schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107926",
"label": "benign",
"label_confidence": 0.733,
"severity": "medium",
"timestamp": "2026-01-06T12:06:00Z",
"trace_id": "aa2b0651-6a22-aed5-8c66-2b2ddec68eee"
} | {
"account_age_days": 734,
"account_id": "ACCT-E7C2B09337AF",
"baseline_risk_score": 0.15,
"kyc_tier": "tier_3",
"session_entropy": 0.736
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 325,
"timestamp": "2026-01-06T12:06:00Z",
"transaction_amount_usd": 12775.76
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.557,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1193.12,
"financial_exposure_usd": 1198.95,
"recoverable_pct": 0.816
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108296",
"label": "benign",
"label_confidence": 0.695,
"severity": "high",
"timestamp": "2026-01-06T18:16:00Z",
"trace_id": "56f00a20-7bc4-6f33-58de-663b3c4732d2"
} | {
"account_age_days": 1430,
"account_id": "ACCT-DB2482757377",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.949
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 635,
"timestamp": "2026-01-06T18:16:00Z",
"transaction_amount_usd": 2722.82
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.511,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1623.35,
"financial_exposure_usd": 2629.08,
"recoverable_pct": 0.855
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102422",
"label": "fraudulent",
"label_confidence": 0.881,
"severity": "critical",
"timestamp": "2026-01-02T16:22:00Z",
"trace_id": "b96bce11-c23a-b56e-deff-33c5b80e1403"
} | {
"account_age_days": 339,
"account_id": "ACCT-270E8FC74ED9",
"baseline_risk_score": 0.532,
"kyc_tier": "tier_1",
"session_entropy": 0.768
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "JP",
"latency_ms": 702,
"timestamp": "2026-01-02T16:22:00Z",
"transaction_amount_usd": 95744.9
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.866,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 225442.83,
"financial_exposure_usd": 508841.38,
"recoverable_pct": 0.061
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101485",
"label": "fraudulent",
"label_confidence": 0.778,
"severity": "medium",
"timestamp": "2026-01-02T00:45:00Z",
"trace_id": "2af0408d-2735-8511-e933-60d6cd1163ba"
} | {
"account_age_days": 483,
"account_id": "ACCT-3958C967A306",
"baseline_risk_score": 0.42,
"kyc_tier": "tier_2",
"session_entropy": 0.764
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 659,
"timestamp": "2026-01-02T00:45:00Z",
"transaction_amount_usd": 117920.17
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.368,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 785342.74,
"financial_exposure_usd": 999495.15,
"recoverable_pct": 0.367
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107631",
"label": "benign",
"label_confidence": 0.495,
"severity": "low",
"timestamp": "2026-01-06T07:11:00Z",
"trace_id": "4ce35c4e-040e-ea33-6576-401d47e5c687"
} | {
"account_age_days": 1527,
"account_id": "ACCT-6C1F2918A8CA",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.628
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 907,
"timestamp": "2026-01-06T07:11:00Z",
"transaction_amount_usd": 7985.43
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.585,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2601.99,
"financial_exposure_usd": 3420.82,
"recoverable_pct": 0.675
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102938",
"label": "fraudulent",
"label_confidence": 0.97,
"severity": "high",
"timestamp": "2026-01-03T00:58:00Z",
"trace_id": "8fb2cde1-0c91-d93e-d997-c21fb9f26829"
} | {
"account_age_days": 1514,
"account_id": "ACCT-599B99DC40E5",
"baseline_risk_score": 0.437,
"kyc_tier": "tier_1",
"session_entropy": 0.822
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 1132,
"timestamp": "2026-01-03T00:58:00Z",
"transaction_amount_usd": 57293.78
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.696,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 438982.1,
"financial_exposure_usd": 617167.35,
"recoverable_pct": 0.231
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108314",
"label": "benign",
"label_confidence": 0.468,
"severity": "critical",
"timestamp": "2026-01-06T18:34:00Z",
"trace_id": "92d45cfb-2051-0b8b-d133-0744715e76d7"
} | {
"account_age_days": 1314,
"account_id": "ACCT-BD05144BEFA5",
"baseline_risk_score": 0.145,
"kyc_tier": "tier_3",
"session_entropy": 0.379
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 270,
"timestamp": "2026-01-06T18:34:00Z",
"transaction_amount_usd": 9811.52
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.621,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3212,
"financial_exposure_usd": 4194.94,
"recoverable_pct": 0.529
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103860",
"label": "fraudulent",
"label_confidence": 0.765,
"severity": "high",
"timestamp": "2026-01-03T16:20:00Z",
"trace_id": "2e32cfa9-22ba-8b51-d8da-19538693b3bf"
} | {
"account_age_days": 1759,
"account_id": "ACCT-D2863E6B6676",
"baseline_risk_score": 0.12,
"kyc_tier": "tier_2",
"session_entropy": 0.232
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 245,
"timestamp": "2026-01-03T06:23:00Z",
"transaction_amount_usd": 10.95
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.603,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4025518.5,
"financial_exposure_usd": 6104231.58,
"recoverable_pct": 0.881
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101065",
"label": "fraudulent",
"label_confidence": 0.858,
"severity": "critical",
"timestamp": "2026-01-01T17:45:00Z",
"trace_id": "4630bd73-7cf7-858a-6918-d401579ada18"
} | {
"account_age_days": 1384,
"account_id": "ACCT-945EA0D77488",
"baseline_risk_score": 0.488,
"kyc_tier": "tier_2",
"session_entropy": 0.861
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 156,
"timestamp": "2026-01-01T17:45:00Z",
"transaction_amount_usd": 101555.41
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.41,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 1009505.76,
"financial_exposure_usd": 1203206.03,
"recoverable_pct": 0.415
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103552",
"label": "fraudulent",
"label_confidence": 0.648,
"severity": "high",
"timestamp": "2026-01-03T11:12:00Z",
"trace_id": "816c63b5-984c-294a-abcb-edb1cf915f0e"
} | {
"account_age_days": 1661,
"account_id": "ACCT-9F4434EB2BBC",
"baseline_risk_score": 0.428,
"kyc_tier": "tier_2",
"session_entropy": 0.286
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 868,
"timestamp": "2026-01-03T11:12:00Z",
"transaction_amount_usd": 2308305.49
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.589,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1527386.18,
"financial_exposure_usd": 3096560.81,
"recoverable_pct": 0.757
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107806",
"label": "benign",
"label_confidence": 0.471,
"severity": "low",
"timestamp": "2026-01-06T10:06:00Z",
"trace_id": "44830e07-d25b-ad97-8bf0-73e525490757"
} | {
"account_age_days": 1346,
"account_id": "ACCT-7C27ABAA50C8",
"baseline_risk_score": 0.165,
"kyc_tier": "tier_2",
"session_entropy": 0.355
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 347,
"timestamp": "2026-01-06T10:06:00Z",
"transaction_amount_usd": 7212.83
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.577,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 335.78,
"financial_exposure_usd": 378.49,
"recoverable_pct": 0.871
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105390",
"label": "fraudulent",
"label_confidence": 0.64,
"severity": "medium",
"timestamp": "2026-01-04T17:50:00Z",
"trace_id": "ffb9b3c5-fa5a-59d9-33c8-081a89e79239"
} | {
"account_age_days": 108,
"account_id": "ACCT-6B2D290C478A",
"baseline_risk_score": 0.351,
"kyc_tier": "tier_2",
"session_entropy": 0.902
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 125,
"timestamp": "2026-01-04T10:54:00Z",
"transaction_amount_usd": 16.65
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.452,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1929577.94,
"financial_exposure_usd": 4485500.66,
"recoverable_pct": 0.907
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106449",
"label": "fraudulent",
"label_confidence": 0.869,
"severity": "high",
"timestamp": "2026-01-05T11:29:00Z",
"trace_id": "2efd23dc-87f2-2cda-e6ce-ae03b2d39310"
} | {
"account_age_days": 1767,
"account_id": "ACCT-D800171EDFF4",
"baseline_risk_score": 0.267,
"kyc_tier": "tier_2",
"session_entropy": 0.337
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 209,
"timestamp": "2026-01-05T00:18:00Z",
"transaction_amount_usd": 21.99
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.494,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1521111.12,
"financial_exposure_usd": 2973143.73,
"recoverable_pct": 0.895
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102050",
"label": "fraudulent",
"label_confidence": 0.952,
"severity": "critical",
"timestamp": "2026-01-02T10:10:00Z",
"trace_id": "e21c2695-7ac1-acb6-9701-4453dcede658"
} | {
"account_age_days": 605,
"account_id": "ACCT-EC26453BC9EC",
"baseline_risk_score": 0.292,
"kyc_tier": "tier_2",
"session_entropy": 0.415
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 252,
"timestamp": "2026-01-02T00:51:00Z",
"transaction_amount_usd": 7.25
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.369,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 792494.71,
"financial_exposure_usd": 952377.15,
"recoverable_pct": 0.061
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100658",
"label": "fraudulent",
"label_confidence": 0.856,
"severity": "medium",
"timestamp": "2026-01-01T10:58:00Z",
"trace_id": "02720cd1-cbd3-cf54-605e-3a25afb12754"
} | {
"account_age_days": 1592,
"account_id": "ACCT-033FD3C3CA5F",
"baseline_risk_score": 0.585,
"kyc_tier": "tier_2",
"session_entropy": 0.374
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 246,
"timestamp": "2026-01-01T10:58:00Z",
"transaction_amount_usd": 7023.77
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.676,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 907111.8,
"financial_exposure_usd": 934623.79,
"recoverable_pct": 0.603
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107033",
"label": "benign",
"label_confidence": 0.561,
"severity": "medium",
"timestamp": "2026-01-05T21:13:00Z",
"trace_id": "9240ecce-4ca9-98dc-9f37-a62158e65f79"
} | {
"account_age_days": 220,
"account_id": "ACCT-7B53CC264A99",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.126
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 504,
"timestamp": "2026-01-05T21:13:00Z",
"transaction_amount_usd": 1422.3
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.769,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 5466.89,
"financial_exposure_usd": 7891.86,
"recoverable_pct": 0.567
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106943",
"label": "benign",
"label_confidence": 0.729,
"severity": "medium",
"timestamp": "2026-01-05T19:43:00Z",
"trace_id": "85dd587b-1799-8fcb-c717-03edf29da4e4"
} | {
"account_age_days": 1979,
"account_id": "ACCT-8960F79A5019",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.529
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 357,
"timestamp": "2026-01-05T19:43:00Z",
"transaction_amount_usd": 6540.88
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.591,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 3",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1083.9,
"financial_exposure_usd": 1297.04,
"recoverable_pct": 0.507
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102465",
"label": "fraudulent",
"label_confidence": 0.802,
"severity": "critical",
"timestamp": "2026-01-02T17:05:00Z",
"trace_id": "c082b236-87b7-ff6a-d617-4f34ff4ad824"
} | {
"account_age_days": 1927,
"account_id": "ACCT-1C7838B21061",
"baseline_risk_score": 0.374,
"kyc_tier": "tier_2",
"session_entropy": 0.931
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "GB",
"latency_ms": 548,
"timestamp": "2026-01-02T17:05:00Z",
"transaction_amount_usd": 52998.88
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.557,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 277020.58,
"financial_exposure_usd": 323572.32,
"recoverable_pct": 0.844
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108646",
"label": "benign",
"label_confidence": 0.643,
"severity": "high",
"timestamp": "2026-01-07T00:06:00Z",
"trace_id": "73e48c9a-8a45-19cd-296d-8d3b586f7658"
} | {
"account_age_days": 465,
"account_id": "ACCT-DAB9CC2E8FFD",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.29
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 316,
"timestamp": "2026-01-06T20:04:00Z",
"transaction_amount_usd": 12.71
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.698,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2643.15,
"financial_exposure_usd": 4837.06,
"recoverable_pct": 0.702
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100563",
"label": "fraudulent",
"label_confidence": 0.86,
"severity": "low",
"timestamp": "2026-01-01T09:23:00Z",
"trace_id": "b3b755ca-bf5e-4ff4-43a7-6d6914777eff"
} | {
"account_age_days": 1740,
"account_id": "ACCT-99CF3C81D21F",
"baseline_risk_score": 0.376,
"kyc_tier": "tier_1",
"session_entropy": 0.645
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 859,
"timestamp": "2026-01-01T09:23:00Z",
"transaction_amount_usd": 17350.69
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.616,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 571950.15,
"financial_exposure_usd": 839340.72,
"recoverable_pct": 0.612
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102737",
"label": "fraudulent",
"label_confidence": 0.869,
"severity": "low",
"timestamp": "2026-01-02T21:37:00Z",
"trace_id": "2b7cebbb-21c7-babf-8692-73378cbc9f72"
} | {
"account_age_days": 721,
"account_id": "ACCT-72127B3173CB",
"baseline_risk_score": 0.489,
"kyc_tier": "tier_1",
"session_entropy": 0.367
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 963,
"timestamp": "2026-01-02T21:37:00Z",
"transaction_amount_usd": 2448.9
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.779,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 625007.91,
"financial_exposure_usd": 1027509.94,
"recoverable_pct": 0.165
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101768",
"label": "fraudulent",
"label_confidence": 0.93,
"severity": "critical",
"timestamp": "2026-01-02T05:28:00Z",
"trace_id": "6d998d7d-4cd7-9adb-523f-36da0c5aa747"
} | {
"account_age_days": 101,
"account_id": "ACCT-C7E300748BDE",
"baseline_risk_score": 0.438,
"kyc_tier": "tier_3",
"session_entropy": 0.468
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "DE",
"latency_ms": 181,
"timestamp": "2026-01-02T05:28:00Z",
"transaction_amount_usd": 72822.56
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.483,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 375586.98,
"financial_exposure_usd": 576436.83,
"recoverable_pct": 0.538
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105030",
"label": "fraudulent",
"label_confidence": 0.94,
"severity": "medium",
"timestamp": "2026-01-04T11:50:00Z",
"trace_id": "5a235f0a-f7aa-dbf5-b8c5-e8a2f5602744"
} | {
"account_age_days": 1235,
"account_id": "ACCT-8CA6DD0F02D8",
"baseline_risk_score": 0.165,
"kyc_tier": "tier_1",
"session_entropy": 0.713
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 1073,
"timestamp": "2026-01-04T11:50:00Z",
"transaction_amount_usd": 1272123.22
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.625,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1315370.98,
"financial_exposure_usd": 1349237.84,
"recoverable_pct": 0.626
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109463",
"label": "benign",
"label_confidence": 0.716,
"severity": "low",
"timestamp": "2026-01-07T13:43:00Z",
"trace_id": "1441815b-2426-8495-a585-9a71347d7511"
} | {
"account_age_days": 1578,
"account_id": "ACCT-04EA9888735A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.921
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 801,
"timestamp": "2026-01-07T13:43:00Z",
"transaction_amount_usd": 11188.02
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.535,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 140.04,
"financial_exposure_usd": 150.87,
"recoverable_pct": 0.501
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109725",
"label": "benign",
"label_confidence": 0.673,
"severity": "high",
"timestamp": "2026-01-07T18:05:00Z",
"trace_id": "0f5b2182-b885-f830-7980-93aec059dd25"
} | {
"account_age_days": 1889,
"account_id": "ACCT-E57A93541274",
"baseline_risk_score": 0.197,
"kyc_tier": "tier_3",
"session_entropy": 0.591
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 226,
"timestamp": "2026-01-07T06:30:00Z",
"transaction_amount_usd": 3.54
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.454,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1535.38,
"financial_exposure_usd": 1663.55,
"recoverable_pct": 0.567
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103782",
"label": "fraudulent",
"label_confidence": 0.666,
"severity": "high",
"timestamp": "2026-01-03T15:02:00Z",
"trace_id": "6d582cfa-9e22-2dee-7d3d-be0aa0467a27"
} | {
"account_age_days": 1876,
"account_id": "ACCT-725B38DBB487",
"baseline_risk_score": 0.405,
"kyc_tier": "tier_3",
"session_entropy": 0.797
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 314,
"timestamp": "2026-01-03T15:02:00Z",
"transaction_amount_usd": 460149.94
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.57,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 2437484.62,
"financial_exposure_usd": 5535624.22,
"recoverable_pct": 0.977
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102184",
"label": "fraudulent",
"label_confidence": 0.807,
"severity": "high",
"timestamp": "2026-01-02T12:24:00Z",
"trace_id": "217f931d-a098-78c4-ec62-8aa22d42d5e2"
} | {
"account_age_days": 1688,
"account_id": "ACCT-F0BD538E7CE2",
"baseline_risk_score": 0.591,
"kyc_tier": "tier_1",
"session_entropy": 0.787
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 933,
"timestamp": "2026-01-02T12:24:00Z",
"transaction_amount_usd": 33844.05
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.753,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 791440.86,
"financial_exposure_usd": 1001388.08,
"recoverable_pct": 0.127
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109133",
"label": "benign",
"label_confidence": 0.744,
"severity": "medium",
"timestamp": "2026-01-07T08:13:00Z",
"trace_id": "392fa89f-02c2-110b-b10f-bf78ed1ba423"
} | {
"account_age_days": 1874,
"account_id": "ACCT-B23B6B5D66DB",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.707
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 195,
"timestamp": "2026-01-07T08:13:00Z",
"transaction_amount_usd": 2743.23
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.708,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2072.11,
"financial_exposure_usd": 4709.06,
"recoverable_pct": 0.957
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101341",
"label": "fraudulent",
"label_confidence": 0.872,
"severity": "critical",
"timestamp": "2026-01-01T22:21:00Z",
"trace_id": "1b3bb647-f7f2-1114-2f60-e50ab84b10da"
} | {
"account_age_days": 79,
"account_id": "ACCT-3D13F8D368AD",
"baseline_risk_score": 0.512,
"kyc_tier": "tier_1",
"session_entropy": 0.743
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 552,
"timestamp": "2026-01-01T22:21:00Z",
"transaction_amount_usd": 59347.97
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.694,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 298121.12,
"financial_exposure_usd": 627479.01,
"recoverable_pct": 0.467
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104364",
"label": "fraudulent",
"label_confidence": 0.637,
"severity": "medium",
"timestamp": "2026-01-04T00:44:00Z",
"trace_id": "18bdf58c-8a2d-4d63-4c92-a28dfb0a779d"
} | {
"account_age_days": 451,
"account_id": "ACCT-41F7C5EDB291",
"baseline_risk_score": 0.152,
"kyc_tier": "tier_1",
"session_entropy": 0.119
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 297,
"timestamp": "2026-01-03T12:29:00Z",
"transaction_amount_usd": 24.94
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.814,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1508307.46,
"financial_exposure_usd": 2849505.86,
"recoverable_pct": 0.9
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100689",
"label": "fraudulent",
"label_confidence": 0.895,
"severity": "critical",
"timestamp": "2026-01-01T11:29:00Z",
"trace_id": "727f1cc3-81f0-657a-a38c-9963cea6d6c3"
} | {
"account_age_days": 1310,
"account_id": "ACCT-6EFD8FB1E4A9",
"baseline_risk_score": 0.497,
"kyc_tier": "tier_2",
"session_entropy": 0.17
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 145,
"timestamp": "2026-01-01T11:29:00Z",
"transaction_amount_usd": 98792.94
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.747,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 688566.68,
"financial_exposure_usd": 997851.02,
"recoverable_pct": 0.842
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103710",
"label": "fraudulent",
"label_confidence": 0.77,
"severity": "high",
"timestamp": "2026-01-03T13:50:00Z",
"trace_id": "eb1c5346-c281-4f56-7682-79bb0b9a6c0a"
} | {
"account_age_days": 27,
"account_id": "ACCT-DB7C9A1AEE48",
"baseline_risk_score": 0.117,
"kyc_tier": "tier_2",
"session_entropy": 0.332
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 195,
"timestamp": "2026-01-03T04:48:00Z",
"transaction_amount_usd": 20.72
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.464,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1193621.44,
"financial_exposure_usd": 2778995.36,
"recoverable_pct": 0.61
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106740",
"label": "benign",
"label_confidence": 0.61,
"severity": "medium",
"timestamp": "2026-01-05T16:20:00Z",
"trace_id": "ba3d7c69-6f4c-ca99-3b50-3822fbed7b89"
} | {
"account_age_days": 1933,
"account_id": "ACCT-7D2B55090278",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.866
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 106,
"timestamp": "2026-01-05T04:45:00Z",
"transaction_amount_usd": 1.58
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.758,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 188.35,
"financial_exposure_usd": 353.46,
"recoverable_pct": 0.699
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100998",
"label": "fraudulent",
"label_confidence": 0.761,
"severity": "critical",
"timestamp": "2026-01-01T16:38:00Z",
"trace_id": "50cf9dc2-17d3-862d-20b7-0ddaf45c7bd1"
} | {
"account_age_days": 1876,
"account_id": "ACCT-0D1369D2D33E",
"baseline_risk_score": 0.426,
"kyc_tier": "tier_2",
"session_entropy": 0.581
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "HK",
"latency_ms": 1167,
"timestamp": "2026-01-01T16:38:00Z",
"transaction_amount_usd": 61067.67
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.64,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 760186.44,
"financial_exposure_usd": 1407270.48,
"recoverable_pct": 0.431
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101070",
"label": "fraudulent",
"label_confidence": 0.926,
"severity": "medium",
"timestamp": "2026-01-01T17:50:00Z",
"trace_id": "bce7ff85-9bea-38f9-fd74-3b5eab609ca0"
} | {
"account_age_days": 1241,
"account_id": "ACCT-4BEB8352F99F",
"baseline_risk_score": 0.29,
"kyc_tier": "tier_3",
"session_entropy": 0.86
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 1165,
"timestamp": "2026-01-01T17:50:00Z",
"transaction_amount_usd": 14331.21
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.602,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 616433.42,
"financial_exposure_usd": 793293.41,
"recoverable_pct": 0.109
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106717",
"label": "benign",
"label_confidence": 0.745,
"severity": "high",
"timestamp": "2026-01-05T15:57:00Z",
"trace_id": "510e8c10-41b4-ee67-8dbf-ea72ea2e1f1b"
} | {
"account_age_days": 956,
"account_id": "ACCT-770241227BBE",
"baseline_risk_score": 0.158,
"kyc_tier": "tier_3",
"session_entropy": 0.151
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 136,
"timestamp": "2026-01-05T11:44:00Z",
"transaction_amount_usd": 8.83
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.654,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3369.62,
"financial_exposure_usd": 5596.81,
"recoverable_pct": 0.596
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105816",
"label": "fraudulent",
"label_confidence": 0.875,
"severity": "medium",
"timestamp": "2026-01-05T00:56:00Z",
"trace_id": "bbb8f97d-1729-f557-c91b-154e9d19c671"
} | {
"account_age_days": 1779,
"account_id": "ACCT-0500322CCE44",
"baseline_risk_score": 0.173,
"kyc_tier": "tier_1",
"session_entropy": 0.59
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 118,
"timestamp": "2026-01-05T00:56:00Z",
"transaction_amount_usd": 1522994.58
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.374,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1940543.24,
"financial_exposure_usd": 2657201.94,
"recoverable_pct": 0.564
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107692",
"label": "benign",
"label_confidence": 0.462,
"severity": "medium",
"timestamp": "2026-01-06T08:12:00Z",
"trace_id": "d57785de-aa21-ff1d-88d8-758be9979df6"
} | {
"account_age_days": 942,
"account_id": "ACCT-5E03B260176D",
"baseline_risk_score": 0.052,
"kyc_tier": "tier_2",
"session_entropy": 0.153
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 133,
"timestamp": "2026-01-06T06:42:00Z",
"transaction_amount_usd": 6.15
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.76,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 4089.99,
"financial_exposure_usd": 7131.65,
"recoverable_pct": 0.82
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104971",
"label": "fraudulent",
"label_confidence": 0.796,
"severity": "medium",
"timestamp": "2026-01-04T10:51:00Z",
"trace_id": "42b4b639-ef9f-f42d-a695-8019161ba000"
} | {
"account_age_days": 1415,
"account_id": "ACCT-1C70F3ACC6B7",
"baseline_risk_score": 0.265,
"kyc_tier": "tier_1",
"session_entropy": 0.346
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 756,
"timestamp": "2026-01-04T10:51:00Z",
"transaction_amount_usd": 1746624.21
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.743,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5556344.16,
"financial_exposure_usd": 6373409.94,
"recoverable_pct": 0.86
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103181",
"label": "fraudulent",
"label_confidence": 0.859,
"severity": "medium",
"timestamp": "2026-01-03T05:01:00Z",
"trace_id": "b45c429e-99c1-08f3-aa9a-5d4029cf77f8"
} | {
"account_age_days": 325,
"account_id": "ACCT-AF38EBA3B63D",
"baseline_risk_score": 0.644,
"kyc_tier": "tier_3",
"session_entropy": 0.289
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 201,
"timestamp": "2026-01-02T23:53:00Z",
"transaction_amount_usd": 9.8
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.512,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 414340.32,
"financial_exposure_usd": 876276.7,
"recoverable_pct": 0.004
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103500",
"label": "fraudulent",
"label_confidence": 0.869,
"severity": "high",
"timestamp": "2026-01-03T10:20:00Z",
"trace_id": "46402b8a-6ab3-ea74-9c8b-c4e6a338a0fc"
} | {
"account_age_days": 1323,
"account_id": "ACCT-98AE8C96AF06",
"baseline_risk_score": 0.313,
"kyc_tier": "tier_1",
"session_entropy": 0.868
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 292,
"timestamp": "2026-01-03T07:28:00Z",
"transaction_amount_usd": 15.85
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.628,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3633721.65,
"financial_exposure_usd": 5000955.02,
"recoverable_pct": 0.725
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106137",
"label": "fraudulent",
"label_confidence": 0.656,
"severity": "high",
"timestamp": "2026-01-05T06:17:00Z",
"trace_id": "9652a87b-b090-0221-6eb7-3822bba77fbc"
} | {
"account_age_days": 1538,
"account_id": "ACCT-F460A1A0FC2F",
"baseline_risk_score": 0.387,
"kyc_tier": "tier_3",
"session_entropy": 0.105
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 951,
"timestamp": "2026-01-05T06:17:00Z",
"transaction_amount_usd": 139037
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK_IMB... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.774,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1732002.29,
"financial_exposure_usd": 3944770.78,
"recoverable_pct": 0.655
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109611",
"label": "benign",
"label_confidence": 0.493,
"severity": "low",
"timestamp": "2026-01-07T16:11:00Z",
"trace_id": "c617c74a-6862-a053-2a8a-4d60f9bef319"
} | {
"account_age_days": 924,
"account_id": "ACCT-6F8D2D69382C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.13
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 201,
"timestamp": "2026-01-07T13:24:00Z",
"transaction_amount_usd": 20.07
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.546,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 755.19,
"financial_exposure_usd": 889.38,
"recoverable_pct": 0.743
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108235",
"label": "benign",
"label_confidence": 0.518,
"severity": "high",
"timestamp": "2026-01-06T17:15:00Z",
"trace_id": "20ccbde8-be09-415f-20fe-1d893d577191"
} | {
"account_age_days": 540,
"account_id": "ACCT-555332D8D709",
"baseline_risk_score": 0.083,
"kyc_tier": "tier_2",
"session_entropy": 0.257
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 894,
"timestamp": "2026-01-06T17:15:00Z",
"transaction_amount_usd": 14026.04
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.686,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3403.55,
"financial_exposure_usd": 3544.03,
"recoverable_pct": 0.582
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104023",
"label": "fraudulent",
"label_confidence": 0.888,
"severity": "high",
"timestamp": "2026-01-03T19:03:00Z",
"trace_id": "a5cea158-1840-1465-f9b5-f683f0e5b949"
} | {
"account_age_days": 802,
"account_id": "ACCT-AF9A810BCDA5",
"baseline_risk_score": 0.088,
"kyc_tier": "tier_1",
"session_entropy": 0.627
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 714,
"timestamp": "2026-01-03T19:03:00Z",
"transaction_amount_usd": 2192534.73
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.513,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3137498.52,
"financial_exposure_usd": 6517173.2,
"recoverable_pct": 0.788
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102092",
"label": "fraudulent",
"label_confidence": 0.943,
"severity": "high",
"timestamp": "2026-01-02T10:52:00Z",
"trace_id": "f8cc2c58-1f17-58db-c59e-35c3a82a61f3"
} | {
"account_age_days": 1925,
"account_id": "ACCT-2E9BC698B275",
"baseline_risk_score": 0.555,
"kyc_tier": "tier_1",
"session_entropy": 0.173
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 218,
"timestamp": "2026-01-02T10:52:00Z",
"transaction_amount_usd": 33849.78
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.628,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 1344120.34,
"financial_exposure_usd": 1377161.41,
"recoverable_pct": 0.531
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100812",
"label": "fraudulent",
"label_confidence": 0.975,
"severity": "medium",
"timestamp": "2026-01-01T13:32:00Z",
"trace_id": "05f1ef89-d1ef-bdbc-27bc-cf846726a229"
} | {
"account_age_days": 1608,
"account_id": "ACCT-ED0F1331C31E",
"baseline_risk_score": 0.458,
"kyc_tier": "tier_2",
"session_entropy": 0.195
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CH",
"latency_ms": 332,
"timestamp": "2026-01-01T13:32:00Z",
"transaction_amount_usd": 37476.25
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.755,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 680182.36,
"financial_exposure_usd": 688882.61,
"recoverable_pct": 0.817
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106114",
"label": "fraudulent",
"label_confidence": 0.84,
"severity": "high",
"timestamp": "2026-01-05T05:54:00Z",
"trace_id": "0605ae13-99fb-5348-6f16-64cef4ad3334"
} | {
"account_age_days": 1409,
"account_id": "ACCT-53AFD8D79C4D",
"baseline_risk_score": 0.09,
"kyc_tier": "tier_2",
"session_entropy": 0.292
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 369,
"timestamp": "2026-01-05T05:54:00Z",
"transaction_amount_usd": 2451333.37
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.794,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1926652.31,
"financial_exposure_usd": 2427693.34,
"recoverable_pct": 0.744
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100033",
"label": "fraudulent",
"label_confidence": 0.953,
"severity": "medium",
"timestamp": "2026-01-01T00:33:00Z",
"trace_id": "7938878a-89b5-aab0-c121-69db2f12b150"
} | {
"account_age_days": 1562,
"account_id": "ACCT-FB37AFAECD85",
"baseline_risk_score": 0.394,
"kyc_tier": "tier_2",
"session_entropy": 0.714
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 925,
"timestamp": "2026-01-01T00:33:00Z",
"transaction_amount_usd": 36438
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.572,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 239691.1,
"financial_exposure_usd": 560773.72,
"recoverable_pct": 0.734
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107959",
"label": "benign",
"label_confidence": 0.601,
"severity": "medium",
"timestamp": "2026-01-06T12:39:00Z",
"trace_id": "f6adde52-f4f3-b26a-5292-236d47baa8f1"
} | {
"account_age_days": 257,
"account_id": "ACCT-36F94874CFFA",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.667
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 163,
"timestamp": "2026-01-06T12:39:00Z",
"transaction_amount_usd": 8232.33
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.478,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1941.45,
"financial_exposure_usd": 1976.01,
"recoverable_pct": 0.597
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101023",
"label": "fraudulent",
"label_confidence": 0.754,
"severity": "medium",
"timestamp": "2026-01-01T17:03:00Z",
"trace_id": "b6ff6837-6fae-abba-14eb-383a65f2bc1b"
} | {
"account_age_days": 396,
"account_id": "ACCT-F3F9C3FB4651",
"baseline_risk_score": 0.371,
"kyc_tier": "tier_1",
"session_entropy": 0.78
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 143,
"timestamp": "2026-01-01T17:03:00Z",
"transaction_amount_usd": 89592.82
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.579,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 649505.85,
"financial_exposure_usd": 746165.88,
"recoverable_pct": 0.642
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101577",
"label": "fraudulent",
"label_confidence": 0.935,
"severity": "high",
"timestamp": "2026-01-02T02:17:00Z",
"trace_id": "e7d538cb-7bd2-d6d1-94f2-c83eda1ae1ce"
} | {
"account_age_days": 901,
"account_id": "ACCT-6B2EEF1DA204",
"baseline_risk_score": 0.286,
"kyc_tier": "tier_2",
"session_entropy": 0.722
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 1173,
"timestamp": "2026-01-02T02:17:00Z",
"transaction_amount_usd": 63821.73
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.881,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 857275.6,
"financial_exposure_usd": 1168591.96,
"recoverable_pct": 0.141
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101731",
"label": "fraudulent",
"label_confidence": 0.945,
"severity": "medium",
"timestamp": "2026-01-02T04:51:00Z",
"trace_id": "d3808397-0415-a3b1-d196-b38f60c80307"
} | {
"account_age_days": 1834,
"account_id": "ACCT-5CD451717150",
"baseline_risk_score": 0.336,
"kyc_tier": "tier_2",
"session_entropy": 0.401
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 395,
"timestamp": "2026-01-02T04:51:00Z",
"transaction_amount_usd": 100341.88
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.779,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 478766.01,
"financial_exposure_usd": 878788.19,
"recoverable_pct": 0.761
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105857",
"label": "fraudulent",
"label_confidence": 0.87,
"severity": "medium",
"timestamp": "2026-01-05T01:37:00Z",
"trace_id": "a7138bd8-92c2-f96e-5980-92f947f43707"
} | {
"account_age_days": 35,
"account_id": "ACCT-BC0AC16C0ED7",
"baseline_risk_score": 0.177,
"kyc_tier": "tier_1",
"session_entropy": 0.31
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 640,
"timestamp": "2026-01-05T01:37:00Z",
"transaction_amount_usd": 1980573.04
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.679,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3879458.69,
"financial_exposure_usd": 5429530.55,
"recoverable_pct": 0.941
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100177",
"label": "fraudulent",
"label_confidence": 0.764,
"severity": "high",
"timestamp": "2026-01-01T02:57:00Z",
"trace_id": "5c69ee49-712c-3126-3222-504f02bb6d94"
} | {
"account_age_days": 549,
"account_id": "ACCT-8063FCE4C2E4",
"baseline_risk_score": 0.517,
"kyc_tier": "tier_1",
"session_entropy": 0.225
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 337,
"timestamp": "2025-12-31T17:10:00Z",
"transaction_amount_usd": 9.22
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.616,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 691039.09,
"financial_exposure_usd": 903180.45,
"recoverable_pct": 0.585
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100243",
"label": "fraudulent",
"label_confidence": 0.803,
"severity": "medium",
"timestamp": "2026-01-01T04:03:00Z",
"trace_id": "eb0a97f7-1578-320e-f4ca-37a413abd39b"
} | {
"account_age_days": 288,
"account_id": "ACCT-D68B717E57CB",
"baseline_risk_score": 0.367,
"kyc_tier": "tier_2",
"session_entropy": 0.122
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 1105,
"timestamp": "2026-01-01T04:03:00Z",
"transaction_amount_usd": 59851.63
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.452,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 644509.49,
"financial_exposure_usd": 667913.11,
"recoverable_pct": 0.516
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109394",
"label": "benign",
"label_confidence": 0.469,
"severity": "high",
"timestamp": "2026-01-07T12:34:00Z",
"trace_id": "fd59bb4e-ad31-7227-7414-ab1ec22537f0"
} | {
"account_age_days": 393,
"account_id": "ACCT-E126F8994664",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.121
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 754,
"timestamp": "2026-01-07T12:34:00Z",
"transaction_amount_usd": 7238.68
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.716,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2672.22,
"financial_exposure_usd": 2838.82,
"recoverable_pct": 0.841
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108685",
"label": "benign",
"label_confidence": 0.6,
"severity": "medium",
"timestamp": "2026-01-07T00:45:00Z",
"trace_id": "ae4e2666-69c6-c31c-5da0-f72eebeb1484"
} | {
"account_age_days": 1289,
"account_id": "ACCT-834CB7139391",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.887
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 646,
"timestamp": "2026-01-07T00:45:00Z",
"transaction_amount_usd": 14233.26
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.596,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1577.36,
"financial_exposure_usd": 2692.31,
"recoverable_pct": 0.458
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105375",
"label": "fraudulent",
"label_confidence": 0.765,
"severity": "high",
"timestamp": "2026-01-04T17:35:00Z",
"trace_id": "5937aeb2-c872-b052-e904-cf06a0447cdd"
} | {
"account_age_days": 1034,
"account_id": "ACCT-36F341DE858E",
"baseline_risk_score": 0.386,
"kyc_tier": "tier_3",
"session_entropy": 0.811
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 1004,
"timestamp": "2026-01-04T17:35:00Z",
"transaction_amount_usd": 950290.37
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.426,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4136163.19,
"financial_exposure_usd": 4809190.58,
"recoverable_pct": 0.516
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100552",
"label": "fraudulent",
"label_confidence": 0.935,
"severity": "high",
"timestamp": "2026-01-01T09:12:00Z",
"trace_id": "28e5c281-905f-4447-023a-793f16993c9f"
} | {
"account_age_days": 408,
"account_id": "ACCT-97763AB7AAE8",
"baseline_risk_score": 0.26,
"kyc_tier": "tier_3",
"session_entropy": 0.788
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 1062,
"timestamp": "2026-01-01T09:12:00Z",
"transaction_amount_usd": 15781.9
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.903,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 570845.72,
"financial_exposure_usd": 789444.26,
"recoverable_pct": 0.181
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107485",
"label": "benign",
"label_confidence": 0.495,
"severity": "high",
"timestamp": "2026-01-06T04:45:00Z",
"trace_id": "6a91e580-25a6-6897-0950-0f06c0542241"
} | {
"account_age_days": 636,
"account_id": "ACCT-1F0D89E51516",
"baseline_risk_score": 0.062,
"kyc_tier": "tier_2",
"session_entropy": 0.692
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 411,
"timestamp": "2026-01-06T04:45:00Z",
"transaction_amount_usd": 9561.03
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.703,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2002.13,
"financial_exposure_usd": 2726.58,
"recoverable_pct": 0.718
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100496",
"label": "fraudulent",
"label_confidence": 0.824,
"severity": "high",
"timestamp": "2026-01-01T08:16:00Z",
"trace_id": "37903886-cf8e-83fe-6f6a-86e8ce37626d"
} | {
"account_age_days": 1365,
"account_id": "ACCT-725DF3FF8024",
"baseline_risk_score": 0.448,
"kyc_tier": "tier_1",
"session_entropy": 0.167
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 790,
"timestamp": "2026-01-01T08:16:00Z",
"transaction_amount_usd": 60720.21
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.725,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 300355.4,
"financial_exposure_usd": 572580.7,
"recoverable_pct": 0.581
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102937",
"label": "fraudulent",
"label_confidence": 0.98,
"severity": "high",
"timestamp": "2026-01-03T00:57:00Z",
"trace_id": "1630ffda-eee7-0673-02fc-29739d8cb431"
} | {
"account_age_days": 1726,
"account_id": "ACCT-A3BDE6172CE4",
"baseline_risk_score": 0.525,
"kyc_tier": "tier_1",
"session_entropy": 0.608
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "SG",
"latency_ms": 245,
"timestamp": "2026-01-03T00:57:00Z",
"transaction_amount_usd": 72409.83
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.503,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 1325263.27,
"financial_exposure_usd": 1424482.77,
"recoverable_pct": 0.598
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106198",
"label": "fraudulent",
"label_confidence": 0.656,
"severity": "medium",
"timestamp": "2026-01-05T07:18:00Z",
"trace_id": "fa94284d-9b54-b2bf-e950-e7f807a5d9ef"
} | {
"account_age_days": 105,
"account_id": "ACCT-8637E98C5131",
"baseline_risk_score": 0.345,
"kyc_tier": "tier_2",
"session_entropy": 0.166
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 814,
"timestamp": "2026-01-05T07:18:00Z",
"transaction_amount_usd": 942261.84
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.524,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4402679.24,
"financial_exposure_usd": 4811243.41,
"recoverable_pct": 0.424
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101512",
"label": "fraudulent",
"label_confidence": 0.848,
"severity": "critical",
"timestamp": "2026-01-02T01:12:00Z",
"trace_id": "3a6fb5bb-f598-d494-4c1e-827f24d9d65e"
} | {
"account_age_days": 1370,
"account_id": "ACCT-7BD6EDFE1005",
"baseline_risk_score": 0.647,
"kyc_tier": "tier_3",
"session_entropy": 0.806
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CA",
"latency_ms": 1185,
"timestamp": "2026-01-02T01:12:00Z",
"transaction_amount_usd": 10088.11
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.453,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 495226.91,
"financial_exposure_usd": 699296.35,
"recoverable_pct": 0.232
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105802",
"label": "fraudulent",
"label_confidence": 0.912,
"severity": "high",
"timestamp": "2026-01-05T00:42:00Z",
"trace_id": "8c8d4145-263a-35fd-60c5-6258f4aa50d7"
} | {
"account_age_days": 1927,
"account_id": "ACCT-DCE2AAECD4C9",
"baseline_risk_score": 0.404,
"kyc_tier": "tier_2",
"session_entropy": 0.627
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 957,
"timestamp": "2026-01-05T00:42:00Z",
"transaction_amount_usd": 168177.12
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.729,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3950326.95,
"financial_exposure_usd": 4533268.82,
"recoverable_pct": 0.76
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104166",
"label": "fraudulent",
"label_confidence": 0.745,
"severity": "medium",
"timestamp": "2026-01-03T21:26:00Z",
"trace_id": "a15f61ed-001d-ebc9-69bf-5ef69c77b5a8"
} | {
"account_age_days": 1311,
"account_id": "ACCT-5B9BF501FA1F",
"baseline_risk_score": 0.163,
"kyc_tier": "tier_1",
"session_entropy": 0.651
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 316,
"timestamp": "2026-01-03T21:26:00Z",
"transaction_amount_usd": 2824087.9
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.778,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3022422.53,
"financial_exposure_usd": 6693708.95,
"recoverable_pct": 0.759
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106029",
"label": "fraudulent",
"label_confidence": 0.81,
"severity": "medium",
"timestamp": "2026-01-05T04:29:00Z",
"trace_id": "346faa6c-d6c0-674b-c82b-5da5783ad90e"
} | {
"account_age_days": 1814,
"account_id": "ACCT-7609C2B9C4FC",
"baseline_risk_score": 0.148,
"kyc_tier": "tier_2",
"session_entropy": 0.404
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 1092,
"timestamp": "2026-01-05T04:29:00Z",
"transaction_amount_usd": 2839942.01
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.399,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3370722.04,
"financial_exposure_usd": 3413185,
"recoverable_pct": 0.984
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102583",
"label": "fraudulent",
"label_confidence": 0.802,
"severity": "high",
"timestamp": "2026-01-02T19:03:00Z",
"trace_id": "6b6ca93c-d16c-7db1-dc4f-00c4935f8fdc"
} | {
"account_age_days": 379,
"account_id": "ACCT-1237FA70619F",
"baseline_risk_score": 0.396,
"kyc_tier": "tier_1",
"session_entropy": 0.588
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 196,
"timestamp": "2026-01-02T16:23:00Z",
"transaction_amount_usd": 17.74
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.626,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 376450.62,
"financial_exposure_usd": 454897.54,
"recoverable_pct": 0.204
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102803",
"label": "fraudulent",
"label_confidence": 0.809,
"severity": "medium",
"timestamp": "2026-01-02T22:43:00Z",
"trace_id": "86cf744b-7051-755c-c9fc-b3104167df87"
} | {
"account_age_days": 215,
"account_id": "ACCT-0D6239EFCE86",
"baseline_risk_score": 0.425,
"kyc_tier": "tier_2",
"session_entropy": 0.629
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 181,
"timestamp": "2026-01-02T20:41:00Z",
"transaction_amount_usd": 12.01
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.793,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 9",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 413918.29,
"financial_exposure_usd": 986337.27,
"recoverable_pct": 0.254
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106423",
"label": "fraudulent",
"label_confidence": 0.602,
"severity": "medium",
"timestamp": "2026-01-05T11:03:00Z",
"trace_id": "59cf6390-9a1f-a390-a861-b56ebaf287f0"
} | {
"account_age_days": 1601,
"account_id": "ACCT-9A03B4C04840",
"baseline_risk_score": 0.198,
"kyc_tier": "tier_2",
"session_entropy": 0.127
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 889,
"timestamp": "2026-01-05T11:03:00Z",
"transaction_amount_usd": 315789.94
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.803,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 5730594.68,
"financial_exposure_usd": 8152889.88,
"recoverable_pct": 0.581
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109360",
"label": "benign",
"label_confidence": 0.6,
"severity": "high",
"timestamp": "2026-01-07T12:00:00Z",
"trace_id": "9bfa2714-75ee-7a73-0e6e-892eb272e108"
} | {
"account_age_days": 544,
"account_id": "ACCT-5151A7DEE449",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.539
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 488,
"timestamp": "2026-01-07T12:00:00Z",
"transaction_amount_usd": 5697.09
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.515,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1246.95,
"financial_exposure_usd": 2309.97,
"recoverable_pct": 0.664
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104399",
"label": "fraudulent",
"label_confidence": 0.601,
"severity": "high",
"timestamp": "2026-01-04T01:19:00Z",
"trace_id": "b1108bf7-eca5-a2c4-6489-cc7fbd97fd4f"
} | {
"account_age_days": 1924,
"account_id": "ACCT-1038D21586C3",
"baseline_risk_score": 0.193,
"kyc_tier": "tier_2",
"session_entropy": 0.618
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 346,
"timestamp": "2026-01-03T19:56:00Z",
"transaction_amount_usd": 0.41
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.848,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 8853334.39,
"financial_exposure_usd": 8920716.71,
"recoverable_pct": 0.41
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108802",
"label": "benign",
"label_confidence": 0.582,
"severity": "low",
"timestamp": "2026-01-07T02:42:00Z",
"trace_id": "fe46ae4a-da1f-214f-5064-2861da33d48c"
} | {
"account_age_days": 1684,
"account_id": "ACCT-ADDD41108D89",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.3
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 749,
"timestamp": "2026-01-07T02:42:00Z",
"transaction_amount_usd": 14338.96
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.755,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2159.3,
"financial_exposure_usd": 3240,
"recoverable_pct": 0.767
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103960",
"label": "fraudulent",
"label_confidence": 0.881,
"severity": "high",
"timestamp": "2026-01-03T18:00:00Z",
"trace_id": "247de848-7699-8080-8719-282da8e1552c"
} | {
"account_age_days": 491,
"account_id": "ACCT-224D9DE799D6",
"baseline_risk_score": 0.346,
"kyc_tier": "tier_2",
"session_entropy": 0.632
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 807,
"timestamp": "2026-01-03T18:00:00Z",
"transaction_amount_usd": 954902.1
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.7,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 3714042.72,
"financial_exposure_usd": 3879309.72,
"recoverable_pct": 0.981
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108787",
"label": "benign",
"label_confidence": 0.605,
"severity": "low",
"timestamp": "2026-01-07T02:27:00Z",
"trace_id": "66fa7bd0-e8a9-1789-ed7a-ed05d7bf3480"
} | {
"account_age_days": 1302,
"account_id": "ACCT-090B5DDF77A4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.859
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 324,
"timestamp": "2026-01-07T00:24:00Z",
"transaction_amount_usd": 7.85
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.463,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1583.97,
"financial_exposure_usd": 3223.49,
"recoverable_pct": 0.546
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103769",
"label": "fraudulent",
"label_confidence": 0.609,
"severity": "medium",
"timestamp": "2026-01-03T14:49:00Z",
"trace_id": "2cab0a63-d5d1-3b71-6ec6-e87a157bb468"
} | {
"account_age_days": 1382,
"account_id": "ACCT-0B722D9BA996",
"baseline_risk_score": 0.31,
"kyc_tier": "tier_2",
"session_entropy": 0.417
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 149,
"timestamp": "2026-01-03T12:33:00Z",
"transaction_amount_usd": 20.84
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.413,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4377137.46,
"financial_exposure_usd": 9168550.29,
"recoverable_pct": 0.977
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108080",
"label": "benign",
"label_confidence": 0.611,
"severity": "critical",
"timestamp": "2026-01-06T14:40:00Z",
"trace_id": "0e4c7474-1c3a-cbf9-94a8-1876fdf6da19"
} | {
"account_age_days": 206,
"account_id": "ACCT-48EF92D1103D",
"baseline_risk_score": 0.184,
"kyc_tier": "tier_1",
"session_entropy": 0.717
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 358,
"timestamp": "2026-01-06T12:40:00Z",
"transaction_amount_usd": 20.79
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.74,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 191.4,
"financial_exposure_usd": 261.97,
"recoverable_pct": 0.55
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100869",
"label": "fraudulent",
"label_confidence": 0.869,
"severity": "critical",
"timestamp": "2026-01-01T14:29:00Z",
"trace_id": "7a02671b-340f-70b7-689b-6250bb81b676"
} | {
"account_age_days": 365,
"account_id": "ACCT-0771E2879050",
"baseline_risk_score": 0.468,
"kyc_tier": "tier_3",
"session_entropy": 0.61
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 175,
"timestamp": "2026-01-01T03:08:00Z",
"transaction_amount_usd": 5.19
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.456,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 1000524.77,
"financial_exposure_usd": 1036228.5,
"recoverable_pct": 0.764
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103656",
"label": "fraudulent",
"label_confidence": 0.902,
"severity": "high",
"timestamp": "2026-01-03T12:56:00Z",
"trace_id": "7679cf97-f0fe-23d6-82fc-f5ccc5beba8b"
} | {
"account_age_days": 1671,
"account_id": "ACCT-32F1C0860310",
"baseline_risk_score": 0.066,
"kyc_tier": "tier_3",
"session_entropy": 0.917
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 306,
"timestamp": "2026-01-03T07:43:00Z",
"transaction_amount_usd": 8.52
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.657,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2354986.05,
"financial_exposure_usd": 3114179.04,
"recoverable_pct": 0.493
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100825",
"label": "fraudulent",
"label_confidence": 0.956,
"severity": "critical",
"timestamp": "2026-01-01T13:45:00Z",
"trace_id": "e229a291-3a98-7f6b-2e33-66138f7675b9"
} | {
"account_age_days": 551,
"account_id": "ACCT-8DAAF36A971A",
"baseline_risk_score": 0.383,
"kyc_tier": "tier_2",
"session_entropy": 0.525
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 292,
"timestamp": "2026-01-01T02:57:00Z",
"transaction_amount_usd": 1.66
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.583,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 144895.15,
"financial_exposure_usd": 322516.68,
"recoverable_pct": 0.619
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107813",
"label": "benign",
"label_confidence": 0.573,
"severity": "high",
"timestamp": "2026-01-06T10:13:00Z",
"trace_id": "651b9ab5-6686-d6e0-17e4-f397b2667a6a"
} | {
"account_age_days": 1126,
"account_id": "ACCT-2F1EE33FF51B",
"baseline_risk_score": 0.186,
"kyc_tier": "tier_2",
"session_entropy": 0.692
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 392,
"timestamp": "2026-01-06T04:11:00Z",
"transaction_amount_usd": 2.23
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.672,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2232.57,
"financial_exposure_usd": 2530.85,
"recoverable_pct": 0.94
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101066",
"label": "fraudulent",
"label_confidence": 0.864,
"severity": "low",
"timestamp": "2026-01-01T17:46:00Z",
"trace_id": "2a878154-6c12-8b4b-f386-c2303a628422"
} | {
"account_age_days": 1693,
"account_id": "ACCT-E5B8C1F82EC5",
"baseline_risk_score": 0.339,
"kyc_tier": "tier_1",
"session_entropy": 0.8
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 98,
"timestamp": "2026-01-01T17:46:00Z",
"transaction_amount_usd": 44414.53
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.762,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 0, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 0,
"financial_exposure_usd": 0,
"recoverable_pct": 0.4
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108634",
"label": "benign",
"label_confidence": 0.48,
"severity": "high",
"timestamp": "2026-01-06T23:54:00Z",
"trace_id": "4652fcb1-f239-d789-2950-20f663ec3dbf"
} | {
"account_age_days": 379,
"account_id": "ACCT-3FF78E6B7F1F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.197
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 580,
"timestamp": "2026-01-06T23:54:00Z",
"transaction_amount_usd": 13080.72
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.702,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1860.25,
"financial_exposure_usd": 2824.11,
"recoverable_pct": 0.477
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108437",
"label": "benign",
"label_confidence": 0.597,
"severity": "medium",
"timestamp": "2026-01-06T20:37:00Z",
"trace_id": "70cf8782-9af6-04e7-48bb-1e738002a2ac"
} | {
"account_age_days": 181,
"account_id": "ACCT-1AF4AF68E5B3",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.575
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 434,
"timestamp": "2026-01-06T20:37:00Z",
"transaction_amount_usd": 6273.04
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.714,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3247.17,
"financial_exposure_usd": 3321.9,
"recoverable_pct": 0.7
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107377",
"label": "benign",
"label_confidence": 0.737,
"severity": "low",
"timestamp": "2026-01-06T02:57:00Z",
"trace_id": "cc2f87d1-6071-6eda-de97-fdce58b092cc"
} | {
"account_age_days": 1361,
"account_id": "ACCT-9E8A6B4A35FB",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.696
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 730,
"timestamp": "2026-01-06T02:57:00Z",
"transaction_amount_usd": 6465.83
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.76,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 1551.76,
"financial_exposure_usd": 3050.78,
"recoverable_pct": 0.492
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106562",
"label": "fraudulent",
"label_confidence": 0.731,
"severity": "high",
"timestamp": "2026-01-05T13:22:00Z",
"trace_id": "2d94135f-90af-b0da-0add-8e11034fd4b4"
} | {
"account_age_days": 1218,
"account_id": "ACCT-66159618237C",
"baseline_risk_score": 0.135,
"kyc_tier": "tier_1",
"session_entropy": 0.105
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 374,
"timestamp": "2026-01-05T11:48:00Z",
"transaction_amount_usd": 24.28
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.654,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4627328.04,
"financial_exposure_usd": 5349450.41,
"recoverable_pct": 0.979
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109258",
"label": "benign",
"label_confidence": 0.51,
"severity": "medium",
"timestamp": "2026-01-07T10:18:00Z",
"trace_id": "b42775e5-0b4c-a8fd-e116-ea087cbb92a1"
} | {
"account_age_days": 112,
"account_id": "ACCT-2CC021F203FE",
"baseline_risk_score": 0.154,
"kyc_tier": "tier_1",
"session_entropy": 0.6
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 1101,
"timestamp": "2026-01-07T10:18:00Z",
"transaction_amount_usd": 4160.46
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.634,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1290.57,
"financial_exposure_usd": 3167.88,
"recoverable_pct": 0.91
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103660",
"label": "fraudulent",
"label_confidence": 0.789,
"severity": "medium",
"timestamp": "2026-01-03T13:00:00Z",
"trace_id": "b248909c-60db-c0b3-9615-dbee9634bcc5"
} | {
"account_age_days": 1027,
"account_id": "ACCT-F3EA1B9F21F4",
"baseline_risk_score": 0.244,
"kyc_tier": "tier_1",
"session_entropy": 0.917
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 116,
"timestamp": "2026-01-03T01:30:00Z",
"transaction_amount_usd": 14.89
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.529,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1724184.85,
"financial_exposure_usd": 2120969.41,
"recoverable_pct": 0.475
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108621",
"label": "benign",
"label_confidence": 0.706,
"severity": "high",
"timestamp": "2026-01-06T23:41:00Z",
"trace_id": "fcc28d39-b2ef-b3ed-9104-a0a77144a44e"
} | {
"account_age_days": 820,
"account_id": "ACCT-F2BCBC615570",
"baseline_risk_score": 0.099,
"kyc_tier": "tier_1",
"session_entropy": 0.281
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 130,
"timestamp": "2026-01-06T16:44:00Z",
"transaction_amount_usd": 8.08
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.585,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 288.65,
"financial_exposure_usd": 695.91,
"recoverable_pct": 0.935
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101700",
"label": "fraudulent",
"label_confidence": 0.798,
"severity": "critical",
"timestamp": "2026-01-02T04:20:00Z",
"trace_id": "1ca72fab-0cf5-f906-8d74-a6ffe981e3ad"
} | {
"account_age_days": 1114,
"account_id": "ACCT-64E6CA663030",
"baseline_risk_score": 0.288,
"kyc_tier": "tier_2",
"session_entropy": 0.135
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 217,
"timestamp": "2026-01-01T23:04:00Z",
"transaction_amount_usd": 14.7
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.825,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 507568.43,
"financial_exposure_usd": 817431.9,
"recoverable_pct": 0.725
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105943",
"label": "fraudulent",
"label_confidence": 0.729,
"severity": "critical",
"timestamp": "2026-01-05T03:03:00Z",
"trace_id": "8060aaa9-635a-3a5e-3527-106477faa322"
} | {
"account_age_days": 1781,
"account_id": "ACCT-7D3C27B5982C",
"baseline_risk_score": 0.298,
"kyc_tier": "tier_1",
"session_entropy": 0.722
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 368,
"timestamp": "2026-01-05T03:03:00Z",
"transaction_amount_usd": 1849591.17
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.511,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5663823.8,
"financial_exposure_usd": 6855885.01,
"recoverable_pct": 0.512
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103658",
"label": "fraudulent",
"label_confidence": 0.881,
"severity": "high",
"timestamp": "2026-01-03T12:58:00Z",
"trace_id": "ac487c65-25d7-f039-3382-dc0cfc18b717"
} | {
"account_age_days": 1923,
"account_id": "ACCT-1F5706A9D697",
"baseline_risk_score": 0.128,
"kyc_tier": "tier_3",
"session_entropy": 0.878
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 122,
"timestamp": "2026-01-03T04:11:00Z",
"transaction_amount_usd": 10.39
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.676,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 9",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1128019.23,
"financial_exposure_usd": 2267683.1,
"recoverable_pct": 0.568
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106290",
"label": "fraudulent",
"label_confidence": 0.697,
"severity": "medium",
"timestamp": "2026-01-05T08:50:00Z",
"trace_id": "b5e7ba82-e3fb-6d1f-c114-cde14613153b"
} | {
"account_age_days": 355,
"account_id": "ACCT-21C1D88EBA60",
"baseline_risk_score": 0.363,
"kyc_tier": "tier_1",
"session_entropy": 0.177
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 716,
"timestamp": "2026-01-05T08:50:00Z",
"transaction_amount_usd": 544280.78
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.903,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1767426.04,
"financial_exposure_usd": 2599318.21,
"recoverable_pct": 0.482
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109936",
"label": "benign",
"label_confidence": 0.481,
"severity": "medium",
"timestamp": "2026-01-07T21:36:00Z",
"trace_id": "a68064d5-8148-8829-daf1-cbe85fb4a68a"
} | {
"account_age_days": 73,
"account_id": "ACCT-FAA8BF95356B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.297
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 1092,
"timestamp": "2026-01-07T21:36:00Z",
"transaction_amount_usd": 9806.09
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.61,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1048.53,
"financial_exposure_usd": 1395.76,
"recoverable_pct": 0.801
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105025",
"label": "fraudulent",
"label_confidence": 0.898,
"severity": "critical",
"timestamp": "2026-01-04T11:45:00Z",
"trace_id": "4ddb7085-2502-10de-2513-9a35edaea041"
} | {
"account_age_days": 458,
"account_id": "ACCT-C91E5A939E36",
"baseline_risk_score": 0.124,
"kyc_tier": "tier_2",
"session_entropy": 0.605
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 845,
"timestamp": "2026-01-04T11:45:00Z",
"transaction_amount_usd": 2929778.14
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.352,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2943924.42,
"financial_exposure_usd": 2993838.92,
"recoverable_pct": 0.7
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108805",
"label": "benign",
"label_confidence": 0.586,
"severity": "critical",
"timestamp": "2026-01-07T02:45:00Z",
"trace_id": "30532489-8fe1-9fa8-32bb-4940edf8df79"
} | {
"account_age_days": 1551,
"account_id": "ACCT-6334ECE9ECEC",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.359
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 96,
"timestamp": "2026-01-07T02:45:00Z",
"transaction_amount_usd": 13508.06
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.796,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2511.49,
"financial_exposure_usd": 3517.75,
"recoverable_pct": 0.858
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100654",
"label": "fraudulent",
"label_confidence": 0.852,
"severity": "high",
"timestamp": "2026-01-01T10:54:00Z",
"trace_id": "0525c043-c5ad-17e4-839c-dfa206de1761"
} | {
"account_age_days": 1565,
"account_id": "ACCT-B6BB3B94415F",
"baseline_risk_score": 0.337,
"kyc_tier": "tier_1",
"session_entropy": 0.658
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "JP",
"latency_ms": 678,
"timestamp": "2026-01-01T10:54:00Z",
"transaction_amount_usd": 26366.41
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.606,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 434159.55,
"financial_exposure_usd": 882880.33,
"recoverable_pct": 0.814
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106953",
"label": "benign",
"label_confidence": 0.595,
"severity": "low",
"timestamp": "2026-01-05T19:53:00Z",
"trace_id": "723c965e-8e71-151c-485e-2d6c2fe5c362"
} | {
"account_age_days": 67,
"account_id": "ACCT-4344B277E1BB",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.709
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 237,
"timestamp": "2026-01-05T18:43:00Z",
"transaction_amount_usd": 10.56
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.484,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3343.57,
"financial_exposure_usd": 5064.75,
"recoverable_pct": 0.735
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102559",
"label": "fraudulent",
"label_confidence": 0.95,
"severity": "critical",
"timestamp": "2026-01-02T18:39:00Z",
"trace_id": "dfaa643c-a473-83b0-4433-d7d5e5e8ee3a"
} | {
"account_age_days": 123,
"account_id": "ACCT-7E3C691B2A45",
"baseline_risk_score": 0.315,
"kyc_tier": "tier_3",
"session_entropy": 0.548
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 250,
"timestamp": "2026-01-02T08:40:00Z",
"transaction_amount_usd": 20.59
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.635,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 742537.28,
"financial_exposure_usd": 753296.71,
"recoverable_pct": 0.08
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.