": 3266.22,
"recoverable_pct": 0.714
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100781",
"label": "fraudulent",
"label_confidence": 0.756,
"severity": "medium",
"timestamp": "2026-01-01T13:01:00Z",
"trace_id": "4df81539-50b7-b9b7-b329-26626d8a7a6e"
} | {
"account_age_days": 1254,
"account_id": "ACCT-D3B6E45B756F",
"baseline_risk_score": 0.582,
"kyc_tier": "tier_3",
"session_entropy": 0.863
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 442,
"timestamp": "2026-01-01T13:01:00Z",
"transaction_amount_usd": 14230.59
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.917,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 763501.15,
"financial_exposure_usd": 845212.61,
"recoverable_pct": 0.312
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102587",
"label": "fraudulent",
"label_confidence": 0.82,
"severity": "high",
"timestamp": "2026-01-02T19:07:00Z",
"trace_id": "f1c0e586-6350-fa9b-cae3-d20059de1fd6"
} | {
"account_age_days": 1646,
"account_id": "ACCT-B6934CAB869A",
"baseline_risk_score": 0.411,
"kyc_tier": "tier_1",
"session_entropy": 0.784
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 80,
"timestamp": "2026-01-02T12:40:00Z",
"transaction_amount_usd": 15.97
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.608,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 907238.37,
"financial_exposure_usd": 944487.13,
"recoverable_pct": 0.846
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106742",
"label": "benign",
"label_confidence": 0.463,
"severity": "medium",
"timestamp": "2026-01-05T16:22:00Z",
"trace_id": "200aad62-bdf4-ddf6-2af2-c99776970640"
} | {
"account_age_days": 1855,
"account_id": "ACCT-74E13F758240",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.844
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 159,
"timestamp": "2026-01-05T14:03:00Z",
"transaction_amount_usd": 13.56
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.475,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1626.6,
"financial_exposure_usd": 3971.19,
"recoverable_pct": 0.905
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107745",
"label": "benign",
"label_confidence": 0.54,
"severity": "medium",
"timestamp": "2026-01-06T09:05:00Z",
"trace_id": "e33ac2ac-bd1d-bd9b-baec-69234bda8405"
} | {
"account_age_days": 1541,
"account_id": "ACCT-4C7D8DF2FA73",
"baseline_risk_score": 0.067,
"kyc_tier": "tier_3",
"session_entropy": 0.794
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 1104,
"timestamp": "2026-01-06T09:05:00Z",
"transaction_amount_usd": 4044.87
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.694,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3366.08,
"financial_exposure_usd": 4621.23,
"recoverable_pct": 0.488
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102851",
"label": "fraudulent",
"label_confidence": 0.785,
"severity": "low",
"timestamp": "2026-01-02T23:31:00Z",
"trace_id": "0c32469a-3410-f16c-e01c-874cebd80375"
} | {
"account_age_days": 1163,
"account_id": "ACCT-8494205DAE31",
"baseline_risk_score": 0.638,
"kyc_tier": "tier_3",
"session_entropy": 0.45
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 318,
"timestamp": "2026-01-02T14:09:00Z",
"transaction_amount_usd": 1.36
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.92,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 240786.69,
"financial_exposure_usd": 517748.28,
"recoverable_pct": 0.754
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101051",
"label": "fraudulent",
"label_confidence": 0.827,
"severity": "critical",
"timestamp": "2026-01-01T17:31:00Z",
"trace_id": "4dfb95bb-3573-ec42-e5e8-6a7a93f825c2"
} | {
"account_age_days": 256,
"account_id": "ACCT-C5E73F91C246",
"baseline_risk_score": 0.638,
"kyc_tier": "tier_1",
"session_entropy": 0.793
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "BR",
"latency_ms": 464,
"timestamp": "2026-01-01T17:31:00Z",
"transaction_amount_usd": 33961.42
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.876,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 389215.09,
"financial_exposure_usd": 799318.54,
"recoverable_pct": 0.711
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108667",
"label": "benign",
"label_confidence": 0.744,
"severity": "low",
"timestamp": "2026-01-07T00:27:00Z",
"trace_id": "d9c7842a-4049-410f-57f8-87cd4044e5af"
} | {
"account_age_days": 676,
"account_id": "ACCT-F18F6572641D",
"baseline_risk_score": 0.104,
"kyc_tier": "tier_1",
"session_entropy": 0.907
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 736,
"timestamp": "2026-01-07T00:27:00Z",
"transaction_amount_usd": 5466.66
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.74,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 1746,
"financial_exposure_usd": 3039.39,
"recoverable_pct": 0.475
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102797",
"label": "fraudulent",
"label_confidence": 0.827,
"severity": "critical",
"timestamp": "2026-01-02T22:37:00Z",
"trace_id": "818d51db-8332-2d4e-4be4-39a36e1f99eb"
} | {
"account_age_days": 100,
"account_id": "ACCT-4B663128E8FC",
"baseline_risk_score": 0.341,
"kyc_tier": "tier_1",
"session_entropy": 0.577
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 285,
"timestamp": "2026-01-02T20:42:00Z",
"transaction_amount_usd": 6.9
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.948,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 530742.57,
"financial_exposure_usd": 640602.64,
"recoverable_pct": 0.804
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106734",
"label": "benign",
"label_confidence": 0.548,
"severity": "high",
"timestamp": "2026-01-05T16:14:00Z",
"trace_id": "1b136d10-74de-5742-7905-f10c07099965"
} | {
"account_age_days": 864,
"account_id": "ACCT-84ECDE9967DC",
"baseline_risk_score": 0.062,
"kyc_tier": "tier_2",
"session_entropy": 0.387
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 131,
"timestamp": "2026-01-05T04:56:00Z",
"transaction_amount_usd": 1.87
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.753,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 7084.63,
"financial_exposure_usd": 9926.41,
"recoverable_pct": 0.769
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101629",
"label": "fraudulent",
"label_confidence": 0.845,
"severity": "critical",
"timestamp": "2026-01-02T03:09:00Z",
"trace_id": "7560ffcd-4e91-869e-7ab4-a539faff3a4a"
} | {
"account_age_days": 397,
"account_id": "ACCT-A3FF8AD1DA23",
"baseline_risk_score": 0.423,
"kyc_tier": "tier_1",
"session_entropy": 0.611
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 270,
"timestamp": "2026-01-01T20:24:00Z",
"transaction_amount_usd": 23.33
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.491,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 319012.61,
"financial_exposure_usd": 620852.13,
"recoverable_pct": 0.235
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106535",
"label": "fraudulent",
"label_confidence": 0.811,
"severity": "high",
"timestamp": "2026-01-05T12:55:00Z",
"trace_id": "860ecd54-7b50-422d-9f63-6af00cc6e4a7"
} | {
"account_age_days": 1629,
"account_id": "ACCT-C4DBE4343BDD",
"baseline_risk_score": 0.156,
"kyc_tier": "tier_1",
"session_entropy": 0.133
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 268,
"timestamp": "2026-01-05T11:45:00Z",
"transaction_amount_usd": 22.01
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.795,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 9",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2259993.26,
"financial_exposure_usd": 3400064.14,
"recoverable_pct": 0.742
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100608",
"label": "fraudulent",
"label_confidence": 0.92,
"severity": "high",
"timestamp": "2026-01-01T10:08:00Z",
"trace_id": "2573ed56-8d51-dfb4-dc0c-644da6d1ebd5"
} | {
"account_age_days": 657,
"account_id": "ACCT-1153FC0A1EFE",
"baseline_risk_score": 0.518,
"kyc_tier": "tier_1",
"session_entropy": 0.49
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "JP",
"latency_ms": 1040,
"timestamp": "2026-01-01T10:08:00Z",
"transaction_amount_usd": 56075.8
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.681,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 301965.3,
"financial_exposure_usd": 605439.03,
"recoverable_pct": 0.681
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104302",
"label": "fraudulent",
"label_confidence": 0.899,
"severity": "medium",
"timestamp": "2026-01-03T23:42:00Z",
"trace_id": "00f8143f-397f-006a-20c6-32aebd3a99fa"
} | {
"account_age_days": 156,
"account_id": "ACCT-7D23EC701EE5",
"baseline_risk_score": 0.296,
"kyc_tier": "tier_2",
"session_entropy": 0.589
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 1047,
"timestamp": "2026-01-03T23:42:00Z",
"transaction_amount_usd": 1219214.89
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.528,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2804677.4,
"financial_exposure_usd": 5800737.12,
"recoverable_pct": 0.733
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106067",
"label": "fraudulent",
"label_confidence": 0.726,
"severity": "low",
"timestamp": "2026-01-05T05:07:00Z",
"trace_id": "e6537725-8f03-d307-e2b2-f24b14c81820"
} | {
"account_age_days": 638,
"account_id": "ACCT-DCD5257C5C50",
"baseline_risk_score": 0.338,
"kyc_tier": "tier_2",
"session_entropy": 0.342
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 342,
"timestamp": "2026-01-05T05:07:00Z",
"transaction_amount_usd": 1210153.58
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.857,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2409532.62,
"financial_exposure_usd": 3944700.43,
"recoverable_pct": 0.719
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101274",
"label": "fraudulent",
"label_confidence": 0.848,
"severity": "high",
"timestamp": "2026-01-01T21:14:00Z",
"trace_id": "bcafdb1d-884e-a8a6-4d1b-c018e7a08fed"
} | {
"account_age_days": 600,
"account_id": "ACCT-9A066C3C917F",
"baseline_risk_score": 0.399,
"kyc_tier": "tier_3",
"session_entropy": 0.168
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 1063,
"timestamp": "2026-01-01T21:14:00Z",
"transaction_amount_usd": 77813.56
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.429,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 261585.78,
"financial_exposure_usd": 469789.69,
"recoverable_pct": 0.068
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108252",
"label": "benign",
"label_confidence": 0.736,
"severity": "low",
"timestamp": "2026-01-06T17:32:00Z",
"trace_id": "eb4fe8d2-07d5-0858-f8b9-03e6f1f3e7fe"
} | {
"account_age_days": 473,
"account_id": "ACCT-8766FAC05065",
"baseline_risk_score": 0.102,
"kyc_tier": "tier_2",
"session_entropy": 0.213
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 305,
"timestamp": "2026-01-06T12:28:00Z",
"transaction_amount_usd": 3.2
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.63,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1322.39,
"financial_exposure_usd": 2953.04,
"recoverable_pct": 0.996
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103768",
"label": "fraudulent",
"label_confidence": 0.947,
"severity": "critical",
"timestamp": "2026-01-03T14:48:00Z",
"trace_id": "27c378a5-fa57-7462-ba7a-46ac55c63e9d"
} | {
"account_age_days": 1727,
"account_id": "ACCT-24E6F8A8D8D4",
"baseline_risk_score": 0.417,
"kyc_tier": "tier_1",
"session_entropy": 0.682
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 103,
"timestamp": "2026-01-03T14:48:00Z",
"transaction_amount_usd": 285216.77
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.44,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 5696782.87,
"financial_exposure_usd": 8824624.18,
"recoverable_pct": 0.818
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104326",
"label": "fraudulent",
"label_confidence": 0.645,
"severity": "medium",
"timestamp": "2026-01-04T00:06:00Z",
"trace_id": "6a457195-bd6a-5416-4d82-e7faa08cae6e"
} | {
"account_age_days": 838,
"account_id": "ACCT-25C372007188",
"baseline_risk_score": 0.291,
"kyc_tier": "tier_2",
"session_entropy": 0.199
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 179,
"timestamp": "2026-01-03T23:16:00Z",
"transaction_amount_usd": 19.27
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.626,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3314208.36,
"financial_exposure_usd": 8178055.04,
"recoverable_pct": 0.588
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109138",
"label": "benign",
"label_confidence": 0.543,
"severity": "low",
"timestamp": "2026-01-07T08:18:00Z",
"trace_id": "d3d0d313-a5cb-eeef-be10-447cb1de1c12"
} | {
"account_age_days": 1003,
"account_id": "ACCT-06036B8B6F90",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.178
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 159,
"timestamp": "2026-01-06T20:50:00Z",
"transaction_amount_usd": 10.15
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.573,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1376.76,
"financial_exposure_usd": 3405.67,
"recoverable_pct": 0.497
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109144",
"label": "benign",
"label_confidence": 0.519,
"severity": "low",
"timestamp": "2026-01-07T08:24:00Z",
"trace_id": "bdc7380b-4421-4dda-4977-b42658961ad9"
} | {
"account_age_days": 52,
"account_id": "ACCT-EC95BF2123F6",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.498
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 152,
"timestamp": "2026-01-07T08:24:00Z",
"transaction_amount_usd": 2590.02
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.493,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1405.14,
"financial_exposure_usd": 3469.81,
"recoverable_pct": 0.793
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109569",
"label": "benign",
"label_confidence": 0.546,
"severity": "low",
"timestamp": "2026-01-07T15:29:00Z",
"trace_id": "a27d1128-dd99-22e8-9477-381fb4b3984f"
} | {
"account_age_days": 1192,
"account_id": "ACCT-884F929CB8A2",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.361
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 265,
"timestamp": "2026-01-07T15:29:00Z",
"transaction_amount_usd": 5754.15
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.643,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1516.17,
"financial_exposure_usd": 2542.51,
"recoverable_pct": 0.844
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107176",
"label": "benign",
"label_confidence": 0.537,
"severity": "medium",
"timestamp": "2026-01-05T23:36:00Z",
"trace_id": "f55f37ef-b832-9b21-8b9b-6cb7a30782dd"
} | {
"account_age_days": 916,
"account_id": "ACCT-0928752851BA",
"baseline_risk_score": 0.176,
"kyc_tier": "tier_2",
"session_entropy": 0.16
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 510,
"timestamp": "2026-01-05T23:36:00Z",
"transaction_amount_usd": 2867.32
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.494,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1737.97,
"financial_exposure_usd": 2799.05,
"recoverable_pct": 0.971
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102741",
"label": "fraudulent",
"label_confidence": 0.956,
"severity": "critical",
"timestamp": "2026-01-02T21:41:00Z",
"trace_id": "d8ac0a90-2159-5dd3-c7f8-8b4fcfb45858"
} | {
"account_age_days": 1330,
"account_id": "ACCT-40C8D2E19E1C",
"baseline_risk_score": 0.371,
"kyc_tier": "tier_3",
"session_entropy": 0.837
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 718,
"timestamp": "2026-01-02T21:41:00Z",
"transaction_amount_usd": 9722.11
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.577,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 432245.25,
"financial_exposure_usd": 855879.61,
"recoverable_pct": 0.84
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106126",
"label": "fraudulent",
"label_confidence": 0.649,
"severity": "high",
"timestamp": "2026-01-05T06:06:00Z",
"trace_id": "5cf5454f-3e3b-9314-695f-683ff4e0325b"
} | {
"account_age_days": 1921,
"account_id": "ACCT-ECC97C4602EC",
"baseline_risk_score": 0.31,
"kyc_tier": "tier_2",
"session_entropy": 0.31
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 624,
"timestamp": "2026-01-05T06:06:00Z",
"transaction_amount_usd": 337782.85
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.491,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5188068.06,
"financial_exposure_usd": 5405717.91,
"recoverable_pct": 0.742
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106006",
"label": "fraudulent",
"label_confidence": 0.698,
"severity": "medium",
"timestamp": "2026-01-05T04:06:00Z",
"trace_id": "53bc0b09-d5f4-322f-2ce5-a507fbb6b7d2"
} | {
"account_age_days": 1108,
"account_id": "ACCT-EC28B868EAD3",
"baseline_risk_score": 0.436,
"kyc_tier": "tier_1",
"session_entropy": 0.137
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 931,
"timestamp": "2026-01-05T04:06:00Z",
"transaction_amount_usd": 781946.52
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.725,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4669952.33,
"financial_exposure_usd": 4773370.82,
"recoverable_pct": 0.427
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101389",
"label": "fraudulent",
"label_confidence": 0.774,
"severity": "high",
"timestamp": "2026-01-01T23:09:00Z",
"trace_id": "f2933086-0746-f869-54e2-dc3d6b74e5cd"
} | {
"account_age_days": 648,
"account_id": "ACCT-0DF96346F307",
"baseline_risk_score": 0.449,
"kyc_tier": "tier_1",
"session_entropy": 0.949
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 85,
"timestamp": "2026-01-01T19:26:00Z",
"transaction_amount_usd": 5.17
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.358,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 621696.64,
"financial_exposure_usd": 686954.03,
"recoverable_pct": 0.54
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102330",
"label": "fraudulent",
"label_confidence": 0.763,
"severity": "medium",
"timestamp": "2026-01-02T14:50:00Z",
"trace_id": "36eb8f96-3cfa-14af-b062-e79da7a9aa3e"
} | {
"account_age_days": 1406,
"account_id": "ACCT-EF9FB7CD4B7D",
"baseline_risk_score": 0.375,
"kyc_tier": "tier_3",
"session_entropy": 0.227
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 1151,
"timestamp": "2026-01-02T14:50:00Z",
"transaction_amount_usd": 83818.19
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.872,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 424925.48,
"financial_exposure_usd": 473276.35,
"recoverable_pct": 0.22
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105916",
"label": "fraudulent",
"label_confidence": 0.868,
"severity": "medium",
"timestamp": "2026-01-05T02:36:00Z",
"trace_id": "777a64b8-097f-9d41-4a86-b08b6d641514"
} | {
"account_age_days": 1231,
"account_id": "ACCT-D8C354B1BF2C",
"baseline_risk_score": 0.06,
"kyc_tier": "tier_3",
"session_entropy": 0.443
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 256,
"timestamp": "2026-01-04T16:28:00Z",
"transaction_amount_usd": 2.86
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.528,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4049432.93,
"financial_exposure_usd": 4757532.53,
"recoverable_pct": 0.49
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101258",
"label": "fraudulent",
"label_confidence": 0.882,
"severity": "medium",
"timestamp": "2026-01-01T20:58:00Z",
"trace_id": "9de465bf-dbcd-b613-cb59-5c1229ec055e"
} | {
"account_age_days": 174,
"account_id": "ACCT-BC1B9E794FFB",
"baseline_risk_score": 0.294,
"kyc_tier": "tier_1",
"session_entropy": 0.331
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "GB",
"latency_ms": 1027,
"timestamp": "2026-01-01T20:58:00Z",
"transaction_amount_usd": 27557.25
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.517,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 343586.4,
"financial_exposure_usd": 693347.81,
"recoverable_pct": 0.084
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108175",
"label": "benign",
"label_confidence": 0.531,
"severity": "low",
"timestamp": "2026-01-06T16:15:00Z",
"trace_id": "54f097a5-5f81-e740-331e-b8e5d97e8eaf"
} | {
"account_age_days": 318,
"account_id": "ACCT-E26FB9BA4EB7",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.291
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 345,
"timestamp": "2026-01-06T06:22:00Z",
"transaction_amount_usd": 21.75
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.568,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2164.38,
"financial_exposure_usd": 2984.3,
"recoverable_pct": 0.662
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106060",
"label": "fraudulent",
"label_confidence": 0.773,
"severity": "critical",
"timestamp": "2026-01-05T05:00:00Z",
"trace_id": "8ba0f341-0087-c812-eb34-3d5eb2886b3e"
} | {
"account_age_days": 96,
"account_id": "ACCT-7731FF6BF0E3",
"baseline_risk_score": 0.101,
"kyc_tier": "tier_3",
"session_entropy": 0.749
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 153,
"timestamp": "2026-01-05T01:46:00Z",
"transaction_amount_usd": 10.52
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.878,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3845729.2,
"financial_exposure_usd": 4791460.56,
"recoverable_pct": 0.97
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100349",
"label": "fraudulent",
"label_confidence": 0.789,
"severity": "critical",
"timestamp": "2026-01-01T05:49:00Z",
"trace_id": "c473d713-3335-3b1b-b045-70862877e76a"
} | {
"account_age_days": 1265,
"account_id": "ACCT-263F9B575EF9",
"baseline_risk_score": 0.313,
"kyc_tier": "tier_2",
"session_entropy": 0.205
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 309,
"timestamp": "2026-01-01T05:49:00Z",
"transaction_amount_usd": 68426.63
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.539,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 241886.36,
"financial_exposure_usd": 385211.26,
"recoverable_pct": 0.2
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102660",
"label": "fraudulent",
"label_confidence": 0.838,
"severity": "medium",
"timestamp": "2026-01-02T20:20:00Z",
"trace_id": "bb8d73c1-29df-2bc1-5488-ca815bc0ef0c"
} | {
"account_age_days": 738,
"account_id": "ACCT-1DBB7FBCE95C",
"baseline_risk_score": 0.584,
"kyc_tier": "tier_1",
"session_entropy": 0.398
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 167,
"timestamp": "2026-01-02T20:20:00Z",
"transaction_amount_usd": 71503.58
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.486,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 922404.66,
"financial_exposure_usd": 1360813.4,
"recoverable_pct": 0.144
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102116",
"label": "fraudulent",
"label_confidence": 0.939,
"severity": "critical",
"timestamp": "2026-01-02T11:16:00Z",
"trace_id": "04d06df1-c98f-e74c-3c2b-e5904103d5bc"
} | {
"account_age_days": 1978,
"account_id": "ACCT-1E9B4A08E8B4",
"baseline_risk_score": 0.283,
"kyc_tier": "tier_1",
"session_entropy": 0.537
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "DE",
"latency_ms": 673,
"timestamp": "2026-01-02T11:16:00Z",
"transaction_amount_usd": 98390.99
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.935,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 543843.06,
"financial_exposure_usd": 757223.5,
"recoverable_pct": 0.385
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101261",
"label": "fraudulent",
"label_confidence": 0.881,
"severity": "low",
"timestamp": "2026-01-01T21:01:00Z",
"trace_id": "8371106a-14ca-9a44-c529-5039832a3624"
} | {
"account_age_days": 480,
"account_id": "ACCT-3C8D76A3D140",
"baseline_risk_score": 0.404,
"kyc_tier": "tier_3",
"session_entropy": 0.931
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 119,
"timestamp": "2026-01-01T21:01:00Z",
"transaction_amount_usd": 82341.14
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.534,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 846957.54,
"financial_exposure_usd": 1007615.17,
"recoverable_pct": 0.595
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101078",
"label": "fraudulent",
"label_confidence": 0.931,
"severity": "high",
"timestamp": "2026-01-01T17:58:00Z",
"trace_id": "54c0f297-327f-720c-af35-73afd8c14239"
} | {
"account_age_days": 1966,
"account_id": "ACCT-49DAE75BCCEE",
"baseline_risk_score": 0.413,
"kyc_tier": "tier_2",
"session_entropy": 0.173
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 813,
"timestamp": "2026-01-01T17:58:00Z",
"transaction_amount_usd": 9084.54
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.871,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 394822.28,
"financial_exposure_usd": 445290.38,
"recoverable_pct": 0.688
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106211",
"label": "fraudulent",
"label_confidence": 0.691,
"severity": "low",
"timestamp": "2026-01-05T07:31:00Z",
"trace_id": "47ba83d3-4307-c58f-94c5-e42778d39632"
} | {
"account_age_days": 1650,
"account_id": "ACCT-4703879C62A0",
"baseline_risk_score": 0.254,
"kyc_tier": "tier_2",
"session_entropy": 0.669
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 176,
"timestamp": "2026-01-05T07:31:00Z",
"transaction_amount_usd": 1240126.94
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.63,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 2818683.07,
"financial_exposure_usd": 3710694.28,
"recoverable_pct": 0.529
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103184",
"label": "fraudulent",
"label_confidence": 0.855,
"severity": "medium",
"timestamp": "2026-01-03T05:04:00Z",
"trace_id": "b4dd8b0a-2b59-9a3e-a671-6e7fb9f28091"
} | {
"account_age_days": 480,
"account_id": "ACCT-9FA1A15974AF",
"baseline_risk_score": 0.268,
"kyc_tier": "tier_3",
"session_entropy": 0.256
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "US",
"latency_ms": 420,
"timestamp": "2026-01-03T05:04:00Z",
"transaction_amount_usd": 71009.54
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.471,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 330149.82,
"financial_exposure_usd": 415934.18,
"recoverable_pct": 0.05
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108460",
"label": "benign",
"label_confidence": 0.579,
"severity": "high",
"timestamp": "2026-01-06T21:00:00Z",
"trace_id": "6809c55b-540c-28d4-dda5-10cbca01b78b"
} | {
"account_age_days": 1985,
"account_id": "ACCT-3F80029E7E55",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.223
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 173,
"timestamp": "2026-01-06T18:36:00Z",
"transaction_amount_usd": 20.94
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.532,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 440.84,
"financial_exposure_usd": 869.53,
"recoverable_pct": 0.597
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107355",
"label": "benign",
"label_confidence": 0.459,
"severity": "high",
"timestamp": "2026-01-06T02:35:00Z",
"trace_id": "6ffab93b-324f-e80b-ea4f-d0cac9ddebcc"
} | {
"account_age_days": 1397,
"account_id": "ACCT-E733B395BCA4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.859
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 894,
"timestamp": "2026-01-06T02:35:00Z",
"transaction_amount_usd": 4677.96
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.796,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 668.2,
"financial_exposure_usd": 914.26,
"recoverable_pct": 0.568
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109956",
"label": "benign",
"label_confidence": 0.672,
"severity": "medium",
"timestamp": "2026-01-07T21:56:00Z",
"trace_id": "b248442c-28a3-5e57-17e0-ed14b5d78a26"
} | {
"account_age_days": 68,
"account_id": "ACCT-2EE5D7D3D49A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.949
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 1061,
"timestamp": "2026-01-07T21:56:00Z",
"transaction_amount_usd": 10055.95
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.678,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3287.08,
"financial_exposure_usd": 3828.92,
"recoverable_pct": 0.704
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104523",
"label": "fraudulent",
"label_confidence": 0.938,
"severity": "medium",
"timestamp": "2026-01-04T03:23:00Z",
"trace_id": "17440783-b9c4-d1d6-0bc2-602d7008c607"
} | {
"account_age_days": 1825,
"account_id": "ACCT-77EEFF85A76A",
"baseline_risk_score": 0.209,
"kyc_tier": "tier_3",
"session_entropy": 0.134
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 713,
"timestamp": "2026-01-04T03:23:00Z",
"transaction_amount_usd": 1684675.35
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.915,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3528972.61,
"financial_exposure_usd": 3930346.64,
"recoverable_pct": 0.662
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106777",
"label": "benign",
"label_confidence": 0.674,
"severity": "medium",
"timestamp": "2026-01-05T16:57:00Z",
"trace_id": "c3e4c899-c400-6b0b-c7e1-ee7e5b2c745b"
} | {
"account_age_days": 543,
"account_id": "ACCT-B3A12FC3EEC7",
"baseline_risk_score": 0.163,
"kyc_tier": "tier_3",
"session_entropy": 0.926
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 232,
"timestamp": "2026-01-05T13:19:00Z",
"transaction_amount_usd": 22.4
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.698,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2225.09,
"financial_exposure_usd": 4862.6,
"recoverable_pct": 0.49
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100864",
"label": "fraudulent",
"label_confidence": 0.958,
"severity": "high",
"timestamp": "2026-01-01T14:24:00Z",
"trace_id": "3d69410c-1c65-b270-e831-b595ea71fc0e"
} | {
"account_age_days": 652,
"account_id": "ACCT-BBCD2DA5BA29",
"baseline_risk_score": 0.458,
"kyc_tier": "tier_2",
"session_entropy": 0.875
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 213,
"timestamp": "2026-01-01T03:01:00Z",
"transaction_amount_usd": 21.39
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.486,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 1245331.42,
"financial_exposure_usd": 1248462.89,
"recoverable_pct": 0.426
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104867",
"label": "fraudulent",
"label_confidence": 0.682,
"severity": "low",
"timestamp": "2026-01-04T09:07:00Z",
"trace_id": "ae00a00c-3d5f-80e0-3a5b-5f5b152fc0bd"
} | {
"account_age_days": 314,
"account_id": "ACCT-E3241D00AFE5",
"baseline_risk_score": 0.34,
"kyc_tier": "tier_1",
"session_entropy": 0.662
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 1109,
"timestamp": "2026-01-04T09:07:00Z",
"transaction_amount_usd": 1967515.59
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_B... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.571,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4031568.31,
"financial_exposure_usd": 4861020.89,
"recoverable_pct": 0.736
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106477",
"label": "fraudulent",
"label_confidence": 0.739,
"severity": "high",
"timestamp": "2026-01-05T11:57:00Z",
"trace_id": "0079eeec-8d74-b365-c007-f0761a43fcff"
} | {
"account_age_days": 65,
"account_id": "ACCT-70FA89213B73",
"baseline_risk_score": 0.413,
"kyc_tier": "tier_1",
"session_entropy": 0.437
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 754,
"timestamp": "2026-01-05T11:57:00Z",
"transaction_amount_usd": 2230549.63
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.495,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 0, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 0,
"financial_exposure_usd": 0,
"recoverable_pct": 0.609
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108832",
"label": "benign",
"label_confidence": 0.658,
"severity": "low",
"timestamp": "2026-01-07T03:12:00Z",
"trace_id": "39ac1d54-0a7d-4b79-c6b4-cf397e65b221"
} | {
"account_age_days": 1007,
"account_id": "ACCT-E3788FEC01CE",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.336
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 388,
"timestamp": "2026-01-06T22:39:00Z",
"transaction_amount_usd": 15.57
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.542,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2750.51,
"financial_exposure_usd": 3127.32,
"recoverable_pct": 0.881
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109616",
"label": "benign",
"label_confidence": 0.702,
"severity": "low",
"timestamp": "2026-01-07T16:16:00Z",
"trace_id": "b43eafa8-9ba5-79e6-b0ee-40c0a717a6e1"
} | {
"account_age_days": 1038,
"account_id": "ACCT-84EE53EB348E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.678
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 91,
"timestamp": "2026-01-07T16:16:00Z",
"transaction_amount_usd": 6389.75
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.739,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1773.74,
"financial_exposure_usd": 2262.94,
"recoverable_pct": 0.646
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106804",
"label": "benign",
"label_confidence": 0.564,
"severity": "low",
"timestamp": "2026-01-05T17:24:00Z",
"trace_id": "825ba724-5e29-028d-0d20-8b7fe4a50d96"
} | {
"account_age_days": 624,
"account_id": "ACCT-A2942F2FD77A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.879
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 138,
"timestamp": "2026-01-05T17:24:00Z",
"transaction_amount_usd": 4074.65
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.608,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 4897.35,
"financial_exposure_usd": 6984.35,
"recoverable_pct": 0.877
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102469",
"label": "fraudulent",
"label_confidence": 0.98,
"severity": "high",
"timestamp": "2026-01-02T17:09:00Z",
"trace_id": "79dbd902-4a77-be99-1efa-5a839685f295"
} | {
"account_age_days": 407,
"account_id": "ACCT-7DD71EE86EA8",
"baseline_risk_score": 0.318,
"kyc_tier": "tier_3",
"session_entropy": 0.758
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 282,
"timestamp": "2026-01-02T10:28:00Z",
"transaction_amount_usd": 1.02
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.621,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 508171.72,
"financial_exposure_usd": 1010904.07,
"recoverable_pct": 0.212
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100183",
"label": "fraudulent",
"label_confidence": 0.788,
"severity": "low",
"timestamp": "2026-01-01T03:03:00Z",
"trace_id": "3506e337-683d-21a9-014b-069c45ce5149"
} | {
"account_age_days": 50,
"account_id": "ACCT-6A5731F76E78",
"baseline_risk_score": 0.5,
"kyc_tier": "tier_2",
"session_entropy": 0.946
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 731,
"timestamp": "2026-01-01T03:03:00Z",
"transaction_amount_usd": 79036.93
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.796,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 649446.14,
"financial_exposure_usd": 1038830.27,
"recoverable_pct": 0.457
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104698",
"label": "fraudulent",
"label_confidence": 0.891,
"severity": "medium",
"timestamp": "2026-01-04T06:18:00Z",
"trace_id": "8a174c21-fec4-638c-cc81-fd1cb9d817f4"
} | {
"account_age_days": 1215,
"account_id": "ACCT-89D070A05004",
"baseline_risk_score": 0.366,
"kyc_tier": "tier_2",
"session_entropy": 0.947
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 709,
"timestamp": "2026-01-04T06:18:00Z",
"transaction_amount_usd": 2397524.55
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.779,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2716543.22,
"financial_exposure_usd": 4332379.89,
"recoverable_pct": 0.666
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104711",
"label": "fraudulent",
"label_confidence": 0.931,
"severity": "high",
"timestamp": "2026-01-04T06:31:00Z",
"trace_id": "9f73ee8b-3e7c-246d-1703-a5d30af46520"
} | {
"account_age_days": 971,
"account_id": "ACCT-ACCDB1A67C9E",
"baseline_risk_score": 0.2,
"kyc_tier": "tier_3",
"session_entropy": 0.784
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 304,
"timestamp": "2026-01-04T01:09:00Z",
"transaction_amount_usd": 24.14
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.584,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3374466.24,
"financial_exposure_usd": 5613558.2,
"recoverable_pct": 0.812
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106520",
"label": "fraudulent",
"label_confidence": 0.825,
"severity": "critical",
"timestamp": "2026-01-05T12:40:00Z",
"trace_id": "f3855b98-c0dc-4c53-e51d-03582dbdc474"
} | {
"account_age_days": 479,
"account_id": "ACCT-7630EE69D85A",
"baseline_risk_score": 0.376,
"kyc_tier": "tier_2",
"session_entropy": 0.61
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 215,
"timestamp": "2026-01-05T12:40:00Z",
"transaction_amount_usd": 350737.54
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.354,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1553859.1,
"financial_exposure_usd": 2672831.77,
"recoverable_pct": 0.708
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101501",
"label": "fraudulent",
"label_confidence": 0.936,
"severity": "high",
"timestamp": "2026-01-02T01:01:00Z",
"trace_id": "11dae088-76f6-0d34-c95a-230109602516"
} | {
"account_age_days": 1476,
"account_id": "ACCT-B9C51EAE2248",
"baseline_risk_score": 0.604,
"kyc_tier": "tier_2",
"session_entropy": 0.721
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 650,
"timestamp": "2026-01-02T01:01:00Z",
"transaction_amount_usd": 51894.24
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.715,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 127536.51,
"financial_exposure_usd": 293208.18,
"recoverable_pct": 0.811
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109986",
"label": "benign",
"label_confidence": 0.517,
"severity": "high",
"timestamp": "2026-01-07T22:26:00Z",
"trace_id": "5dc00f2b-5b37-bfcc-3c79-d7a60921c6a0"
} | {
"account_age_days": 1837,
"account_id": "ACCT-3CA287EF486A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.573
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 398,
"timestamp": "2026-01-07T22:26:00Z",
"transaction_amount_usd": 8862.56
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.787,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2085.33,
"financial_exposure_usd": 3558,
"recoverable_pct": 0.865
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103034",
"label": "fraudulent",
"label_confidence": 0.871,
"severity": "high",
"timestamp": "2026-01-03T02:34:00Z",
"trace_id": "37795a67-3e32-4b2d-186d-b9eb6a5631cf"
} | {
"account_age_days": 873,
"account_id": "ACCT-90011399F347",
"baseline_risk_score": 0.261,
"kyc_tier": "tier_1",
"session_entropy": 0.241
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 148,
"timestamp": "2026-01-02T16:47:00Z",
"transaction_amount_usd": 0.84
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.596,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 146339.92,
"financial_exposure_usd": 360658.5,
"recoverable_pct": 0.641
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.