schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106212",
"label": "fraudulent",
"label_confidence": 0.688,
"severity": "low",
"timestamp": "2026-01-05T07:32:00Z",
"trace_id": "7d1c8de2-b2ea-aa6c-baa5-40a1ae7f8ea2"
} | {
"account_age_days": 1386,
"account_id": "ACCT-73A9C2C178BA",
"baseline_risk_score": 0.251,
"kyc_tier": "tier_3",
"session_entropy": 0.803
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 383,
"timestamp": "2026-01-05T07:32:00Z",
"transaction_amount_usd": 2393902.5
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.842,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2708579.78,
"financial_exposure_usd": 5151454.43,
"recoverable_pct": 0.795
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106603",
"label": "fraudulent",
"label_confidence": 0.69,
"severity": "high",
"timestamp": "2026-01-05T14:03:00Z",
"trace_id": "c89947b4-1d3a-56f3-4f29-3a4e2d5240f0"
} | {
"account_age_days": 1926,
"account_id": "ACCT-1AD2D598E5E1",
"baseline_risk_score": 0.063,
"kyc_tier": "tier_2",
"session_entropy": 0.424
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 827,
"timestamp": "2026-01-05T14:03:00Z",
"transaction_amount_usd": 2755310.5
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.445,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2547065.77,
"financial_exposure_usd": 5706954.38,
"recoverable_pct": 0.893
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108011",
"label": "benign",
"label_confidence": 0.746,
"severity": "medium",
"timestamp": "2026-01-06T13:31:00Z",
"trace_id": "e8d021aa-cc44-d3f2-ff23-4cfb23417a4d"
} | {
"account_age_days": 175,
"account_id": "ACCT-5953AFEB9A79",
"baseline_risk_score": 0.123,
"kyc_tier": "tier_1",
"session_entropy": 0.242
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 1178,
"timestamp": "2026-01-06T13:31:00Z",
"transaction_amount_usd": 1453.31
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.568,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1928.39,
"financial_exposure_usd": 1963.94,
"recoverable_pct": 0.449
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101161",
"label": "fraudulent",
"label_confidence": 0.975,
"severity": "medium",
"timestamp": "2026-01-01T19:21:00Z",
"trace_id": "1840c4d7-28fb-b015-f90d-17fc1e064c1c"
} | {
"account_age_days": 1931,
"account_id": "ACCT-5F48D5DA3E9A",
"baseline_risk_score": 0.623,
"kyc_tier": "tier_1",
"session_entropy": 0.185
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 424,
"timestamp": "2026-01-01T19:21:00Z",
"transaction_amount_usd": 116485.07
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.48,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 388234.27,
"financial_exposure_usd": 886861.63,
"recoverable_pct": 0.688
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107240",
"label": "benign",
"label_confidence": 0.477,
"severity": "low",
"timestamp": "2026-01-06T00:40:00Z",
"trace_id": "e2383a90-d612-1048-3201-bb51ed6ecbe7"
} | {
"account_age_days": 1423,
"account_id": "ACCT-FD610EB25B75",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.7
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 802,
"timestamp": "2026-01-06T00:40:00Z",
"transaction_amount_usd": 12346.51
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.681,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1628.16,
"financial_exposure_usd": 2370.29,
"recoverable_pct": 0.485
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109931",
"label": "benign",
"label_confidence": 0.698,
"severity": "low",
"timestamp": "2026-01-07T21:31:00Z",
"trace_id": "390e6c48-b9be-02d2-646c-6d9765eb166b"
} | {
"account_age_days": 1046,
"account_id": "ACCT-0CD49BF00B1C",
"baseline_risk_score": 0.183,
"kyc_tier": "tier_1",
"session_entropy": 0.606
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 688,
"timestamp": "2026-01-07T21:31:00Z",
"transaction_amount_usd": 8365.93
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.55,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 4222.44,
"financial_exposure_usd": 5400.06,
"recoverable_pct": 0.828
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100718",
"label": "fraudulent",
"label_confidence": 0.913,
"severity": "high",
"timestamp": "2026-01-01T11:58:00Z",
"trace_id": "26f8454d-80b6-0ff3-0169-e1b4dd8d4717"
} | {
"account_age_days": 823,
"account_id": "ACCT-8A7A59D06210",
"baseline_risk_score": 0.611,
"kyc_tier": "tier_2",
"session_entropy": 0.531
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 92,
"timestamp": "2026-01-01T07:35:00Z",
"transaction_amount_usd": 0.24
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.696,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 781652.08,
"financial_exposure_usd": 859065.56,
"recoverable_pct": 0.568
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103161",
"label": "fraudulent",
"label_confidence": 0.854,
"severity": "medium",
"timestamp": "2026-01-03T04:41:00Z",
"trace_id": "963725f2-35fc-948b-ae32-bccab8c4dc96"
} | {
"account_age_days": 1874,
"account_id": "ACCT-75845B31176C",
"baseline_risk_score": 0.502,
"kyc_tier": "tier_2",
"session_entropy": 0.124
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 185,
"timestamp": "2026-01-02T16:24:00Z",
"transaction_amount_usd": 14.19
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.657,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 433267.74,
"financial_exposure_usd": 567717.13,
"recoverable_pct": 0.342
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100592",
"label": "fraudulent",
"label_confidence": 0.965,
"severity": "high",
"timestamp": "2026-01-01T09:52:00Z",
"trace_id": "b386c60f-3942-042b-55be-a17e38a4250d"
} | {
"account_age_days": 820,
"account_id": "ACCT-98C1715265AB",
"baseline_risk_score": 0.512,
"kyc_tier": "tier_1",
"session_entropy": 0.228
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 104,
"timestamp": "2026-01-01T09:52:00Z",
"transaction_amount_usd": 60319.2
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.609,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 805360.27,
"financial_exposure_usd": 1278907.06,
"recoverable_pct": 0.159
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108499",
"label": "benign",
"label_confidence": 0.508,
"severity": "low",
"timestamp": "2026-01-06T21:39:00Z",
"trace_id": "25fbefef-5762-ca40-86c5-7da17e3382dd"
} | {
"account_age_days": 643,
"account_id": "ACCT-79E8BD181D2B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.909
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 352,
"timestamp": "2026-01-06T21:39:00Z",
"transaction_amount_usd": 7469.17
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.546,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3592.24,
"financial_exposure_usd": 3972.58,
"recoverable_pct": 0.43
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103865",
"label": "fraudulent",
"label_confidence": 0.804,
"severity": "critical",
"timestamp": "2026-01-03T16:25:00Z",
"trace_id": "bdd2153d-617a-7559-f700-58758bbe4953"
} | {
"account_age_days": 719,
"account_id": "ACCT-061C1DB74F91",
"baseline_risk_score": 0.281,
"kyc_tier": "tier_2",
"session_entropy": 0.147
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 305,
"timestamp": "2026-01-03T06:49:00Z",
"transaction_amount_usd": 23.12
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.465,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 896092.83,
"financial_exposure_usd": 1033669.74,
"recoverable_pct": 0.915
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109776",
"label": "benign",
"label_confidence": 0.597,
"severity": "medium",
"timestamp": "2026-01-07T18:56:00Z",
"trace_id": "bc754aa0-b119-bfd9-7e71-6a896870953a"
} | {
"account_age_days": 950,
"account_id": "ACCT-03F12F270C54",
"baseline_risk_score": 0.054,
"kyc_tier": "tier_2",
"session_entropy": 0.565
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 217,
"timestamp": "2026-01-07T18:56:00Z",
"transaction_amount_usd": 10895.56
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.795,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3022.49,
"financial_exposure_usd": 3189.94,
"recoverable_pct": 0.658
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105564",
"label": "fraudulent",
"label_confidence": 0.945,
"severity": "high",
"timestamp": "2026-01-04T20:44:00Z",
"trace_id": "b7e3b67f-6702-101e-a536-d56c4ddae528"
} | {
"account_age_days": 1677,
"account_id": "ACCT-5C9DC460661D",
"baseline_risk_score": 0.4,
"kyc_tier": "tier_1",
"session_entropy": 0.373
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 1067,
"timestamp": "2026-01-04T20:44:00Z",
"transaction_amount_usd": 2354574.63
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.653,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2226339.3,
"financial_exposure_usd": 3581544.64,
"recoverable_pct": 0.98
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109770",
"label": "benign",
"label_confidence": 0.697,
"severity": "low",
"timestamp": "2026-01-07T18:50:00Z",
"trace_id": "a4052ab3-18cd-118d-bdf7-07cc71ad57ed"
} | {
"account_age_days": 728,
"account_id": "ACCT-904D2E9BEFC2",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.108
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 646,
"timestamp": "2026-01-07T18:50:00Z",
"transaction_amount_usd": 14694.91
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.635,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 31.96,
"financial_exposure_usd": 58.48,
"recoverable_pct": 0.784
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101144",
"label": "fraudulent",
"label_confidence": 0.841,
"severity": "critical",
"timestamp": "2026-01-01T19:04:00Z",
"trace_id": "0fc44884-e2e8-8f39-3916-af65cba7669a"
} | {
"account_age_days": 1862,
"account_id": "ACCT-403AECAB2A50",
"baseline_risk_score": 0.282,
"kyc_tier": "tier_2",
"session_entropy": 0.367
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 264,
"timestamp": "2026-01-01T14:49:00Z",
"transaction_amount_usd": 8.25
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.451,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 430240.31,
"financial_exposure_usd": 454150.08,
"recoverable_pct": 0.541
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107482",
"label": "benign",
"label_confidence": 0.501,
"severity": "low",
"timestamp": "2026-01-06T04:42:00Z",
"trace_id": "5082a44d-35f5-83f4-c9a1-c4b2609a1aa4"
} | {
"account_age_days": 160,
"account_id": "ACCT-DA49428C6CF6",
"baseline_risk_score": 0.172,
"kyc_tier": "tier_2",
"session_entropy": 0.527
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 264,
"timestamp": "2026-01-06T04:42:00Z",
"transaction_amount_usd": 8967.63
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.742,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 4979.05,
"financial_exposure_usd": 8023.24,
"recoverable_pct": 0.796
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100719",
"label": "fraudulent",
"label_confidence": 0.956,
"severity": "medium",
"timestamp": "2026-01-01T11:59:00Z",
"trace_id": "e07788c7-30b0-7cdc-5a2e-d6c24640f319"
} | {
"account_age_days": 828,
"account_id": "ACCT-D0730F84C168",
"baseline_risk_score": 0.566,
"kyc_tier": "tier_3",
"session_entropy": 0.463
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 982,
"timestamp": "2026-01-01T11:59:00Z",
"transaction_amount_usd": 64102.87
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.842,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 265496.6,
"financial_exposure_usd": 622450.03,
"recoverable_pct": 0.017
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108063",
"label": "benign",
"label_confidence": 0.679,
"severity": "medium",
"timestamp": "2026-01-06T14:23:00Z",
"trace_id": "93a54c78-2dd6-2050-2a7f-39403afe3d10"
} | {
"account_age_days": 1725,
"account_id": "ACCT-791A532355E4",
"baseline_risk_score": 0.08,
"kyc_tier": "tier_3",
"session_entropy": 0.428
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 1164,
"timestamp": "2026-01-06T14:23:00Z",
"transaction_amount_usd": 1077.73
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.638,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 242.25,
"financial_exposure_usd": 542.67,
"recoverable_pct": 0.686
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104029",
"label": "fraudulent",
"label_confidence": 0.835,
"severity": "critical",
"timestamp": "2026-01-03T19:09:00Z",
"trace_id": "d4b0928e-bb92-eb01-6bc6-d070e370d399"
} | {
"account_age_days": 3,
"account_id": "ACCT-5F2560EE1479",
"baseline_risk_score": 0.213,
"kyc_tier": "tier_3",
"session_entropy": 0.927
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 1098,
"timestamp": "2026-01-03T19:09:00Z",
"transaction_amount_usd": 475692.56
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.632,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2129884.79,
"financial_exposure_usd": 4000286.29,
"recoverable_pct": 0.713
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109222",
"label": "benign",
"label_confidence": 0.737,
"severity": "high",
"timestamp": "2026-01-07T09:42:00Z",
"trace_id": "a2a6a5a7-67a3-904f-6228-42594232d223"
} | {
"account_age_days": 525,
"account_id": "ACCT-4807B10AF441",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.787
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 203,
"timestamp": "2026-01-06T23:39:00Z",
"transaction_amount_usd": 6.34
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.523,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2454.92,
"financial_exposure_usd": 2827.27,
"recoverable_pct": 0.675
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104872",
"label": "fraudulent",
"label_confidence": 0.789,
"severity": "high",
"timestamp": "2026-01-04T09:12:00Z",
"trace_id": "d661989a-2520-e219-dd55-c48bd0e696c7"
} | {
"account_age_days": 1435,
"account_id": "ACCT-7AAE44EF4C4A",
"baseline_risk_score": 0.137,
"kyc_tier": "tier_1",
"session_entropy": 0.641
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 139,
"timestamp": "2026-01-04T07:35:00Z",
"transaction_amount_usd": 1.49
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.613,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4639413.15,
"financial_exposure_usd": 5834643.86,
"recoverable_pct": 0.513
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104843",
"label": "fraudulent",
"label_confidence": 0.724,
"severity": "medium",
"timestamp": "2026-01-04T08:43:00Z",
"trace_id": "04b752b2-1952-5a01-7d48-d5b18e48a894"
} | {
"account_age_days": 1745,
"account_id": "ACCT-2753DB196F02",
"baseline_risk_score": 0.2,
"kyc_tier": "tier_1",
"session_entropy": 0.531
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 218,
"timestamp": "2026-01-04T03:06:00Z",
"transaction_amount_usd": 13.4
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.529,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1282463.08,
"financial_exposure_usd": 3146919.27,
"recoverable_pct": 0.778
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106318",
"label": "fraudulent",
"label_confidence": 0.745,
"severity": "high",
"timestamp": "2026-01-05T09:18:00Z",
"trace_id": "a6c5817c-6c17-9d62-ccb7-1dc2c474e856"
} | {
"account_age_days": 1314,
"account_id": "ACCT-028E077A9DE0",
"baseline_risk_score": 0.435,
"kyc_tier": "tier_1",
"session_entropy": 0.213
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 1163,
"timestamp": "2026-01-05T09:18:00Z",
"transaction_amount_usd": 2201175.54
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.759,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1982691.19,
"financial_exposure_usd": 3627425.63,
"recoverable_pct": 0.567
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107401",
"label": "benign",
"label_confidence": 0.723,
"severity": "low",
"timestamp": "2026-01-06T03:21:00Z",
"trace_id": "fdc40670-c0bb-3556-6f63-54ad9178fd7a"
} | {
"account_age_days": 1552,
"account_id": "ACCT-C6350F45F8EC",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.204
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 832,
"timestamp": "2026-01-06T03:21:00Z",
"transaction_amount_usd": 13769.54
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.755,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 642.41,
"financial_exposure_usd": 1138.43,
"recoverable_pct": 0.602
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105148",
"label": "fraudulent",
"label_confidence": 0.651,
"severity": "low",
"timestamp": "2026-01-04T13:48:00Z",
"trace_id": "8298c35c-9821-a98e-c2f4-c7ad58bfd123"
} | {
"account_age_days": 335,
"account_id": "ACCT-5A16E521C474",
"baseline_risk_score": 0.436,
"kyc_tier": "tier_2",
"session_entropy": 0.18
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 239,
"timestamp": "2026-01-04T13:48:00Z",
"transaction_amount_usd": 304394.84
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.352,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1817340.95,
"financial_exposure_usd": 1965897.71,
"recoverable_pct": 0.84
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107868",
"label": "benign",
"label_confidence": 0.738,
"severity": "low",
"timestamp": "2026-01-06T11:08:00Z",
"trace_id": "85ffe4ef-2a70-c38e-3c0c-74cfa53a6610"
} | {
"account_age_days": 970,
"account_id": "ACCT-4A09E7391820",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.893
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 949,
"timestamp": "2026-01-06T11:08:00Z",
"transaction_amount_usd": 12549.23
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.787,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 6127.93,
"financial_exposure_usd": 6691.43,
"recoverable_pct": 0.819
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102699",
"label": "fraudulent",
"label_confidence": 0.921,
"severity": "high",
"timestamp": "2026-01-02T20:59:00Z",
"trace_id": "47edd33d-7bf8-12c5-7522-95af66423198"
} | {
"account_age_days": 1147,
"account_id": "ACCT-DE9166EE4B2B",
"baseline_risk_score": 0.444,
"kyc_tier": "tier_2",
"session_entropy": 0.261
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 169,
"timestamp": "2026-01-02T10:54:00Z",
"transaction_amount_usd": 23.91
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.591,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 343942.34,
"financial_exposure_usd": 577397.1,
"recoverable_pct": 0.471
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104262",
"label": "fraudulent",
"label_confidence": 0.781,
"severity": "critical",
"timestamp": "2026-01-03T23:02:00Z",
"trace_id": "44190777-3667-7c8f-a4ff-dbf3d8f81593"
} | {
"account_age_days": 405,
"account_id": "ACCT-984626624596",
"baseline_risk_score": 0.304,
"kyc_tier": "tier_1",
"session_entropy": 0.313
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 200,
"timestamp": "2026-01-03T10:51:00Z",
"transaction_amount_usd": 4.23
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.429,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3889357.42,
"financial_exposure_usd": 5166623.84,
"recoverable_pct": 0.614
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104823",
"label": "fraudulent",
"label_confidence": 0.81,
"severity": "high",
"timestamp": "2026-01-04T08:23:00Z",
"trace_id": "8c69f887-6a2f-c1d8-91fe-676b587ef718"
} | {
"account_age_days": 840,
"account_id": "ACCT-592A64A8CBC3",
"baseline_risk_score": 0.096,
"kyc_tier": "tier_3",
"session_entropy": 0.74
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 578,
"timestamp": "2026-01-04T08:23:00Z",
"transaction_amount_usd": 2267440.13
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.875,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2407238.94,
"financial_exposure_usd": 3272397.78,
"recoverable_pct": 0.674
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104256",
"label": "fraudulent",
"label_confidence": 0.781,
"severity": "medium",
"timestamp": "2026-01-03T22:56:00Z",
"trace_id": "d7c6ae78-c04e-a0f9-7d49-beb575268e0e"
} | {
"account_age_days": 1681,
"account_id": "ACCT-FDCD2828F945",
"baseline_risk_score": 0.357,
"kyc_tier": "tier_2",
"session_entropy": 0.17
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 984,
"timestamp": "2026-01-03T22:56:00Z",
"transaction_amount_usd": 970478.95
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.946,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4342058.45,
"financial_exposure_usd": 5060750.57,
"recoverable_pct": 0.597
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108776",
"label": "benign",
"label_confidence": 0.456,
"severity": "low",
"timestamp": "2026-01-07T02:16:00Z",
"trace_id": "a50de939-8f32-afa7-b50c-42d1d3c24b26"
} | {
"account_age_days": 930,
"account_id": "ACCT-73229E9168AE",
"baseline_risk_score": 0.167,
"kyc_tier": "tier_2",
"session_entropy": 0.339
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 973,
"timestamp": "2026-01-07T02:16:00Z",
"transaction_amount_usd": 3294.09
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.568,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 4318.83,
"financial_exposure_usd": 4544.26,
"recoverable_pct": 0.903
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108400",
"label": "benign",
"label_confidence": 0.637,
"severity": "medium",
"timestamp": "2026-01-06T20:00:00Z",
"trace_id": "a956420d-e96e-920c-fa74-c8475b13f31a"
} | {
"account_age_days": 1936,
"account_id": "ACCT-22033007EF5E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.414
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 246,
"timestamp": "2026-01-06T18:10:00Z",
"transaction_amount_usd": 12.16
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.654,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1910.86,
"financial_exposure_usd": 3122.32,
"recoverable_pct": 0.443
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108866",
"label": "benign",
"label_confidence": 0.683,
"severity": "low",
"timestamp": "2026-01-07T03:46:00Z",
"trace_id": "2e6d1665-3545-56b8-4b75-0eb5c0e6ffc5"
} | {
"account_age_days": 1108,
"account_id": "ACCT-4B5C7E34566B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.105
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 232,
"timestamp": "2026-01-07T00:24:00Z",
"transaction_amount_usd": 3.53
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.675,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 210.55,
"financial_exposure_usd": 276.41,
"recoverable_pct": 0.895
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107445",
"label": "benign",
"label_confidence": 0.578,
"severity": "high",
"timestamp": "2026-01-06T04:05:00Z",
"trace_id": "fdc96433-4bed-7456-901d-4ba4f3256462"
} | {
"account_age_days": 768,
"account_id": "ACCT-01EF222AF6C2",
"baseline_risk_score": 0.163,
"kyc_tier": "tier_3",
"session_entropy": 0.49
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 472,
"timestamp": "2026-01-06T04:05:00Z",
"transaction_amount_usd": 11822.7
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.676,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1718.24,
"financial_exposure_usd": 2505.3,
"recoverable_pct": 0.863
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101562",
"label": "fraudulent",
"label_confidence": 0.817,
"severity": "critical",
"timestamp": "2026-01-02T02:02:00Z",
"trace_id": "c7822698-18a3-bd3e-8a8c-e043c58da4f0"
} | {
"account_age_days": 525,
"account_id": "ACCT-96F35033C145",
"baseline_risk_score": 0.642,
"kyc_tier": "tier_2",
"session_entropy": 0.83
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CH",
"latency_ms": 183,
"timestamp": "2026-01-02T02:02:00Z",
"transaction_amount_usd": 90808.48
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.706,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 650761.81,
"financial_exposure_usd": 769548.14,
"recoverable_pct": 0.791
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105289",
"label": "fraudulent",
"label_confidence": 0.635,
"severity": "medium",
"timestamp": "2026-01-04T16:09:00Z",
"trace_id": "f58d57fd-e50e-7fd9-5245-61fa4f5953f4"
} | {
"account_age_days": 1738,
"account_id": "ACCT-1BDBBBCFB0A9",
"baseline_risk_score": 0.361,
"kyc_tier": "tier_2",
"session_entropy": 0.124
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 377,
"timestamp": "2026-01-04T16:09:00Z",
"transaction_amount_usd": 633121.88
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.603,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1025462.15,
"financial_exposure_usd": 1126337.32,
"recoverable_pct": 0.967
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102349",
"label": "fraudulent",
"label_confidence": 0.947,
"severity": "critical",
"timestamp": "2026-01-02T15:09:00Z",
"trace_id": "23b54c28-6432-9441-2d32-283a2af3f648"
} | {
"account_age_days": 970,
"account_id": "ACCT-F37832633F34",
"baseline_risk_score": 0.452,
"kyc_tier": "tier_3",
"session_entropy": 0.363
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 1168,
"timestamp": "2026-01-02T15:09:00Z",
"transaction_amount_usd": 17312.6
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.6,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING ... | {
"customer_funds_at_risk_usd": 272371.02,
"financial_exposure_usd": 481633.99,
"recoverable_pct": 0.736
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107048",
"label": "benign",
"label_confidence": 0.695,
"severity": "low",
"timestamp": "2026-01-05T21:28:00Z",
"trace_id": "1ccb2ac6-8ad5-f994-64b9-e7c561d2420b"
} | {
"account_age_days": 218,
"account_id": "ACCT-D5A0CF333CB1",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.44
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 888,
"timestamp": "2026-01-05T21:28:00Z",
"transaction_amount_usd": 3093.42
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.659,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1196.34,
"financial_exposure_usd": 2240.23,
"recoverable_pct": 0.916
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106231",
"label": "fraudulent",
"label_confidence": 0.73,
"severity": "low",
"timestamp": "2026-01-05T07:51:00Z",
"trace_id": "1c3ab247-3f84-9183-abdc-64dd323d49e0"
} | {
"account_age_days": 913,
"account_id": "ACCT-79489B10ACFC",
"baseline_risk_score": 0.229,
"kyc_tier": "tier_2",
"session_entropy": 0.476
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 237,
"timestamp": "2026-01-04T21:37:00Z",
"transaction_amount_usd": 3.95
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.363,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 6887280.81,
"financial_exposure_usd": 6908143.11,
"recoverable_pct": 0.507
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109396",
"label": "benign",
"label_confidence": 0.7,
"severity": "medium",
"timestamp": "2026-01-07T12:36:00Z",
"trace_id": "4a152e4e-4d01-9830-c75c-51d4d940406a"
} | {
"account_age_days": 53,
"account_id": "ACCT-BF8A592A57DA",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.869
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 395,
"timestamp": "2026-01-07T02:50:00Z",
"transaction_amount_usd": 4.16
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.633,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1787.35,
"financial_exposure_usd": 3255.23,
"recoverable_pct": 0.614
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100950",
"label": "fraudulent",
"label_confidence": 0.768,
"severity": "high",
"timestamp": "2026-01-01T15:50:00Z",
"trace_id": "217b60cf-976b-7fa7-eb00-c61b08e6f460"
} | {
"account_age_days": 642,
"account_id": "ACCT-A9DEE0266FCF",
"baseline_risk_score": 0.473,
"kyc_tier": "tier_3",
"session_entropy": 0.423
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 82,
"timestamp": "2026-01-01T10:30:00Z",
"transaction_amount_usd": 22.58
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.846,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 472365.52,
"financial_exposure_usd": 677937.08,
"recoverable_pct": 0.163
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104132",
"label": "fraudulent",
"label_confidence": 0.802,
"severity": "high",
"timestamp": "2026-01-03T20:52:00Z",
"trace_id": "7d63506f-823e-88b5-f334-e7c48467cc29"
} | {
"account_age_days": 222,
"account_id": "ACCT-76C8C2EBE832",
"baseline_risk_score": 0.141,
"kyc_tier": "tier_2",
"session_entropy": 0.514
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 886,
"timestamp": "2026-01-03T20:52:00Z",
"transaction_amount_usd": 1579216.67
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.851,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2708533.9,
"financial_exposure_usd": 4210954,
"recoverable_pct": 0.573
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103008",
"label": "fraudulent",
"label_confidence": 0.864,
"severity": "high",
"timestamp": "2026-01-03T02:08:00Z",
"trace_id": "748688f4-86d5-47bb-1dc4-3a218c16906c"
} | {
"account_age_days": 1473,
"account_id": "ACCT-ECD8DDB4C300",
"baseline_risk_score": 0.558,
"kyc_tier": "tier_1",
"session_entropy": 0.509
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 280,
"timestamp": "2026-01-02T19:08:00Z",
"transaction_amount_usd": 15.45
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.384,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 575884.86,
"financial_exposure_usd": 1033732.06,
"recoverable_pct": 0.647
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108689",
"label": "benign",
"label_confidence": 0.7,
"severity": "low",
"timestamp": "2026-01-07T00:49:00Z",
"trace_id": "7a6b16ba-c4f2-8160-b9b9-e20bde055e69"
} | {
"account_age_days": 1794,
"account_id": "ACCT-CFE5DF02C07D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.617
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 1129,
"timestamp": "2026-01-07T00:49:00Z",
"transaction_amount_usd": 6318.75
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.681,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1998.2,
"financial_exposure_usd": 2469.85,
"recoverable_pct": 0.485
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109534",
"label": "benign",
"label_confidence": 0.689,
"severity": "medium",
"timestamp": "2026-01-07T14:54:00Z",
"trace_id": "7e393c0e-84c5-4d83-16b0-7c8abe233260"
} | {
"account_age_days": 462,
"account_id": "ACCT-8BE5A6816406",
"baseline_risk_score": 0.126,
"kyc_tier": "tier_2",
"session_entropy": 0.822
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 700,
"timestamp": "2026-01-07T14:54:00Z",
"transaction_amount_usd": 11000.9
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.794,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 4558.27,
"financial_exposure_usd": 8172.5,
"recoverable_pct": 0.76
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101209",
"label": "fraudulent",
"label_confidence": 0.936,
"severity": "high",
"timestamp": "2026-01-01T20:09:00Z",
"trace_id": "9edc2e21-66ff-db56-a0be-e68a1c4f2a7c"
} | {
"account_age_days": 966,
"account_id": "ACCT-141C1C3DC99F",
"baseline_risk_score": 0.357,
"kyc_tier": "tier_1",
"session_entropy": 0.369
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CA",
"latency_ms": 1149,
"timestamp": "2026-01-01T20:09:00Z",
"transaction_amount_usd": 77340.02
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.713,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 1013057,
"financial_exposure_usd": 1104168.43,
"recoverable_pct": 0.052
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106187",
"label": "fraudulent",
"label_confidence": 0.686,
"severity": "critical",
"timestamp": "2026-01-05T07:07:00Z",
"trace_id": "ea10437a-67ee-b62c-0638-8a836ce092da"
} | {
"account_age_days": 783,
"account_id": "ACCT-D53801435B99",
"baseline_risk_score": 0.425,
"kyc_tier": "tier_2",
"session_entropy": 0.581
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 91,
"timestamp": "2026-01-05T07:07:00Z",
"transaction_amount_usd": 2074056.92
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.588,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2184679.87,
"financial_exposure_usd": 4016717.71,
"recoverable_pct": 1
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108294",
"label": "benign",
"label_confidence": 0.513,
"severity": "low",
"timestamp": "2026-01-06T18:14:00Z",
"trace_id": "cbbbce62-1b62-85e7-0549-01eef1b92066"
} | {
"account_age_days": 1443,
"account_id": "ACCT-639B4AEB372C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.307
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 512,
"timestamp": "2026-01-06T18:14:00Z",
"transaction_amount_usd": 8565.38
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.639,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3832.44,
"financial_exposure_usd": 4682.53,
"recoverable_pct": 0.988
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106458",
"label": "fraudulent",
"label_confidence": 0.727,
"severity": "medium",
"timestamp": "2026-01-05T11:38:00Z",
"trace_id": "eb6c69e2-75c2-9cd5-3e30-9eb9aa16776a"
} | {
"account_age_days": 566,
"account_id": "ACCT-5BFA4B8D21BA",
"baseline_risk_score": 0.449,
"kyc_tier": "tier_2",
"session_entropy": 0.626
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 165,
"timestamp": "2026-01-05T07:19:00Z",
"transaction_amount_usd": 5.97
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.83,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4451894.94,
"financial_exposure_usd": 7321594.73,
"recoverable_pct": 0.934
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104943",
"label": "fraudulent",
"label_confidence": 0.912,
"severity": "high",
"timestamp": "2026-01-04T10:23:00Z",
"trace_id": "828ed9a7-3c8b-a7a1-4dd7-2da97c5aa231"
} | {
"account_age_days": 831,
"account_id": "ACCT-1C89BFE13ED9",
"baseline_risk_score": 0.097,
"kyc_tier": "tier_1",
"session_entropy": 0.578
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 272,
"timestamp": "2026-01-04T10:23:00Z",
"transaction_amount_usd": 2559506.3
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.619,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2414736.94,
"financial_exposure_usd": 4218511.79,
"recoverable_pct": 0.958
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100126",
"label": "fraudulent",
"label_confidence": 0.872,
"severity": "critical",
"timestamp": "2026-01-01T02:06:00Z",
"trace_id": "7e5533ba-e8a2-f417-379e-03dde6f8dac3"
} | {
"account_age_days": 1073,
"account_id": "ACCT-D624F0550C39",
"baseline_risk_score": 0.607,
"kyc_tier": "tier_3",
"session_entropy": 0.64
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "GB",
"latency_ms": 1113,
"timestamp": "2026-01-01T02:06:00Z",
"transaction_amount_usd": 66562.46
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.584,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 167487.49,
"financial_exposure_usd": 251334.78,
"recoverable_pct": 0.508
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108434",
"label": "benign",
"label_confidence": 0.522,
"severity": "low",
"timestamp": "2026-01-06T20:34:00Z",
"trace_id": "55fa6ce7-03bf-164f-6ee4-29cacc5cba01"
} | {
"account_age_days": 594,
"account_id": "ACCT-0F2395EA9560",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.629
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 375,
"timestamp": "2026-01-06T15:57:00Z",
"transaction_amount_usd": 13.24
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.534,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3946.77,
"financial_exposure_usd": 6022.89,
"recoverable_pct": 0.517
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107647",
"label": "benign",
"label_confidence": 0.711,
"severity": "low",
"timestamp": "2026-01-06T07:27:00Z",
"trace_id": "6a0283e0-d650-b1fc-2c61-7485f108189d"
} | {
"account_age_days": 1506,
"account_id": "ACCT-48D98F5013BF",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.759
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 267,
"timestamp": "2026-01-06T07:27:00Z",
"transaction_amount_usd": 1620.06
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.496,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2389.25,
"financial_exposure_usd": 2665.26,
"recoverable_pct": 0.962
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104446",
"label": "fraudulent",
"label_confidence": 0.941,
"severity": "critical",
"timestamp": "2026-01-04T02:06:00Z",
"trace_id": "47fa9121-9fbf-d76e-89e6-ac3d7699f754"
} | {
"account_age_days": 1955,
"account_id": "ACCT-2512D420F5B2",
"baseline_risk_score": 0.109,
"kyc_tier": "tier_2",
"session_entropy": 0.921
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 253,
"timestamp": "2026-01-04T02:06:00Z",
"transaction_amount_usd": 2455867.82
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.734,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 539002.5,
"financial_exposure_usd": 1067320.59,
"recoverable_pct": 0.801
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106118",
"label": "fraudulent",
"label_confidence": 0.635,
"severity": "high",
"timestamp": "2026-01-05T05:58:00Z",
"trace_id": "d7e41753-c35d-f983-e0a1-fa6fc3feb373"
} | {
"account_age_days": 189,
"account_id": "ACCT-308F9E142056",
"baseline_risk_score": 0.322,
"kyc_tier": "tier_2",
"session_entropy": 0.104
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 270,
"timestamp": "2026-01-04T20:44:00Z",
"transaction_amount_usd": 1.32
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.523,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 9",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5110668.31,
"financial_exposure_usd": 5824838.09,
"recoverable_pct": 0.437
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101548",
"label": "fraudulent",
"label_confidence": 0.922,
"severity": "high",
"timestamp": "2026-01-02T01:48:00Z",
"trace_id": "867be278-2363-aeb8-f3e3-520f53add3c8"
} | {
"account_age_days": 1473,
"account_id": "ACCT-D56A76439A6A",
"baseline_risk_score": 0.469,
"kyc_tier": "tier_2",
"session_entropy": 0.913
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "SG",
"latency_ms": 640,
"timestamp": "2026-01-02T01:48:00Z",
"transaction_amount_usd": 82259.14
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.788,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 282011.65,
"financial_exposure_usd": 395416.23,
"recoverable_pct": 0.436
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103148",
"label": "fraudulent",
"label_confidence": 0.897,
"severity": "high",
"timestamp": "2026-01-03T04:28:00Z",
"trace_id": "dde5644d-22d3-2d19-cabb-419f4e4f1c58"
} | {
"account_age_days": 590,
"account_id": "ACCT-E86347846565",
"baseline_risk_score": 0.412,
"kyc_tier": "tier_2",
"session_entropy": 0.634
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 164,
"timestamp": "2026-01-02T21:07:00Z",
"transaction_amount_usd": 24.02
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.362,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 581295.62,
"financial_exposure_usd": 856574.3,
"recoverable_pct": 0.15
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109195",
"label": "benign",
"label_confidence": 0.486,
"severity": "high",
"timestamp": "2026-01-07T09:15:00Z",
"trace_id": "32320ab7-7d30-2929-73c2-1551634d54e5"
} | {
"account_age_days": 39,
"account_id": "ACCT-864D87A44C02",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.925
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 1186,
"timestamp": "2026-01-07T09:15:00Z",
"transaction_amount_usd": 3176.9
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.464,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 3",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 168.29,
"financial_exposure_usd": 273.54,
"recoverable_pct": 0.755
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108332",
"label": "benign",
"label_confidence": 0.557,
"severity": "low",
"timestamp": "2026-01-06T18:52:00Z",
"trace_id": "51c50869-9bae-585f-e101-01862d378110"
} | {
"account_age_days": 871,
"account_id": "ACCT-934F3844FCBA",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.399
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 477,
"timestamp": "2026-01-06T18:52:00Z",
"transaction_amount_usd": 5608.13
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.698,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3092.57,
"financial_exposure_usd": 4231.62,
"recoverable_pct": 0.562
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101708",
"label": "fraudulent",
"label_confidence": 0.918,
"severity": "medium",
"timestamp": "2026-01-02T04:28:00Z",
"trace_id": "4d196e32-813f-a1e1-f01c-733e82712d74"
} | {
"account_age_days": 1546,
"account_id": "ACCT-2797A7F69C75",
"baseline_risk_score": 0.543,
"kyc_tier": "tier_3",
"session_entropy": 0.696
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 1042,
"timestamp": "2026-01-02T04:28:00Z",
"transaction_amount_usd": 71237.27
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.356,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 234384.13,
"financial_exposure_usd": 265421.79,
"recoverable_pct": 0.62
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106141",
"label": "fraudulent",
"label_confidence": 0.727,
"severity": "medium",
"timestamp": "2026-01-05T06:21:00Z",
"trace_id": "6a15c109-9df0-21ae-7689-60b5143d8fcd"
} | {
"account_age_days": 757,
"account_id": "ACCT-CBA3B9A2B897",
"baseline_risk_score": 0.354,
"kyc_tier": "tier_2",
"session_entropy": 0.13
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 941,
"timestamp": "2026-01-05T06:21:00Z",
"transaction_amount_usd": 2100072.02
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.414,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3321681.06,
"financial_exposure_usd": 4971891.86,
"recoverable_pct": 0.72
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103489",
"label": "fraudulent",
"label_confidence": 0.85,
"severity": "low",
"timestamp": "2026-01-03T10:09:00Z",
"trace_id": "cc009dda-d1f4-88f1-fe56-c186fae24eba"
} | {
"account_age_days": 1640,
"account_id": "ACCT-94E9F43D92C5",
"baseline_risk_score": 0.211,
"kyc_tier": "tier_3",
"session_entropy": 0.892
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 393,
"timestamp": "2026-01-03T03:34:00Z",
"transaction_amount_usd": 2.25
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.749,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3628293.57,
"financial_exposure_usd": 4109687.52,
"recoverable_pct": 0.745
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108739",
"label": "benign",
"label_confidence": 0.713,
"severity": "low",
"timestamp": "2026-01-07T01:39:00Z",
"trace_id": "d31fa75e-b321-a66f-2dca-2f3fa0a6d3fb"
} | {
"account_age_days": 1357,
"account_id": "ACCT-35B81D8A2CA7",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.432
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 1056,
"timestamp": "2026-01-07T01:39:00Z",
"transaction_amount_usd": 12465.02
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.794,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3481.33,
"financial_exposure_usd": 5832.03,
"recoverable_pct": 0.59
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102807",
"label": "fraudulent",
"label_confidence": 0.757,
"severity": "high",
"timestamp": "2026-01-02T22:47:00Z",
"trace_id": "e38a49c6-9eac-b3fb-7ce7-a0e8f6a2e809"
} | {
"account_age_days": 1863,
"account_id": "ACCT-10A62EA29C85",
"baseline_risk_score": 0.511,
"kyc_tier": "tier_2",
"session_entropy": 0.53
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 958,
"timestamp": "2026-01-02T22:47:00Z",
"transaction_amount_usd": 73888.11
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.497,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 293959.53,
"financial_exposure_usd": 453223.53,
"recoverable_pct": 0.254
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102926",
"label": "fraudulent",
"label_confidence": 0.846,
"severity": "high",
"timestamp": "2026-01-03T00:46:00Z",
"trace_id": "ff7eed2e-8643-1b12-34be-5f854e42a9ec"
} | {
"account_age_days": 1357,
"account_id": "ACCT-B31B00BB6EBD",
"baseline_risk_score": 0.508,
"kyc_tier": "tier_2",
"session_entropy": 0.657
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 794,
"timestamp": "2026-01-03T00:46:00Z",
"transaction_amount_usd": 102150.32
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.734,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 481441.72,
"financial_exposure_usd": 966488.85,
"recoverable_pct": 0.022
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105978",
"label": "fraudulent",
"label_confidence": 0.612,
"severity": "low",
"timestamp": "2026-01-05T03:38:00Z",
"trace_id": "7fc01ff2-7582-5394-64e0-fda7ee40a27d"
} | {
"account_age_days": 727,
"account_id": "ACCT-826AAE1ABC71",
"baseline_risk_score": 0.296,
"kyc_tier": "tier_3",
"session_entropy": 0.852
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 1061,
"timestamp": "2026-01-05T03:38:00Z",
"transaction_amount_usd": 1338173.71
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.726,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4438250.27,
"financial_exposure_usd": 5094384.71,
"recoverable_pct": 0.605
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107925",
"label": "benign",
"label_confidence": 0.596,
"severity": "high",
"timestamp": "2026-01-06T12:05:00Z",
"trace_id": "44ea593a-cd54-8dcf-bc04-a84760b6a541"
} | {
"account_age_days": 1678,
"account_id": "ACCT-E0910F719BD7",
"baseline_risk_score": 0.173,
"kyc_tier": "tier_2",
"session_entropy": 0.568
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 564,
"timestamp": "2026-01-06T12:05:00Z",
"transaction_amount_usd": 9539.34
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.467,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3335.91,
"financial_exposure_usd": 3809.54,
"recoverable_pct": 0.422
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104320",
"label": "fraudulent",
"label_confidence": 0.943,
"severity": "medium",
"timestamp": "2026-01-04T00:00:00Z",
"trace_id": "2d321242-6fce-3c98-1428-d76328cd30c5"
} | {
"account_age_days": 5,
"account_id": "ACCT-3EC0F9395558",
"baseline_risk_score": 0.236,
"kyc_tier": "tier_2",
"session_entropy": 0.881
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 166,
"timestamp": "2026-01-04T00:00:00Z",
"transaction_amount_usd": 2464099.1
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.358,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 114351.74,
"financial_exposure_usd": 119769.77,
"recoverable_pct": 0.507
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109529",
"label": "benign",
"label_confidence": 0.514,
"severity": "low",
"timestamp": "2026-01-07T14:49:00Z",
"trace_id": "9236502e-0122-127b-477c-53204eab0900"
} | {
"account_age_days": 264,
"account_id": "ACCT-7746DC6357BF",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.748
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 1058,
"timestamp": "2026-01-07T14:49:00Z",
"transaction_amount_usd": 8583.95
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.699,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2142.43,
"financial_exposure_usd": 4983.84,
"recoverable_pct": 0.685
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107622",
"label": "benign",
"label_confidence": 0.733,
"severity": "medium",
"timestamp": "2026-01-06T07:02:00Z",
"trace_id": "b305eda7-f547-38b4-75d5-756af5340db5"
} | {
"account_age_days": 789,
"account_id": "ACCT-5F717278A8D9",
"baseline_risk_score": 0.058,
"kyc_tier": "tier_1",
"session_entropy": 0.261
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 147,
"timestamp": "2026-01-06T03:28:00Z",
"transaction_amount_usd": 9.85
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.505,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1087.05,
"financial_exposure_usd": 2037.29,
"recoverable_pct": 0.783
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108059",
"label": "benign",
"label_confidence": 0.724,
"severity": "medium",
"timestamp": "2026-01-06T14:19:00Z",
"trace_id": "226cc2cd-dfea-0c45-8bb4-b1552f927f07"
} | {
"account_age_days": 833,
"account_id": "ACCT-DC15B1487FAA",
"baseline_risk_score": 0.131,
"kyc_tier": "tier_1",
"session_entropy": 0.912
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 1164,
"timestamp": "2026-01-06T14:19:00Z",
"transaction_amount_usd": 3762.27
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.75,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 3868.9,
"financial_exposure_usd": 5470.08,
"recoverable_pct": 0.622
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100501",
"label": "fraudulent",
"label_confidence": 0.839,
"severity": "low",
"timestamp": "2026-01-01T08:21:00Z",
"trace_id": "1b3400a6-9c1b-2b3f-3954-620714fdca96"
} | {
"account_age_days": 1869,
"account_id": "ACCT-2881DC4FFB1D",
"baseline_risk_score": 0.454,
"kyc_tier": "tier_2",
"session_entropy": 0.861
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 925,
"timestamp": "2026-01-01T08:21:00Z",
"transaction_amount_usd": 116058.58
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.941,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 363069.75,
"financial_exposure_usd": 454550.93,
"recoverable_pct": 0.64
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104953",
"label": "fraudulent",
"label_confidence": 0.826,
"severity": "medium",
"timestamp": "2026-01-04T10:33:00Z",
"trace_id": "d4acce2b-c4d6-b7a8-126f-f33276330582"
} | {
"account_age_days": 451,
"account_id": "ACCT-9A1D437F6E14",
"baseline_risk_score": 0.171,
"kyc_tier": "tier_3",
"session_entropy": 0.111
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 128,
"timestamp": "2026-01-04T04:59:00Z",
"transaction_amount_usd": 23.8
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.68,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 9",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 2101089.12,
"financial_exposure_usd": 5205939.68,
"recoverable_pct": 0.906
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108924",
"label": "benign",
"label_confidence": 0.729,
"severity": "medium",
"timestamp": "2026-01-07T04:44:00Z",
"trace_id": "1b8bd070-658f-38e2-143c-15554143f533"
} | {
"account_age_days": 1432,
"account_id": "ACCT-CFAEB838745C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.431
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 1113,
"timestamp": "2026-01-07T04:44:00Z",
"transaction_amount_usd": 14689.88
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.704,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1670.29,
"financial_exposure_usd": 2987.02,
"recoverable_pct": 0.851
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102659",
"label": "fraudulent",
"label_confidence": 0.897,
"severity": "critical",
"timestamp": "2026-01-02T20:19:00Z",
"trace_id": "b8a1c9ce-6370-39b4-de45-902e247089a4"
} | {
"account_age_days": 143,
"account_id": "ACCT-4C656E619A9F",
"baseline_risk_score": 0.499,
"kyc_tier": "tier_2",
"session_entropy": 0.398
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 509,
"timestamp": "2026-01-02T20:19:00Z",
"transaction_amount_usd": 12997.68
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.572,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 292857.92,
"financial_exposure_usd": 384574.24,
"recoverable_pct": 0.301
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104225",
"label": "fraudulent",
"label_confidence": 0.675,
"severity": "critical",
"timestamp": "2026-01-03T22:25:00Z",
"trace_id": "2cb70554-1db3-056e-da9d-7d833512e87f"
} | {
"account_age_days": 1051,
"account_id": "ACCT-4EB503A8786A",
"baseline_risk_score": 0.08,
"kyc_tier": "tier_3",
"session_entropy": 0.201
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 115,
"timestamp": "2026-01-03T20:28:00Z",
"transaction_amount_usd": 2.81
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.448,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2219862.22,
"financial_exposure_usd": 3257121.9,
"recoverable_pct": 0.577
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106618",
"label": "fraudulent",
"label_confidence": 0.63,
"severity": "critical",
"timestamp": "2026-01-05T14:18:00Z",
"trace_id": "71e888af-0df6-66c1-1f9d-fbd88e5dae0a"
} | {
"account_age_days": 706,
"account_id": "ACCT-9DB2A4A5C930",
"baseline_risk_score": 0.096,
"kyc_tier": "tier_2",
"session_entropy": 0.348
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 93,
"timestamp": "2026-01-05T14:18:00Z",
"transaction_amount_usd": 902195
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_IMBA... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.517,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 7253566.51,
"financial_exposure_usd": 7313205.51,
"recoverable_pct": 0.998
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100695",
"label": "fraudulent",
"label_confidence": 0.935,
"severity": "low",
"timestamp": "2026-01-01T11:35:00Z",
"trace_id": "9aa20b9c-0630-b934-7ba7-1cb085c20673"
} | {
"account_age_days": 1958,
"account_id": "ACCT-552060ECAED5",
"baseline_risk_score": 0.259,
"kyc_tier": "tier_1",
"session_entropy": 0.703
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 100,
"timestamp": "2025-12-31T23:38:00Z",
"transaction_amount_usd": 4.22
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.6,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 293497.71,
"financial_exposure_usd": 407178.25,
"recoverable_pct": 0.44
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103434",
"label": "fraudulent",
"label_confidence": 0.928,
"severity": "high",
"timestamp": "2026-01-03T09:14:00Z",
"trace_id": "84047a23-ebba-c452-d58e-dbfa4134246c"
} | {
"account_age_days": 1237,
"account_id": "ACCT-910ABCDB6193",
"baseline_risk_score": 0.426,
"kyc_tier": "tier_2",
"session_entropy": 0.384
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 846,
"timestamp": "2026-01-03T09:14:00Z",
"transaction_amount_usd": 489742.51
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.68,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 3156812.05,
"financial_exposure_usd": 3766015.95,
"recoverable_pct": 0.637
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105580",
"label": "fraudulent",
"label_confidence": 0.881,
"severity": "high",
"timestamp": "2026-01-04T21:00:00Z",
"trace_id": "1d191d81-87a0-e2d5-60e4-0c7a67e27651"
} | {
"account_age_days": 185,
"account_id": "ACCT-5AABE38C4376",
"baseline_risk_score": 0.427,
"kyc_tier": "tier_1",
"session_entropy": 0.471
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 141,
"timestamp": "2026-01-04T17:56:00Z",
"transaction_amount_usd": 20.4
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.66,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3366296.52,
"financial_exposure_usd": 4841817.15,
"recoverable_pct": 0.588
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106219",
"label": "fraudulent",
"label_confidence": 0.716,
"severity": "medium",
"timestamp": "2026-01-05T07:39:00Z",
"trace_id": "8ab61644-6f0f-b2b8-f46a-f56724a62dda"
} | {
"account_age_days": 280,
"account_id": "ACCT-077F81C64187",
"baseline_risk_score": 0.448,
"kyc_tier": "tier_3",
"session_entropy": 0.779
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 139,
"timestamp": "2026-01-04T19:21:00Z",
"transaction_amount_usd": 9.5
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.583,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5271296.01,
"financial_exposure_usd": 5594312.58,
"recoverable_pct": 0.913
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104859",
"label": "fraudulent",
"label_confidence": 0.771,
"severity": "medium",
"timestamp": "2026-01-04T08:59:00Z",
"trace_id": "b5f9d637-6b33-c75f-b4f8-0538a2ff098c"
} | {
"account_age_days": 1579,
"account_id": "ACCT-1272B000E50C",
"baseline_risk_score": 0.335,
"kyc_tier": "tier_3",
"session_entropy": 0.606
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 219,
"timestamp": "2026-01-03T23:14:00Z",
"transaction_amount_usd": 10.26
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.583,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3756057.51,
"financial_exposure_usd": 7109374.62,
"recoverable_pct": 0.837
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102253",
"label": "fraudulent",
"label_confidence": 0.755,
"severity": "high",
"timestamp": "2026-01-02T13:33:00Z",
"trace_id": "05eab96d-c58b-7bde-808e-24cb4d8a77b7"
} | {
"account_age_days": 1860,
"account_id": "ACCT-43E838A0D11E",
"baseline_risk_score": 0.446,
"kyc_tier": "tier_3",
"session_entropy": 0.297
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 664,
"timestamp": "2026-01-02T13:33:00Z",
"transaction_amount_usd": 109249.5
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.354,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 397948.17,
"financial_exposure_usd": 632523.11,
"recoverable_pct": 0.841
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109335",
"label": "benign",
"label_confidence": 0.675,
"severity": "medium",
"timestamp": "2026-01-07T11:35:00Z",
"trace_id": "308a3d09-5dfb-5dbc-22fb-8a4b110d8038"
} | {
"account_age_days": 1668,
"account_id": "ACCT-84020ED9FCB3",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.15
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 286,
"timestamp": "2026-01-07T09:12:00Z",
"transaction_amount_usd": 2.61
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.54,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 1562.86,
"financial_exposure_usd": 2498.15,
"recoverable_pct": 0.974
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100955",
"label": "fraudulent",
"label_confidence": 0.769,
"severity": "medium",
"timestamp": "2026-01-01T15:55:00Z",
"trace_id": "9f34430c-e893-a587-6dba-ae09f3c16470"
} | {
"account_age_days": 1638,
"account_id": "ACCT-5BCC5A3CB5ED",
"baseline_risk_score": 0.282,
"kyc_tier": "tier_3",
"session_entropy": 0.617
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 309,
"timestamp": "2026-01-01T10:26:00Z",
"transaction_amount_usd": 0.73
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.887,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 677121.77,
"financial_exposure_usd": 912536.96,
"recoverable_pct": 0.137
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107251",
"label": "benign",
"label_confidence": 0.533,
"severity": "high",
"timestamp": "2026-01-06T00:51:00Z",
"trace_id": "d1639272-c794-f0ed-18fd-40f543582c41"
} | {
"account_age_days": 1522,
"account_id": "ACCT-2CDF9AA14AB4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.875
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 768,
"timestamp": "2026-01-06T00:51:00Z",
"transaction_amount_usd": 14483.35
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.654,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1455.37,
"financial_exposure_usd": 1632.19,
"recoverable_pct": 0.777
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105077",
"label": "fraudulent",
"label_confidence": 0.678,
"severity": "medium",
"timestamp": "2026-01-04T12:37:00Z",
"trace_id": "123c2fb9-47fd-e08b-7f1e-755d6ff2ffde"
} | {
"account_age_days": 1432,
"account_id": "ACCT-2747957B8E7A",
"baseline_risk_score": 0.421,
"kyc_tier": "tier_3",
"session_entropy": 0.572
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 1065,
"timestamp": "2026-01-04T12:37:00Z",
"transaction_amount_usd": 1936037.27
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.644,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2626980.58,
"financial_exposure_usd": 4495091.52,
"recoverable_pct": 0.457
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103826",
"label": "fraudulent",
"label_confidence": 0.656,
"severity": "critical",
"timestamp": "2026-01-03T15:46:00Z",
"trace_id": "17d033f0-ca26-bfae-f249-2b67d68e53e6"
} | {
"account_age_days": 130,
"account_id": "ACCT-A4E7B4875459",
"baseline_risk_score": 0.21,
"kyc_tier": "tier_3",
"session_entropy": 0.553
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 1007,
"timestamp": "2026-01-03T15:46:00Z",
"transaction_amount_usd": 2877891.69
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.72,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 5474103.11,
"financial_exposure_usd": 6832675.99,
"recoverable_pct": 0.733
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109351",
"label": "benign",
"label_confidence": 0.468,
"severity": "low",
"timestamp": "2026-01-07T11:51:00Z",
"trace_id": "572a01f0-95b9-c075-9701-e6478634581c"
} | {
"account_age_days": 779,
"account_id": "ACCT-1101BB776325",
"baseline_risk_score": 0.057,
"kyc_tier": "tier_3",
"session_entropy": 0.68
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 647,
"timestamp": "2026-01-07T11:51:00Z",
"transaction_amount_usd": 5412.01
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.696,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2728.57,
"financial_exposure_usd": 3903.55,
"recoverable_pct": 0.764
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104597",
"label": "fraudulent",
"label_confidence": 0.833,
"severity": "low",
"timestamp": "2026-01-04T04:37:00Z",
"trace_id": "07806566-ae1d-8ad8-9d7f-216a56f4f80c"
} | {
"account_age_days": 216,
"account_id": "ACCT-DBA3286B6B79",
"baseline_risk_score": 0.371,
"kyc_tier": "tier_3",
"session_entropy": 0.78
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 883,
"timestamp": "2026-01-04T04:37:00Z",
"transaction_amount_usd": 582369.92
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.738,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2476220.49,
"financial_exposure_usd": 3469632.92,
"recoverable_pct": 0.979
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105510",
"label": "fraudulent",
"label_confidence": 0.944,
"severity": "medium",
"timestamp": "2026-01-04T19:50:00Z",
"trace_id": "d3df05b3-6ea6-d872-4ef9-fd15a2632e4f"
} | {
"account_age_days": 319,
"account_id": "ACCT-E009CC0AF667",
"baseline_risk_score": 0.345,
"kyc_tier": "tier_2",
"session_entropy": 0.108
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 108,
"timestamp": "2026-01-04T09:58:00Z",
"transaction_amount_usd": 4.86
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.461,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 7141500.83,
"financial_exposure_usd": 7972947.26,
"recoverable_pct": 0.463
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109233",
"label": "benign",
"label_confidence": 0.73,
"severity": "high",
"timestamp": "2026-01-07T09:53:00Z",
"trace_id": "17c376b1-a94b-b81b-48c3-71117c32fa7c"
} | {
"account_age_days": 1960,
"account_id": "ACCT-A562E9617D7E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.537
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 734,
"timestamp": "2026-01-07T09:53:00Z",
"transaction_amount_usd": 3504.4
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.545,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1440.2,
"financial_exposure_usd": 1596.83,
"recoverable_pct": 0.409
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105945",
"label": "fraudulent",
"label_confidence": 0.705,
"severity": "high",
"timestamp": "2026-01-05T03:05:00Z",
"trace_id": "161a3071-2295-7b81-a9cd-a3472ac2bb64"
} | {
"account_age_days": 1975,
"account_id": "ACCT-5E8BA7BD76A8",
"baseline_risk_score": 0.194,
"kyc_tier": "tier_1",
"session_entropy": 0.73
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 1095,
"timestamp": "2026-01-05T03:05:00Z",
"transaction_amount_usd": 2973663.82
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.507,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2282942.16,
"financial_exposure_usd": 5057214.28,
"recoverable_pct": 0.657
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101448",
"label": "fraudulent",
"label_confidence": 0.823,
"severity": "low",
"timestamp": "2026-01-02T00:08:00Z",
"trace_id": "27d768d5-02a0-f945-c29b-8f5ecb790744"
} | {
"account_age_days": 809,
"account_id": "ACCT-3FA92126E091",
"baseline_risk_score": 0.288,
"kyc_tier": "tier_2",
"session_entropy": 0.446
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 98,
"timestamp": "2026-01-01T13:28:00Z",
"transaction_amount_usd": 23.23
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.82,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 457146.79,
"financial_exposure_usd": 1105315.66,
"recoverable_pct": 0.402
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109512",
"label": "benign",
"label_confidence": 0.702,
"severity": "medium",
"timestamp": "2026-01-07T14:32:00Z",
"trace_id": "c7d920b4-47f9-0632-7c2e-073bc774df1a"
} | {
"account_age_days": 294,
"account_id": "ACCT-8137A48AF777",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.208
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 158,
"timestamp": "2026-01-07T04:58:00Z",
"transaction_amount_usd": 4.39
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.772,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1203.82,
"financial_exposure_usd": 1256.42,
"recoverable_pct": 0.976
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105341",
"label": "fraudulent",
"label_confidence": 0.75,
"severity": "high",
"timestamp": "2026-01-04T17:01:00Z",
"trace_id": "06846783-0c6e-4431-7c58-f99e5f266907"
} | {
"account_age_days": 281,
"account_id": "ACCT-B77C67CFC33B",
"baseline_risk_score": 0.218,
"kyc_tier": "tier_2",
"session_entropy": 0.732
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 353,
"timestamp": "2026-01-04T11:39:00Z",
"transaction_amount_usd": 11.9
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.724,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5678483.97,
"financial_exposure_usd": 6245512.14,
"recoverable_pct": 0.887
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106042",
"label": "fraudulent",
"label_confidence": 0.874,
"severity": "high",
"timestamp": "2026-01-05T04:42:00Z",
"trace_id": "0ee2fa2d-ff29-2960-b1ad-fdb91dedea73"
} | {
"account_age_days": 1755,
"account_id": "ACCT-EF7F7D5873D8",
"baseline_risk_score": 0.362,
"kyc_tier": "tier_1",
"session_entropy": 0.789
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 361,
"timestamp": "2026-01-04T22:48:00Z",
"transaction_amount_usd": 5.78
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.467,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 9",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1385790.47,
"financial_exposure_usd": 1996956.04,
"recoverable_pct": 0.784
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106369",
"label": "fraudulent",
"label_confidence": 0.898,
"severity": "high",
"timestamp": "2026-01-05T10:09:00Z",
"trace_id": "b38f636f-8707-6c63-4929-cb0352c80a72"
} | {
"account_age_days": 1634,
"account_id": "ACCT-77BCB56509BA",
"baseline_risk_score": 0.152,
"kyc_tier": "tier_2",
"session_entropy": 0.725
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 1062,
"timestamp": "2026-01-05T10:09:00Z",
"transaction_amount_usd": 1384609.15
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.738,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2860546.56,
"financial_exposure_usd": 3621761.12,
"recoverable_pct": 0.61
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103796",
"label": "fraudulent",
"label_confidence": 0.765,
"severity": "low",
"timestamp": "2026-01-03T15:16:00Z",
"trace_id": "183da03e-223f-cd42-f9cb-837addf747b0"
} | {
"account_age_days": 408,
"account_id": "ACCT-5558C6CF5CBD",
"baseline_risk_score": 0.227,
"kyc_tier": "tier_3",
"session_entropy": 0.423
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 275,
"timestamp": "2026-01-03T15:16:00Z",
"transaction_amount_usd": 2077817.21
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.562,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4369148.6,
"financial_exposure_usd": 4772553.45,
"recoverable_pct": 0.891
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100856",
"label": "fraudulent",
"label_confidence": 0.914,
"severity": "high",
"timestamp": "2026-01-01T14:16:00Z",
"trace_id": "f0385ceb-ef4b-5a2c-782f-c7fe12472e5c"
} | {
"account_age_days": 144,
"account_id": "ACCT-EC380F2DF45A",
"baseline_risk_score": 0.324,
"kyc_tier": "tier_2",
"session_entropy": 0.362
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NL",
"latency_ms": 1115,
"timestamp": "2026-01-01T14:16:00Z",
"transaction_amount_usd": 81152.3
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.595,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 268680.36,
"financial_exposure_usd": 628673.27,
"recoverable_pct": 0.679
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.