schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104574",
"label": "fraudulent",
"label_confidence": 0.778,
"severity": "high",
"timestamp": "2026-01-04T04:14:00Z",
"trace_id": "e250c4ee-014f-a546-34a7-88da06b37a9e"
} | {
"account_age_days": 1197,
"account_id": "ACCT-698643FC32DE",
"baseline_risk_score": 0.236,
"kyc_tier": "tier_2",
"session_entropy": 0.733
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 101,
"timestamp": "2026-01-04T02:16:00Z",
"transaction_amount_usd": 18.51
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.633,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2503871.73,
"financial_exposure_usd": 4498905.9,
"recoverable_pct": 0.937
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104690",
"label": "fraudulent",
"label_confidence": 0.602,
"severity": "medium",
"timestamp": "2026-01-04T06:10:00Z",
"trace_id": "263dea7a-e450-a166-4902-4e9fd920c1a7"
} | {
"account_age_days": 1914,
"account_id": "ACCT-9061891E3F29",
"baseline_risk_score": 0.252,
"kyc_tier": "tier_3",
"session_entropy": 0.497
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 352,
"timestamp": "2026-01-03T22:40:00Z",
"transaction_amount_usd": 24.37
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.403,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2264974.83,
"financial_exposure_usd": 4327402.62,
"recoverable_pct": 0.774
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106166",
"label": "fraudulent",
"label_confidence": 0.789,
"severity": "critical",
"timestamp": "2026-01-05T06:46:00Z",
"trace_id": "b1f50146-ef07-14d7-7aea-2f2e0f9d5386"
} | {
"account_age_days": 1959,
"account_id": "ACCT-888BFB7F2805",
"baseline_risk_score": 0.18,
"kyc_tier": "tier_3",
"session_entropy": 0.291
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 116,
"timestamp": "2026-01-05T06:46:00Z",
"transaction_amount_usd": 826598.08
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.905,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1845320.82,
"financial_exposure_usd": 2217904.35,
"recoverable_pct": 0.494
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101532",
"label": "fraudulent",
"label_confidence": 0.922,
"severity": "medium",
"timestamp": "2026-01-02T01:32:00Z",
"trace_id": "50ee5ecc-63c8-4be8-0dd0-0e0697e235c3"
} | {
"account_age_days": 431,
"account_id": "ACCT-5F8737C7A9EB",
"baseline_risk_score": 0.467,
"kyc_tier": "tier_1",
"session_entropy": 0.206
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 110,
"timestamp": "2026-01-01T15:21:00Z",
"transaction_amount_usd": 5.32
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.892,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 198075.79,
"financial_exposure_usd": 394739.14,
"recoverable_pct": 0.839
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104881",
"label": "fraudulent",
"label_confidence": 0.801,
"severity": "critical",
"timestamp": "2026-01-04T09:21:00Z",
"trace_id": "487e8a1b-7c3e-339a-088d-11365c1a4d36"
} | {
"account_age_days": 228,
"account_id": "ACCT-59DFAFA222C3",
"baseline_risk_score": 0.345,
"kyc_tier": "tier_2",
"session_entropy": 0.395
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 396,
"timestamp": "2026-01-04T09:21:00Z",
"transaction_amount_usd": 454074.55
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.405,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2841729.7,
"financial_exposure_usd": 6142895.18,
"recoverable_pct": 0.986
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102344",
"label": "fraudulent",
"label_confidence": 0.976,
"severity": "medium",
"timestamp": "2026-01-02T15:04:00Z",
"trace_id": "f28b96d5-5e09-5cfc-058b-4838390d3752"
} | {
"account_age_days": 1538,
"account_id": "ACCT-9583125DD72E",
"baseline_risk_score": 0.582,
"kyc_tier": "tier_1",
"session_entropy": 0.325
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 163,
"timestamp": "2026-01-02T15:04:00Z",
"transaction_amount_usd": 9685.61
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.354,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 717457.16,
"financial_exposure_usd": 947979.31,
"recoverable_pct": 0.723
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104276",
"label": "fraudulent",
"label_confidence": 0.733,
"severity": "medium",
"timestamp": "2026-01-03T23:16:00Z",
"trace_id": "cfdadf8a-bd82-7f3f-a3ec-c79554d53f8c"
} | {
"account_age_days": 644,
"account_id": "ACCT-B5F2F2F1208B",
"baseline_risk_score": 0.128,
"kyc_tier": "tier_2",
"session_entropy": 0.637
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 686,
"timestamp": "2026-01-03T23:16:00Z",
"transaction_amount_usd": 1342286.48
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.683,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2195082.97,
"financial_exposure_usd": 3709795.97,
"recoverable_pct": 0.691
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106940",
"label": "benign",
"label_confidence": 0.606,
"severity": "high",
"timestamp": "2026-01-05T19:40:00Z",
"trace_id": "d0610c15-e5ce-95f6-ed2d-f269dd572777"
} | {
"account_age_days": 1603,
"account_id": "ACCT-932422887706",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.869
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 184,
"timestamp": "2026-01-05T18:07:00Z",
"transaction_amount_usd": 5.45
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.799,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2443.18,
"financial_exposure_usd": 3805.27,
"recoverable_pct": 0.853
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107680",
"label": "benign",
"label_confidence": 0.588,
"severity": "medium",
"timestamp": "2026-01-06T08:00:00Z",
"trace_id": "aeae923d-4749-c9ff-1c07-5cc0f1c73802"
} | {
"account_age_days": 562,
"account_id": "ACCT-1BFF5E2B721F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.792
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 723,
"timestamp": "2026-01-06T08:00:00Z",
"transaction_amount_usd": 11874.34
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.53,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 635.78,
"financial_exposure_usd": 1437.88,
"recoverable_pct": 0.464
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101224",
"label": "fraudulent",
"label_confidence": 0.878,
"severity": "critical",
"timestamp": "2026-01-01T20:24:00Z",
"trace_id": "7b138c6b-d31e-57cb-5555-61a4d6109ef4"
} | {
"account_age_days": 1378,
"account_id": "ACCT-4D5BFB8D0F54",
"baseline_risk_score": 0.436,
"kyc_tier": "tier_2",
"session_entropy": 0.721
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "GB",
"latency_ms": 671,
"timestamp": "2026-01-01T20:24:00Z",
"transaction_amount_usd": 37457.53
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.376,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 272904.33,
"financial_exposure_usd": 296980.45,
"recoverable_pct": 0.132
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105070",
"label": "fraudulent",
"label_confidence": 0.682,
"severity": "high",
"timestamp": "2026-01-04T12:30:00Z",
"trace_id": "182e695b-9677-6594-fa50-1474f4499def"
} | {
"account_age_days": 1790,
"account_id": "ACCT-8E520ED1719B",
"baseline_risk_score": 0.438,
"kyc_tier": "tier_2",
"session_entropy": 0.371
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 345,
"timestamp": "2026-01-04T12:30:00Z",
"transaction_amount_usd": 1714323.33
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.839,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2199742.13,
"financial_exposure_usd": 4802733.99,
"recoverable_pct": 0.743
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106128",
"label": "fraudulent",
"label_confidence": 0.936,
"severity": "critical",
"timestamp": "2026-01-05T06:08:00Z",
"trace_id": "bbc32cfe-68b0-91c6-e437-63150be5ef4c"
} | {
"account_age_days": 1998,
"account_id": "ACCT-994CA859C1AC",
"baseline_risk_score": 0.312,
"kyc_tier": "tier_2",
"session_entropy": 0.165
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 140,
"timestamp": "2026-01-05T06:08:00Z",
"transaction_amount_usd": 2104214.69
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.57,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 2210898.69,
"financial_exposure_usd": 4568488.47,
"recoverable_pct": 0.587
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103758",
"label": "fraudulent",
"label_confidence": 0.826,
"severity": "high",
"timestamp": "2026-01-03T14:38:00Z",
"trace_id": "75bc6b14-6d6d-8d1a-1966-4f08b07fc2de"
} | {
"account_age_days": 973,
"account_id": "ACCT-8A14DC6B5350",
"baseline_risk_score": 0.424,
"kyc_tier": "tier_3",
"session_entropy": 0.917
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 282,
"timestamp": "2026-01-03T12:03:00Z",
"transaction_amount_usd": 13.76
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.877,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5701126.92,
"financial_exposure_usd": 7418952.78,
"recoverable_pct": 0.889
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109612",
"label": "benign",
"label_confidence": 0.519,
"severity": "medium",
"timestamp": "2026-01-07T16:12:00Z",
"trace_id": "118b88f4-1a65-470d-e832-8dffe22d9f65"
} | {
"account_age_days": 396,
"account_id": "ACCT-7C1586402E1C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.48
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 1122,
"timestamp": "2026-01-07T16:12:00Z",
"transaction_amount_usd": 8075.02
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.452,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 686.12,
"financial_exposure_usd": 1128.71,
"recoverable_pct": 0.808
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109193",
"label": "benign",
"label_confidence": 0.717,
"severity": "low",
"timestamp": "2026-01-07T09:13:00Z",
"trace_id": "845b6663-6a46-6a48-e0ea-7ac741e0b924"
} | {
"account_age_days": 818,
"account_id": "ACCT-1EA6797657C0",
"baseline_risk_score": 0.062,
"kyc_tier": "tier_3",
"session_entropy": 0.479
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 276,
"timestamp": "2026-01-07T03:12:00Z",
"transaction_amount_usd": 16.18
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.526,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1931.14,
"financial_exposure_usd": 2655.91,
"recoverable_pct": 0.519
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108782",
"label": "benign",
"label_confidence": 0.602,
"severity": "high",
"timestamp": "2026-01-07T02:22:00Z",
"trace_id": "e8ce0c36-86a8-69ec-0883-d6289c291b2f"
} | {
"account_age_days": 285,
"account_id": "ACCT-24C251BD1A77",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.482
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 387,
"timestamp": "2026-01-07T02:22:00Z",
"transaction_amount_usd": 6621
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.643,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 541.96,
"financial_exposure_usd": 763.87,
"recoverable_pct": 0.965
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103642",
"label": "fraudulent",
"label_confidence": 0.723,
"severity": "high",
"timestamp": "2026-01-03T12:42:00Z",
"trace_id": "0c3f13ea-18af-c999-1058-f18b6f8c8d14"
} | {
"account_age_days": 1167,
"account_id": "ACCT-38AA6E73AD2F",
"baseline_risk_score": 0.349,
"kyc_tier": "tier_3",
"session_entropy": 0.551
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 401,
"timestamp": "2026-01-03T12:42:00Z",
"transaction_amount_usd": 1037289.87
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.453,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1634168.34,
"financial_exposure_usd": 2531087.36,
"recoverable_pct": 0.892
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102795",
"label": "fraudulent",
"label_confidence": 0.906,
"severity": "high",
"timestamp": "2026-01-02T22:35:00Z",
"trace_id": "c71f7384-6fdb-b380-1611-21cb7953303d"
} | {
"account_age_days": 958,
"account_id": "ACCT-4440E599DC82",
"baseline_risk_score": 0.596,
"kyc_tier": "tier_3",
"session_entropy": 0.731
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 296,
"timestamp": "2026-01-02T22:35:00Z",
"transaction_amount_usd": 38569.49
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.474,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 804438.3,
"financial_exposure_usd": 956138.08,
"recoverable_pct": 0.162
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103906",
"label": "fraudulent",
"label_confidence": 0.753,
"severity": "medium",
"timestamp": "2026-01-03T17:06:00Z",
"trace_id": "d8b470c4-ff0d-5678-2a87-6258f2c851cd"
} | {
"account_age_days": 154,
"account_id": "ACCT-FD1CC321EC23",
"baseline_risk_score": 0.367,
"kyc_tier": "tier_2",
"session_entropy": 0.619
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 873,
"timestamp": "2026-01-03T17:06:00Z",
"transaction_amount_usd": 1835133.09
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.546,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2772947.95,
"financial_exposure_usd": 4361203.61,
"recoverable_pct": 0.465
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100594",
"label": "fraudulent",
"label_confidence": 0.772,
"severity": "critical",
"timestamp": "2026-01-01T09:54:00Z",
"trace_id": "3f0accd5-4046-249a-a886-15a9f7a9fcf1"
} | {
"account_age_days": 1825,
"account_id": "ACCT-4DAF99919182",
"baseline_risk_score": 0.65,
"kyc_tier": "tier_1",
"session_entropy": 0.455
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 324,
"timestamp": "2026-01-01T09:54:00Z",
"transaction_amount_usd": 113834
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.446,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 974998.05,
"financial_exposure_usd": 1033460.3,
"recoverable_pct": 0.818
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102568",
"label": "fraudulent",
"label_confidence": 0.87,
"severity": "high",
"timestamp": "2026-01-02T18:48:00Z",
"trace_id": "bebd44a7-82c1-4577-c998-56c2bce6c46b"
} | {
"account_age_days": 634,
"account_id": "ACCT-80C6B690C646",
"baseline_risk_score": 0.492,
"kyc_tier": "tier_2",
"session_entropy": 0.6
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "MY",
"latency_ms": 1136,
"timestamp": "2026-01-02T18:48:00Z",
"transaction_amount_usd": 114772.47
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.911,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 1319560.69,
"financial_exposure_usd": 1454288.21,
"recoverable_pct": 0.051
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106429",
"label": "fraudulent",
"label_confidence": 0.908,
"severity": "critical",
"timestamp": "2026-01-05T11:09:00Z",
"trace_id": "efa2c02d-b400-1e33-970e-a3b97f73c928"
} | {
"account_age_days": 374,
"account_id": "ACCT-2C9A664EAA9A",
"baseline_risk_score": 0.364,
"kyc_tier": "tier_1",
"session_entropy": 0.892
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 796,
"timestamp": "2026-01-05T11:09:00Z",
"transaction_amount_usd": 963545.4
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.354,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4841207.94,
"financial_exposure_usd": 6229686.09,
"recoverable_pct": 0.615
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102863",
"label": "fraudulent",
"label_confidence": 0.903,
"severity": "high",
"timestamp": "2026-01-02T23:43:00Z",
"trace_id": "4881190e-7d74-85f3-2e9f-784d97624fa0"
} | {
"account_age_days": 1281,
"account_id": "ACCT-D044F52C1977",
"baseline_risk_score": 0.438,
"kyc_tier": "tier_2",
"session_entropy": 0.74
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 995,
"timestamp": "2026-01-02T23:43:00Z",
"transaction_amount_usd": 35486.79
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.62,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 287881.46,
"financial_exposure_usd": 716194.92,
"recoverable_pct": 0.672
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105714",
"label": "fraudulent",
"label_confidence": 0.635,
"severity": "high",
"timestamp": "2026-01-04T23:14:00Z",
"trace_id": "97077754-a4ad-03cb-ae2c-8ab32bcd200a"
} | {
"account_age_days": 1768,
"account_id": "ACCT-0DA80C847F45",
"baseline_risk_score": 0.327,
"kyc_tier": "tier_1",
"session_entropy": 0.625
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 629,
"timestamp": "2026-01-04T23:14:00Z",
"transaction_amount_usd": 2686314.94
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.868,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3322357.17,
"financial_exposure_usd": 6301832.03,
"recoverable_pct": 0.524
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105951",
"label": "fraudulent",
"label_confidence": 0.789,
"severity": "high",
"timestamp": "2026-01-05T03:11:00Z",
"trace_id": "4f74080c-5441-304f-ca7e-40fc3aea18ac"
} | {
"account_age_days": 1236,
"account_id": "ACCT-E56CE64F0986",
"baseline_risk_score": 0.325,
"kyc_tier": "tier_1",
"session_entropy": 0.915
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 154,
"timestamp": "2026-01-05T03:11:00Z",
"transaction_amount_usd": 1822111.92
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.523,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 7662734.5,
"financial_exposure_usd": 8626546.42,
"recoverable_pct": 0.607
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101225",
"label": "fraudulent",
"label_confidence": 0.959,
"severity": "medium",
"timestamp": "2026-01-01T20:25:00Z",
"trace_id": "29305899-24e2-2912-83a6-88e2ba7ae0a5"
} | {
"account_age_days": 1974,
"account_id": "ACCT-577AA63BF28B",
"baseline_risk_score": 0.501,
"kyc_tier": "tier_1",
"session_entropy": 0.489
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "JP",
"latency_ms": 1103,
"timestamp": "2026-01-01T20:25:00Z",
"transaction_amount_usd": 88151.99
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.36,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 416924.58,
"financial_exposure_usd": 611238.43,
"recoverable_pct": 0.506
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106253",
"label": "fraudulent",
"label_confidence": 0.949,
"severity": "critical",
"timestamp": "2026-01-05T08:13:00Z",
"trace_id": "7e8e477e-f62e-3a40-8eb6-cae3648b820b"
} | {
"account_age_days": 587,
"account_id": "ACCT-93CC02B432D8",
"baseline_risk_score": 0.189,
"kyc_tier": "tier_1",
"session_entropy": 0.863
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 379,
"timestamp": "2026-01-05T01:24:00Z",
"transaction_amount_usd": 5.01
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.573,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2654785.6,
"financial_exposure_usd": 3445896.41,
"recoverable_pct": 0.457
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106498",
"label": "fraudulent",
"label_confidence": 0.79,
"severity": "high",
"timestamp": "2026-01-05T12:18:00Z",
"trace_id": "b7123d47-caae-c773-9fe7-d19b4822aad2"
} | {
"account_age_days": 549,
"account_id": "ACCT-1EA052EEE194",
"baseline_risk_score": 0.318,
"kyc_tier": "tier_3",
"session_entropy": 0.654
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 167,
"timestamp": "2026-01-05T08:02:00Z",
"transaction_amount_usd": 8.08
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.57,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 2864492.35,
"financial_exposure_usd": 4259613.97,
"recoverable_pct": 0.914
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109914",
"label": "benign",
"label_confidence": 0.544,
"severity": "low",
"timestamp": "2026-01-07T21:14:00Z",
"trace_id": "7fd13c42-b610-6c57-467f-858cae4217dd"
} | {
"account_age_days": 1015,
"account_id": "ACCT-ABD19615B746",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.732
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 459,
"timestamp": "2026-01-07T21:14:00Z",
"transaction_amount_usd": 315.35
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.483,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1959.95,
"financial_exposure_usd": 3881.28,
"recoverable_pct": 0.71
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102263",
"label": "fraudulent",
"label_confidence": 0.935,
"severity": "high",
"timestamp": "2026-01-02T13:43:00Z",
"trace_id": "d995ecb6-f034-81c5-35d0-07c7b75aa791"
} | {
"account_age_days": 1252,
"account_id": "ACCT-EE219C889F84",
"baseline_risk_score": 0.322,
"kyc_tier": "tier_3",
"session_entropy": 0.5
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 825,
"timestamp": "2026-01-02T13:43:00Z",
"transaction_amount_usd": 103410.93
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.529,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 247861.18,
"financial_exposure_usd": 555901.34,
"recoverable_pct": 0.575
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109368",
"label": "benign",
"label_confidence": 0.697,
"severity": "low",
"timestamp": "2026-01-07T12:08:00Z",
"trace_id": "7574240e-0929-cb6d-fdc7-99d5e0b331f9"
} | {
"account_age_days": 1403,
"account_id": "ACCT-C521E97C2E93",
"baseline_risk_score": 0.071,
"kyc_tier": "tier_3",
"session_entropy": 0.503
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 99,
"timestamp": "2026-01-07T08:40:00Z",
"transaction_amount_usd": 15.41
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.795,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3121.55,
"financial_exposure_usd": 3689.83,
"recoverable_pct": 0.572
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102732",
"label": "fraudulent",
"label_confidence": 0.788,
"severity": "critical",
"timestamp": "2026-01-02T21:32:00Z",
"trace_id": "422af2f5-9a03-2684-88f1-8f9c11af5a66"
} | {
"account_age_days": 845,
"account_id": "ACCT-42A03BBFC089",
"baseline_risk_score": 0.447,
"kyc_tier": "tier_1",
"session_entropy": 0.265
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 356,
"timestamp": "2026-01-02T16:29:00Z",
"transaction_amount_usd": 8.02
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.865,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 818527.49,
"financial_exposure_usd": 1109631.75,
"recoverable_pct": 0.755
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109031",
"label": "benign",
"label_confidence": 0.522,
"severity": "low",
"timestamp": "2026-01-07T06:31:00Z",
"trace_id": "b073e7d9-4bb8-7df6-5830-48fec3f1d7bf"
} | {
"account_age_days": 37,
"account_id": "ACCT-50FB6580557E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.946
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 81,
"timestamp": "2026-01-07T02:08:00Z",
"transaction_amount_usd": 12.63
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.598,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2070.55,
"financial_exposure_usd": 2258.36,
"recoverable_pct": 0.406
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108664",
"label": "benign",
"label_confidence": 0.482,
"severity": "low",
"timestamp": "2026-01-07T00:24:00Z",
"trace_id": "d7772ce0-0965-7d3b-6e47-72ffce777044"
} | {
"account_age_days": 726,
"account_id": "ACCT-F925FCB05067",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.269
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 152,
"timestamp": "2026-01-06T15:20:00Z",
"transaction_amount_usd": 2.9
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.712,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 865.94,
"financial_exposure_usd": 1507.86,
"recoverable_pct": 0.691
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105736",
"label": "fraudulent",
"label_confidence": 0.839,
"severity": "medium",
"timestamp": "2026-01-04T23:36:00Z",
"trace_id": "9158dbab-8e78-0ab9-5e91-6ca98bd5c5ee"
} | {
"account_age_days": 506,
"account_id": "ACCT-1D7F9DB3CD63",
"baseline_risk_score": 0.232,
"kyc_tier": "tier_1",
"session_entropy": 0.845
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 377,
"timestamp": "2026-01-04T23:36:00Z",
"transaction_amount_usd": 2969551.01
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.91,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1971541.31,
"financial_exposure_usd": 4064826.8,
"recoverable_pct": 0.588
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108019",
"label": "benign",
"label_confidence": 0.479,
"severity": "high",
"timestamp": "2026-01-06T13:39:00Z",
"trace_id": "cf554c60-dc40-78d3-517c-f1e74fc1489c"
} | {
"account_age_days": 1918,
"account_id": "ACCT-4C4D7A13D62E",
"baseline_risk_score": 0.139,
"kyc_tier": "tier_1",
"session_entropy": 0.116
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 263,
"timestamp": "2026-01-06T13:39:00Z",
"transaction_amount_usd": 11718.41
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.597,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1951.49,
"financial_exposure_usd": 2491.02,
"recoverable_pct": 0.676
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107875",
"label": "benign",
"label_confidence": 0.483,
"severity": "low",
"timestamp": "2026-01-06T11:15:00Z",
"trace_id": "02752112-cccf-89b5-a285-1597b18f36eb"
} | {
"account_age_days": 1733,
"account_id": "ACCT-216DD3ED2C46",
"baseline_risk_score": 0.183,
"kyc_tier": "tier_1",
"session_entropy": 0.619
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 869,
"timestamp": "2026-01-06T11:15:00Z",
"transaction_amount_usd": 5786.99
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.75,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 858.68,
"financial_exposure_usd": 1378.02,
"recoverable_pct": 0.611
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102658",
"label": "fraudulent",
"label_confidence": 0.968,
"severity": "high",
"timestamp": "2026-01-02T20:18:00Z",
"trace_id": "1f094a3d-e10d-d207-34b9-912ef326a1bd"
} | {
"account_age_days": 1647,
"account_id": "ACCT-F9138C6769F6",
"baseline_risk_score": 0.393,
"kyc_tier": "tier_3",
"session_entropy": 0.644
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 984,
"timestamp": "2026-01-02T20:18:00Z",
"transaction_amount_usd": 75426.77
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.627,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 82215.05,
"financial_exposure_usd": 136120.29,
"recoverable_pct": 0.534
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101527",
"label": "fraudulent",
"label_confidence": 0.961,
"severity": "high",
"timestamp": "2026-01-02T01:27:00Z",
"trace_id": "a063d13f-f90d-2a25-73d5-7f2f32fb5383"
} | {
"account_age_days": 733,
"account_id": "ACCT-E6EF508F1A05",
"baseline_risk_score": 0.455,
"kyc_tier": "tier_1",
"session_entropy": 0.378
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 877,
"timestamp": "2026-01-02T01:27:00Z",
"transaction_amount_usd": 32135.21
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.796,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 436399.48,
"financial_exposure_usd": 918292.43,
"recoverable_pct": 0.428
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106808",
"label": "benign",
"label_confidence": 0.59,
"severity": "low",
"timestamp": "2026-01-05T17:28:00Z",
"trace_id": "daeede97-9aa1-1e43-3ec4-ec979fa47c26"
} | {
"account_age_days": 954,
"account_id": "ACCT-D565C35EC1DD",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.143
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 708,
"timestamp": "2026-01-05T17:28:00Z",
"transaction_amount_usd": 948.59
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.753,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 5893.08,
"financial_exposure_usd": 10355.06,
"recoverable_pct": 0.608
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108978",
"label": "benign",
"label_confidence": 0.68,
"severity": "low",
"timestamp": "2026-01-07T05:38:00Z",
"trace_id": "cbe825ca-145c-a585-b055-60dce6fa7ea5"
} | {
"account_age_days": 127,
"account_id": "ACCT-803DAE56B123",
"baseline_risk_score": 0.092,
"kyc_tier": "tier_2",
"session_entropy": 0.787
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 295,
"timestamp": "2026-01-07T05:38:00Z",
"transaction_amount_usd": 13321.7
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.569,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1094.03,
"financial_exposure_usd": 1387.71,
"recoverable_pct": 0.462
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103435",
"label": "fraudulent",
"label_confidence": 0.802,
"severity": "high",
"timestamp": "2026-01-03T09:15:00Z",
"trace_id": "d62e0ad3-1a77-2b2c-3430-51e03c3e9175"
} | {
"account_age_days": 607,
"account_id": "ACCT-3C9911539F23",
"baseline_risk_score": 0.115,
"kyc_tier": "tier_3",
"session_entropy": 0.215
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 367,
"timestamp": "2026-01-03T08:19:00Z",
"transaction_amount_usd": 8.3
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.928,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3965150.52,
"financial_exposure_usd": 6255644.97,
"recoverable_pct": 0.853
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106234",
"label": "fraudulent",
"label_confidence": 0.649,
"severity": "low",
"timestamp": "2026-01-05T07:54:00Z",
"trace_id": "50593b92-116b-a3b6-ca73-2420f3dfbb85"
} | {
"account_age_days": 634,
"account_id": "ACCT-929202B7B4EA",
"baseline_risk_score": 0.353,
"kyc_tier": "tier_3",
"session_entropy": 0.906
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 956,
"timestamp": "2026-01-05T07:54:00Z",
"transaction_amount_usd": 2928286.74
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.586,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1256573.05,
"financial_exposure_usd": 1334278.98,
"recoverable_pct": 0.763
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105797",
"label": "fraudulent",
"label_confidence": 0.671,
"severity": "medium",
"timestamp": "2026-01-05T00:37:00Z",
"trace_id": "c0774b21-ce98-24e3-b59a-041df6f0d6c1"
} | {
"account_age_days": 1146,
"account_id": "ACCT-F6A68BC0CB4A",
"baseline_risk_score": 0.095,
"kyc_tier": "tier_1",
"session_entropy": 0.122
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 512,
"timestamp": "2026-01-05T00:37:00Z",
"transaction_amount_usd": 847351.07
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.939,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1726540.74,
"financial_exposure_usd": 1992751.83,
"recoverable_pct": 0.419
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103791",
"label": "fraudulent",
"label_confidence": 0.86,
"severity": "medium",
"timestamp": "2026-01-03T15:11:00Z",
"trace_id": "b188442a-b6f1-d878-4bfb-98dd858092e7"
} | {
"account_age_days": 1593,
"account_id": "ACCT-48F4B673FD6F",
"baseline_risk_score": 0.287,
"kyc_tier": "tier_3",
"session_entropy": 0.454
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 1028,
"timestamp": "2026-01-03T15:11:00Z",
"transaction_amount_usd": 538739.47
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.774,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3394955.48,
"financial_exposure_usd": 5808114.4,
"recoverable_pct": 0.739
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109505",
"label": "benign",
"label_confidence": 0.743,
"severity": "medium",
"timestamp": "2026-01-07T14:25:00Z",
"trace_id": "69d362fd-5654-aa28-e712-f24e4f5ecdac"
} | {
"account_age_days": 678,
"account_id": "ACCT-4BACA6FF9A36",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.82
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 902,
"timestamp": "2026-01-07T14:25:00Z",
"transaction_amount_usd": 4052.62
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.635,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 5762.94,
"financial_exposure_usd": 8002.29,
"recoverable_pct": 0.824
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101186",
"label": "fraudulent",
"label_confidence": 0.814,
"severity": "medium",
"timestamp": "2026-01-01T19:46:00Z",
"trace_id": "c5fca9d8-94ea-89d2-9924-f3493f6dec06"
} | {
"account_age_days": 173,
"account_id": "ACCT-3B2D35F3E375",
"baseline_risk_score": 0.339,
"kyc_tier": "tier_2",
"session_entropy": 0.817
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 390,
"timestamp": "2026-01-01T10:33:00Z",
"transaction_amount_usd": 0.93
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.888,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 615198.47,
"financial_exposure_usd": 661735.22,
"recoverable_pct": 0.436
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106819",
"label": "benign",
"label_confidence": 0.499,
"severity": "medium",
"timestamp": "2026-01-05T17:39:00Z",
"trace_id": "2df5639d-fe70-52d1-5f22-101e8a7b0cda"
} | {
"account_age_days": 256,
"account_id": "ACCT-1596D39E4ACF",
"baseline_risk_score": 0.156,
"kyc_tier": "tier_2",
"session_entropy": 0.184
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 701,
"timestamp": "2026-01-05T17:39:00Z",
"transaction_amount_usd": 7550.55
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.456,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3445.34,
"financial_exposure_usd": 5014.58,
"recoverable_pct": 0.401
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101253",
"label": "fraudulent",
"label_confidence": 0.77,
"severity": "low",
"timestamp": "2026-01-01T20:53:00Z",
"trace_id": "23d1fe46-805c-4e6c-f60a-dff1a5ab56d8"
} | {
"account_age_days": 1192,
"account_id": "ACCT-6B3D637B58B1",
"baseline_risk_score": 0.509,
"kyc_tier": "tier_1",
"session_entropy": 0.288
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 261,
"timestamp": "2026-01-01T11:58:00Z",
"transaction_amount_usd": 22.27
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.794,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 307116.49,
"financial_exposure_usd": 504447.68,
"recoverable_pct": 0.532
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104619",
"label": "fraudulent",
"label_confidence": 0.671,
"severity": "high",
"timestamp": "2026-01-04T04:59:00Z",
"trace_id": "227039fe-620b-7701-00bf-d8b573978243"
} | {
"account_age_days": 640,
"account_id": "ACCT-34634196313A",
"baseline_risk_score": 0.18,
"kyc_tier": "tier_1",
"session_entropy": 0.739
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 928,
"timestamp": "2026-01-04T04:59:00Z",
"transaction_amount_usd": 2711717.18
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.395,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2533078.93,
"financial_exposure_usd": 2566711.57,
"recoverable_pct": 0.626
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102446",
"label": "fraudulent",
"label_confidence": 0.779,
"severity": "critical",
"timestamp": "2026-01-02T16:46:00Z",
"trace_id": "f62da52d-893f-5d16-751e-1df8e0534f11"
} | {
"account_age_days": 145,
"account_id": "ACCT-536364D17555",
"baseline_risk_score": 0.286,
"kyc_tier": "tier_1",
"session_entropy": 0.747
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 103,
"timestamp": "2026-01-02T16:46:00Z",
"transaction_amount_usd": 25124.34
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.773,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 308465.57,
"financial_exposure_usd": 724315.05,
"recoverable_pct": 0.394
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109278",
"label": "benign",
"label_confidence": 0.617,
"severity": "low",
"timestamp": "2026-01-07T10:38:00Z",
"trace_id": "f904c60e-55e8-2233-2159-358904bab730"
} | {
"account_age_days": 243,
"account_id": "ACCT-2BB4BC6C1CCE",
"baseline_risk_score": 0.108,
"kyc_tier": "tier_3",
"session_entropy": 0.686
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 284,
"timestamp": "2026-01-07T05:44:00Z",
"transaction_amount_usd": 19.12
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.652,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2329.99,
"financial_exposure_usd": 2932.41,
"recoverable_pct": 0.819
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106293",
"label": "fraudulent",
"label_confidence": 0.95,
"severity": "low",
"timestamp": "2026-01-05T08:53:00Z",
"trace_id": "d9714cb6-6b1f-1b45-fe74-1856327d4a75"
} | {
"account_age_days": 1301,
"account_id": "ACCT-67D2ACF0CB2A",
"baseline_risk_score": 0.224,
"kyc_tier": "tier_1",
"session_entropy": 0.44
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 149,
"timestamp": "2026-01-05T05:49:00Z",
"transaction_amount_usd": 17.73
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.801,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2062010.92,
"financial_exposure_usd": 4131935.23,
"recoverable_pct": 0.443
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101278",
"label": "fraudulent",
"label_confidence": 0.853,
"severity": "critical",
"timestamp": "2026-01-01T21:18:00Z",
"trace_id": "5ffec125-a8e8-6446-b212-9eb530b004c8"
} | {
"account_age_days": 1353,
"account_id": "ACCT-E3B443A4D6B7",
"baseline_risk_score": 0.577,
"kyc_tier": "tier_1",
"session_entropy": 0.145
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 918,
"timestamp": "2026-01-01T21:18:00Z",
"transaction_amount_usd": 19987.12
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.724,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 354392.25,
"financial_exposure_usd": 566938.36,
"recoverable_pct": 0.699
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107246",
"label": "benign",
"label_confidence": 0.519,
"severity": "medium",
"timestamp": "2026-01-06T00:46:00Z",
"trace_id": "aab0b068-35ff-4b6a-ba5f-3aa1b94e7b45"
} | {
"account_age_days": 987,
"account_id": "ACCT-DB2A5B6BC8AE",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.45
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 698,
"timestamp": "2026-01-06T00:46:00Z",
"transaction_amount_usd": 1320.57
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.532,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1664.29,
"financial_exposure_usd": 2253.28,
"recoverable_pct": 0.531
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102089",
"label": "fraudulent",
"label_confidence": 0.924,
"severity": "medium",
"timestamp": "2026-01-02T10:49:00Z",
"trace_id": "93103db4-a1da-c864-c69e-7392dbb27b02"
} | {
"account_age_days": 1143,
"account_id": "ACCT-1773F509C7BB",
"baseline_risk_score": 0.465,
"kyc_tier": "tier_1",
"session_entropy": 0.65
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 382,
"timestamp": "2026-01-01T22:44:00Z",
"transaction_amount_usd": 18.64
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.592,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 381257.57,
"financial_exposure_usd": 704845.49,
"recoverable_pct": 0.339
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107747",
"label": "benign",
"label_confidence": 0.537,
"severity": "high",
"timestamp": "2026-01-06T09:07:00Z",
"trace_id": "af3dd864-f2c8-14a7-9417-4e13fa96d5cd"
} | {
"account_age_days": 1217,
"account_id": "ACCT-69072CDFC5F5",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.402
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 1080,
"timestamp": "2026-01-06T09:07:00Z",
"transaction_amount_usd": 2418.02
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.628,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1473.94,
"financial_exposure_usd": 2832.66,
"recoverable_pct": 0.784
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104412",
"label": "fraudulent",
"label_confidence": 0.647,
"severity": "medium",
"timestamp": "2026-01-04T01:32:00Z",
"trace_id": "0d9de8c6-e94a-869e-6c8c-c679d763a754"
} | {
"account_age_days": 1625,
"account_id": "ACCT-7288EF1799DF",
"baseline_risk_score": 0.184,
"kyc_tier": "tier_1",
"session_entropy": 0.414
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 249,
"timestamp": "2026-01-03T13:54:00Z",
"transaction_amount_usd": 22.97
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.855,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 9",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3513408.82,
"financial_exposure_usd": 7290482.78,
"recoverable_pct": 0.973
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108657",
"label": "benign",
"label_confidence": 0.559,
"severity": "low",
"timestamp": "2026-01-07T00:17:00Z",
"trace_id": "f3fd619d-0e6c-d582-ecf2-51dd288c08e7"
} | {
"account_age_days": 748,
"account_id": "ACCT-3F5742FAE0BF",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.403
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 317,
"timestamp": "2026-01-06T22:33:00Z",
"transaction_amount_usd": 8.81
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.78,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 648.08,
"financial_exposure_usd": 1509.01,
"recoverable_pct": 0.498
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107563",
"label": "benign",
"label_confidence": 0.683,
"severity": "medium",
"timestamp": "2026-01-06T06:03:00Z",
"trace_id": "beb45bf2-78fb-3b10-3f4a-4672070556f3"
} | {
"account_age_days": 204,
"account_id": "ACCT-6FCB1D3E6B32",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.501
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 218,
"timestamp": "2026-01-06T06:03:00Z",
"transaction_amount_usd": 4398.8
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.5,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pri... | {
"customer_funds_at_risk_usd": 2097.36,
"financial_exposure_usd": 2496.79,
"recoverable_pct": 0.946
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105228",
"label": "fraudulent",
"label_confidence": 0.617,
"severity": "high",
"timestamp": "2026-01-04T15:08:00Z",
"trace_id": "98961111-fd9a-f2a2-09c8-435478683efc"
} | {
"account_age_days": 1060,
"account_id": "ACCT-C9235829FBC2",
"baseline_risk_score": 0.225,
"kyc_tier": "tier_1",
"session_entropy": 0.298
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 409,
"timestamp": "2026-01-04T15:08:00Z",
"transaction_amount_usd": 2294709.27
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.649,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2938247.86,
"financial_exposure_usd": 5499646.21,
"recoverable_pct": 0.975
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106856",
"label": "benign",
"label_confidence": 0.717,
"severity": "medium",
"timestamp": "2026-01-05T18:16:00Z",
"trace_id": "561f2184-261f-0f87-6d50-3851b066584f"
} | {
"account_age_days": 622,
"account_id": "ACCT-ACCE107FC1EE",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.95
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 577,
"timestamp": "2026-01-05T18:16:00Z",
"transaction_amount_usd": 13983.66
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.648,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1844.03,
"financial_exposure_usd": 2182.33,
"recoverable_pct": 0.591
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105276",
"label": "fraudulent",
"label_confidence": 0.613,
"severity": "critical",
"timestamp": "2026-01-04T15:56:00Z",
"trace_id": "5e6df387-4fdb-e388-aac2-4e2abd1e3d95"
} | {
"account_age_days": 1942,
"account_id": "ACCT-8C1B7DF86B57",
"baseline_risk_score": 0.383,
"kyc_tier": "tier_1",
"session_entropy": 0.169
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 274,
"timestamp": "2026-01-04T04:11:00Z",
"transaction_amount_usd": 10.42
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.481,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1981969.67,
"financial_exposure_usd": 3936441.26,
"recoverable_pct": 0.553
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104806",
"label": "fraudulent",
"label_confidence": 0.891,
"severity": "medium",
"timestamp": "2026-01-04T08:06:00Z",
"trace_id": "4a56065a-2ea5-3fd8-735a-3e1fc9d8eb03"
} | {
"account_age_days": 1925,
"account_id": "ACCT-455BD6C4822C",
"baseline_risk_score": 0.233,
"kyc_tier": "tier_1",
"session_entropy": 0.288
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 560,
"timestamp": "2026-01-04T08:06:00Z",
"transaction_amount_usd": 1131208.08
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.497,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3483391.87,
"financial_exposure_usd": 4136769.16,
"recoverable_pct": 0.57
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104401",
"label": "fraudulent",
"label_confidence": 0.868,
"severity": "high",
"timestamp": "2026-01-04T01:21:00Z",
"trace_id": "20d817fb-0c1e-7fb3-ac61-660cd0286f21"
} | {
"account_age_days": 389,
"account_id": "ACCT-E327B4BD9DB0",
"baseline_risk_score": 0.119,
"kyc_tier": "tier_3",
"session_entropy": 0.44
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 378,
"timestamp": "2026-01-04T01:21:00Z",
"transaction_amount_usd": 1135878.51
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.773,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3810046.96,
"financial_exposure_usd": 6992999.38,
"recoverable_pct": 0.653
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107439",
"label": "benign",
"label_confidence": 0.59,
"severity": "medium",
"timestamp": "2026-01-06T03:59:00Z",
"trace_id": "3a669243-abfd-c61b-2e7d-dd7b362616f1"
} | {
"account_age_days": 1503,
"account_id": "ACCT-5EC24F69D76F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.479
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 1123,
"timestamp": "2026-01-06T03:59:00Z",
"transaction_amount_usd": 10587.99
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.786,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1082.62,
"financial_exposure_usd": 2445.94,
"recoverable_pct": 0.94
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106390",
"label": "fraudulent",
"label_confidence": 0.676,
"severity": "high",
"timestamp": "2026-01-05T10:30:00Z",
"trace_id": "ff5f2478-9bc5-1365-9d02-1a909e680231"
} | {
"account_age_days": 1175,
"account_id": "ACCT-40599E42E72C",
"baseline_risk_score": 0.308,
"kyc_tier": "tier_1",
"session_entropy": 0.677
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 244,
"timestamp": "2026-01-05T10:30:00Z",
"transaction_amount_usd": 906013.94
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.419,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1913938.77,
"financial_exposure_usd": 2833646.09,
"recoverable_pct": 0.549
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107785",
"label": "benign",
"label_confidence": 0.515,
"severity": "low",
"timestamp": "2026-01-06T09:45:00Z",
"trace_id": "2eab5a48-92bf-ed3b-6569-aaad624aeee4"
} | {
"account_age_days": 1985,
"account_id": "ACCT-F658F50FF3A2",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.454
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 369,
"timestamp": "2026-01-06T09:45:00Z",
"transaction_amount_usd": 4797.09
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.566,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2973.62,
"financial_exposure_usd": 3156.86,
"recoverable_pct": 0.971
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105319",
"label": "fraudulent",
"label_confidence": 0.898,
"severity": "medium",
"timestamp": "2026-01-04T16:39:00Z",
"trace_id": "e215e067-48af-4b1a-792c-e626c364bc1e"
} | {
"account_age_days": 1736,
"account_id": "ACCT-9EFB80C5F8DE",
"baseline_risk_score": 0.12,
"kyc_tier": "tier_2",
"session_entropy": 0.861
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 820,
"timestamp": "2026-01-04T16:39:00Z",
"transaction_amount_usd": 2751983.36
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.926,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 6292007.95,
"financial_exposure_usd": 9835209.76,
"recoverable_pct": 0.897
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106529",
"label": "fraudulent",
"label_confidence": 0.903,
"severity": "medium",
"timestamp": "2026-01-05T12:49:00Z",
"trace_id": "ba5cdf5e-56c3-e03e-bf24-cfc2086ce4e2"
} | {
"account_age_days": 554,
"account_id": "ACCT-7948F6B3A264",
"baseline_risk_score": 0.194,
"kyc_tier": "tier_1",
"session_entropy": 0.174
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 1131,
"timestamp": "2026-01-05T12:49:00Z",
"transaction_amount_usd": 390227.75
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.497,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2906181.34,
"financial_exposure_usd": 3106306.53,
"recoverable_pct": 0.81
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109988",
"label": "benign",
"label_confidence": 0.599,
"severity": "medium",
"timestamp": "2026-01-07T22:28:00Z",
"trace_id": "d16fa675-92f8-0f22-5569-929189dc04f9"
} | {
"account_age_days": 798,
"account_id": "ACCT-DA1B61BE44A3",
"baseline_risk_score": 0.135,
"kyc_tier": "tier_3",
"session_entropy": 0.737
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 398,
"timestamp": "2026-01-07T19:52:00Z",
"transaction_amount_usd": 20.42
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.762,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1678.87,
"financial_exposure_usd": 3669.63,
"recoverable_pct": 0.482
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105781",
"label": "fraudulent",
"label_confidence": 0.911,
"severity": "critical",
"timestamp": "2026-01-05T00:21:00Z",
"trace_id": "da666048-4b9c-6bfd-8b7c-8f76dc6bdbdd"
} | {
"account_age_days": 1974,
"account_id": "ACCT-0F58B13B236B",
"baseline_risk_score": 0.166,
"kyc_tier": "tier_2",
"session_entropy": 0.427
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 236,
"timestamp": "2026-01-04T13:07:00Z",
"transaction_amount_usd": 22.7
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.79,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 3941436.44,
"financial_exposure_usd": 5255165.32,
"recoverable_pct": 0.498
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106488",
"label": "fraudulent",
"label_confidence": 0.695,
"severity": "medium",
"timestamp": "2026-01-05T12:08:00Z",
"trace_id": "4ba4e398-f39a-75e0-96b7-fac4e8c70209"
} | {
"account_age_days": 881,
"account_id": "ACCT-3838155BEEEC",
"baseline_risk_score": 0.213,
"kyc_tier": "tier_1",
"session_entropy": 0.512
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 1005,
"timestamp": "2026-01-05T12:08:00Z",
"transaction_amount_usd": 1533194.76
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.675,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5274059.99,
"financial_exposure_usd": 8068517.84,
"recoverable_pct": 0.543
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106229",
"label": "fraudulent",
"label_confidence": 0.749,
"severity": "low",
"timestamp": "2026-01-05T07:49:00Z",
"trace_id": "24fc06f9-b9c8-db7a-4c35-0eaa0ad064ad"
} | {
"account_age_days": 611,
"account_id": "ACCT-068CDA80D7D0",
"baseline_risk_score": 0.396,
"kyc_tier": "tier_1",
"session_entropy": 0.128
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 89,
"timestamp": "2026-01-05T00:47:00Z",
"transaction_amount_usd": 4.93
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.58,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 4899194.1,
"financial_exposure_usd": 6308528.13,
"recoverable_pct": 0.556
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100233",
"label": "fraudulent",
"label_confidence": 0.818,
"severity": "medium",
"timestamp": "2026-01-01T03:53:00Z",
"trace_id": "4fe30b6d-3efc-5196-512b-4c10a3593aec"
} | {
"account_age_days": 1884,
"account_id": "ACCT-EE481499C096",
"baseline_risk_score": 0.471,
"kyc_tier": "tier_2",
"session_entropy": 0.135
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CA",
"latency_ms": 360,
"timestamp": "2026-01-01T03:53:00Z",
"transaction_amount_usd": 35567.43
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.745,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 498635.86,
"financial_exposure_usd": 590341.52,
"recoverable_pct": 0.116
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107207",
"label": "benign",
"label_confidence": 0.628,
"severity": "high",
"timestamp": "2026-01-06T00:07:00Z",
"trace_id": "a7da3a81-1173-0309-a702-1b6cf5f7a6f2"
} | {
"account_age_days": 1361,
"account_id": "ACCT-0FF874221EA6",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.367
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 358,
"timestamp": "2026-01-05T18:50:00Z",
"transaction_amount_usd": 1.26
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.779,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2783.11,
"financial_exposure_usd": 3384.24,
"recoverable_pct": 0.449
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109967",
"label": "benign",
"label_confidence": 0.738,
"severity": "low",
"timestamp": "2026-01-07T22:07:00Z",
"trace_id": "81c94cd0-ee4d-f87e-25cf-0565d3f11901"
} | {
"account_age_days": 643,
"account_id": "ACCT-23C1066A7B84",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.165
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 954,
"timestamp": "2026-01-07T22:07:00Z",
"transaction_amount_usd": 3715.14
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.517,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 352.94,
"financial_exposure_usd": 772.49,
"recoverable_pct": 0.824
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103043",
"label": "fraudulent",
"label_confidence": 0.829,
"severity": "medium",
"timestamp": "2026-01-03T02:43:00Z",
"trace_id": "fef063e7-3c2f-e43a-ce66-0d25403a91be"
} | {
"account_age_days": 1724,
"account_id": "ACCT-5BA5E047C10E",
"baseline_risk_score": 0.579,
"kyc_tier": "tier_1",
"session_entropy": 0.833
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 741,
"timestamp": "2026-01-03T02:43:00Z",
"transaction_amount_usd": 115608.86
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.431,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 382457.02,
"financial_exposure_usd": 642816.96,
"recoverable_pct": 0.548
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101087",
"label": "fraudulent",
"label_confidence": 0.859,
"severity": "medium",
"timestamp": "2026-01-01T18:07:00Z",
"trace_id": "79f85fff-820c-a397-9c84-42a1670fc04d"
} | {
"account_age_days": 739,
"account_id": "ACCT-954E0B15D368",
"baseline_risk_score": 0.401,
"kyc_tier": "tier_2",
"session_entropy": 0.188
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "JP",
"latency_ms": 1165,
"timestamp": "2026-01-01T18:07:00Z",
"transaction_amount_usd": 17224.94
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.357,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 962549.4,
"financial_exposure_usd": 1008322.23,
"recoverable_pct": 0.109
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108616",
"label": "benign",
"label_confidence": 0.575,
"severity": "medium",
"timestamp": "2026-01-06T23:36:00Z",
"trace_id": "0880b597-2aab-ef39-52e5-0ccda78a7f95"
} | {
"account_age_days": 158,
"account_id": "ACCT-DE6E60A5D832",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.792
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 335,
"timestamp": "2026-01-06T23:36:00Z",
"transaction_amount_usd": 9008.15
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.606,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2733.54,
"financial_exposure_usd": 5773.62,
"recoverable_pct": 0.425
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109849",
"label": "benign",
"label_confidence": 0.54,
"severity": "medium",
"timestamp": "2026-01-07T20:09:00Z",
"trace_id": "480832d9-ba07-474b-96fc-169552855b49"
} | {
"account_age_days": 1463,
"account_id": "ACCT-04CD6A00799E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.249
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 426,
"timestamp": "2026-01-07T20:09:00Z",
"transaction_amount_usd": 6035.73
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.548,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 354.04,
"financial_exposure_usd": 659.32,
"recoverable_pct": 0.51
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104368",
"label": "fraudulent",
"label_confidence": 0.77,
"severity": "critical",
"timestamp": "2026-01-04T00:48:00Z",
"trace_id": "4b0f01c4-0159-f3f9-17d7-476c0049cf4b"
} | {
"account_age_days": 1919,
"account_id": "ACCT-A6C9A2D262EE",
"baseline_risk_score": 0.082,
"kyc_tier": "tier_1",
"session_entropy": 0.538
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 237,
"timestamp": "2026-01-04T00:48:00Z",
"transaction_amount_usd": 2124689.16
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.654,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2819581.6,
"financial_exposure_usd": 6836412.85,
"recoverable_pct": 0.529
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106924",
"label": "benign",
"label_confidence": 0.644,
"severity": "high",
"timestamp": "2026-01-05T19:24:00Z",
"trace_id": "01c68136-d305-8eb2-c4d3-175bcff09456"
} | {
"account_age_days": 124,
"account_id": "ACCT-2596B3CD01FA",
"baseline_risk_score": 0.127,
"kyc_tier": "tier_2",
"session_entropy": 0.609
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 292,
"timestamp": "2026-01-05T19:24:00Z",
"transaction_amount_usd": 758.85
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.646,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2371.11,
"financial_exposure_usd": 4512.63,
"recoverable_pct": 0.419
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101853",
"label": "fraudulent",
"label_confidence": 0.825,
"severity": "high",
"timestamp": "2026-01-02T06:53:00Z",
"trace_id": "5162e8d6-c6f2-8cc7-eb20-4f0744c99d2d"
} | {
"account_age_days": 1290,
"account_id": "ACCT-82D821F92DBE",
"baseline_risk_score": 0.301,
"kyc_tier": "tier_1",
"session_entropy": 0.23
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 332,
"timestamp": "2026-01-02T06:53:00Z",
"transaction_amount_usd": 35198.69
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.418,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 303781.15,
"financial_exposure_usd": 318738.03,
"recoverable_pct": 0.087
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101524",
"label": "fraudulent",
"label_confidence": 0.764,
"severity": "medium",
"timestamp": "2026-01-02T01:24:00Z",
"trace_id": "ea173b23-9a67-7739-1b0d-d9fe7385d723"
} | {
"account_age_days": 98,
"account_id": "ACCT-DBD37D0A4A26",
"baseline_risk_score": 0.626,
"kyc_tier": "tier_1",
"session_entropy": 0.898
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 554,
"timestamp": "2026-01-02T01:24:00Z",
"transaction_amount_usd": 86806.45
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.723,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 464892.79,
"financial_exposure_usd": 507654.83,
"recoverable_pct": 0.546
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102335",
"label": "fraudulent",
"label_confidence": 0.977,
"severity": "critical",
"timestamp": "2026-01-02T14:55:00Z",
"trace_id": "0d5d74dd-ffe9-297a-b06c-26478a77abf7"
} | {
"account_age_days": 1321,
"account_id": "ACCT-893CFEB49C6E",
"baseline_risk_score": 0.3,
"kyc_tier": "tier_2",
"session_entropy": 0.241
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 488,
"timestamp": "2026-01-02T14:55:00Z",
"transaction_amount_usd": 67131.37
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.838,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 268149.85,
"financial_exposure_usd": 646256.24,
"recoverable_pct": 0.524
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103607",
"label": "fraudulent",
"label_confidence": 0.648,
"severity": "medium",
"timestamp": "2026-01-03T12:07:00Z",
"trace_id": "ab47bc6f-fb2e-b775-b127-408928544e5f"
} | {
"account_age_days": 241,
"account_id": "ACCT-E75B593A7C1F",
"baseline_risk_score": 0.15,
"kyc_tier": "tier_1",
"session_entropy": 0.73
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 437,
"timestamp": "2026-01-03T12:07:00Z",
"transaction_amount_usd": 712186.85
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.523,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1632083.98,
"financial_exposure_usd": 3526096.85,
"recoverable_pct": 0.473
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107177",
"label": "benign",
"label_confidence": 0.546,
"severity": "high",
"timestamp": "2026-01-05T23:37:00Z",
"trace_id": "c508c697-9eca-cd19-f536-a312a172505a"
} | {
"account_age_days": 16,
"account_id": "ACCT-3533E1E1A6B7",
"baseline_risk_score": 0.195,
"kyc_tier": "tier_3",
"session_entropy": 0.87
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 297,
"timestamp": "2026-01-05T21:15:00Z",
"transaction_amount_usd": 6.53
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.564,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 943.06,
"financial_exposure_usd": 943.1,
"recoverable_pct": 0.425
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103691",
"label": "fraudulent",
"label_confidence": 0.81,
"severity": "medium",
"timestamp": "2026-01-03T13:31:00Z",
"trace_id": "df529c2c-cde9-cf16-39ee-6c9abc660732"
} | {
"account_age_days": 1325,
"account_id": "ACCT-8309D1AFD0F7",
"baseline_risk_score": 0.378,
"kyc_tier": "tier_2",
"session_entropy": 0.343
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 282,
"timestamp": "2026-01-03T03:06:00Z",
"transaction_amount_usd": 8.42
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.738,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2930160.99,
"financial_exposure_usd": 4403620.8,
"recoverable_pct": 0.5
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109328",
"label": "benign",
"label_confidence": 0.737,
"severity": "low",
"timestamp": "2026-01-07T11:28:00Z",
"trace_id": "074dfa1d-4dd5-5605-7fc5-b7527fb0616a"
} | {
"account_age_days": 1039,
"account_id": "ACCT-333BC30EB52C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.523
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 583,
"timestamp": "2026-01-07T11:28:00Z",
"transaction_amount_usd": 363.7
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.673,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2310.21,
"financial_exposure_usd": 3607.77,
"recoverable_pct": 0.644
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109048",
"label": "benign",
"label_confidence": 0.579,
"severity": "critical",
"timestamp": "2026-01-07T06:48:00Z",
"trace_id": "80436014-8832-1926-dff4-212602790195"
} | {
"account_age_days": 986,
"account_id": "ACCT-FB88D639D782",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.833
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 858,
"timestamp": "2026-01-07T06:48:00Z",
"transaction_amount_usd": 14764.79
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.475,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1274.03,
"financial_exposure_usd": 2051.77,
"recoverable_pct": 0.564
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107101",
"label": "benign",
"label_confidence": 0.647,
"severity": "low",
"timestamp": "2026-01-05T22:21:00Z",
"trace_id": "381869e9-4cfd-6868-4c20-cb3e5f23337c"
} | {
"account_age_days": 1369,
"account_id": "ACCT-A2C987BB8101",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.398
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 275,
"timestamp": "2026-01-05T17:20:00Z",
"transaction_amount_usd": 4.93
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.547,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 429.39,
"financial_exposure_usd": 1038.18,
"recoverable_pct": 0.453
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101434",
"label": "fraudulent",
"label_confidence": 0.776,
"severity": "high",
"timestamp": "2026-01-01T23:54:00Z",
"trace_id": "814af48c-219a-56a9-ff47-85b165f59c7c"
} | {
"account_age_days": 395,
"account_id": "ACCT-F0A6F3A3FAFB",
"baseline_risk_score": 0.614,
"kyc_tier": "tier_1",
"session_entropy": 0.606
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "SG",
"latency_ms": 867,
"timestamp": "2026-01-01T23:54:00Z",
"transaction_amount_usd": 60115.55
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.588,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 782694.22,
"financial_exposure_usd": 828693.67,
"recoverable_pct": 0.611
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103677",
"label": "fraudulent",
"label_confidence": 0.906,
"severity": "high",
"timestamp": "2026-01-03T13:17:00Z",
"trace_id": "acca869a-3460-86a8-2493-87f634fc789f"
} | {
"account_age_days": 260,
"account_id": "ACCT-76DB61295B4A",
"baseline_risk_score": 0.281,
"kyc_tier": "tier_3",
"session_entropy": 0.487
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 946,
"timestamp": "2026-01-03T13:17:00Z",
"transaction_amount_usd": 1300712.51
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.74,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 5910061.54,
"financial_exposure_usd": 8693545.03,
"recoverable_pct": 0.616
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106420",
"label": "fraudulent",
"label_confidence": 0.906,
"severity": "medium",
"timestamp": "2026-01-05T11:00:00Z",
"trace_id": "75522f0b-e14c-6e5d-8079-c969f18b470f"
} | {
"account_age_days": 1286,
"account_id": "ACCT-8EDD4378F60B",
"baseline_risk_score": 0.077,
"kyc_tier": "tier_2",
"session_entropy": 0.683
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 378,
"timestamp": "2026-01-05T11:00:00Z",
"transaction_amount_usd": 2673373.89
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.674,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2939953.88,
"financial_exposure_usd": 3815443.02,
"recoverable_pct": 0.898
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109978",
"label": "benign",
"label_confidence": 0.748,
"severity": "low",
"timestamp": "2026-01-07T22:18:00Z",
"trace_id": "7860449b-ab72-5cde-81ee-16ad96959d95"
} | {
"account_age_days": 1032,
"account_id": "ACCT-201D1F69776C",
"baseline_risk_score": 0.076,
"kyc_tier": "tier_3",
"session_entropy": 0.205
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 659,
"timestamp": "2026-01-07T22:18:00Z",
"transaction_amount_usd": 14492.12
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.761,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2033.63,
"financial_exposure_usd": 2317.57,
"recoverable_pct": 0.608
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103384",
"label": "fraudulent",
"label_confidence": 0.632,
"severity": "critical",
"timestamp": "2026-01-03T08:24:00Z",
"trace_id": "eae12f7a-f14b-0389-4e80-e4840bf8f09b"
} | {
"account_age_days": 1539,
"account_id": "ACCT-5BC29608E6BD",
"baseline_risk_score": 0.265,
"kyc_tier": "tier_1",
"session_entropy": 0.354
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 292,
"timestamp": "2026-01-03T05:22:00Z",
"transaction_amount_usd": 12.29
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.814,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1710045.57,
"financial_exposure_usd": 4141369.69,
"recoverable_pct": 0.845
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102154",
"label": "fraudulent",
"label_confidence": 0.813,
"severity": "critical",
"timestamp": "2026-01-02T11:54:00Z",
"trace_id": "227ce0c7-9cfb-4814-ef95-744c55949068"
} | {
"account_age_days": 224,
"account_id": "ACCT-3AABAE546EC9",
"baseline_risk_score": 0.452,
"kyc_tier": "tier_2",
"session_entropy": 0.824
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 120,
"timestamp": "2026-01-01T23:57:00Z",
"transaction_amount_usd": 24.9
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.784,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 706404.82,
"financial_exposure_usd": 804608.77,
"recoverable_pct": 0.395
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100384",
"label": "fraudulent",
"label_confidence": 0.827,
"severity": "critical",
"timestamp": "2026-01-01T06:24:00Z",
"trace_id": "136ac2c8-5705-aed4-824b-ef98e4c49882"
} | {
"account_age_days": 733,
"account_id": "ACCT-5FFB04563516",
"baseline_risk_score": 0.596,
"kyc_tier": "tier_3",
"session_entropy": 0.261
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 343,
"timestamp": "2025-12-31T17:43:00Z",
"transaction_amount_usd": 16.36
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.39,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 322904.73,
"financial_exposure_usd": 494350.98,
"recoverable_pct": 0.374
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109330",
"label": "benign",
"label_confidence": 0.728,
"severity": "high",
"timestamp": "2026-01-07T11:30:00Z",
"trace_id": "76c2d076-2142-4249-b0ce-8692d1b914ef"
} | {
"account_age_days": 469,
"account_id": "ACCT-9406A48E6FBF",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.761
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 278,
"timestamp": "2026-01-07T08:25:00Z",
"transaction_amount_usd": 17.34
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.68,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 1955.08,
"financial_exposure_usd": 2044.72,
"recoverable_pct": 0.851
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.