schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104488",
"label": "fraudulent",
"label_confidence": 0.917,
"severity": "high",
"timestamp": "2026-01-04T02:48:00Z",
"trace_id": "ff435efd-06f9-382a-06de-7ad37a4a1c18"
} | {
"account_age_days": 1730,
"account_id": "ACCT-371137B237D2",
"baseline_risk_score": 0.358,
"kyc_tier": "tier_3",
"session_entropy": 0.554
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 808,
"timestamp": "2026-01-04T02:48:00Z",
"transaction_amount_usd": 206478.75
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.751,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1459254.56,
"financial_exposure_usd": 2311444.04,
"recoverable_pct": 0.561
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103370",
"label": "fraudulent",
"label_confidence": 0.656,
"severity": "low",
"timestamp": "2026-01-03T08:10:00Z",
"trace_id": "92b283f1-419b-78f3-cebd-006c82b468bc"
} | {
"account_age_days": 626,
"account_id": "ACCT-D6AFC4E513F4",
"baseline_risk_score": 0.161,
"kyc_tier": "tier_3",
"session_entropy": 0.743
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 432,
"timestamp": "2026-01-03T08:10:00Z",
"transaction_amount_usd": 1694530.97
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.724,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4062236.88,
"financial_exposure_usd": 4389271.04,
"recoverable_pct": 0.473
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104520",
"label": "fraudulent",
"label_confidence": 0.783,
"severity": "medium",
"timestamp": "2026-01-04T03:20:00Z",
"trace_id": "2250a3d8-2b19-9867-3576-da82a310a440"
} | {
"account_age_days": 868,
"account_id": "ACCT-0742D5BB1645",
"baseline_risk_score": 0.155,
"kyc_tier": "tier_2",
"session_entropy": 0.919
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 392,
"timestamp": "2026-01-03T18:57:00Z",
"transaction_amount_usd": 17.58
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.366,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2500885.07,
"financial_exposure_usd": 5596623.72,
"recoverable_pct": 0.413
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103121",
"label": "fraudulent",
"label_confidence": 0.878,
"severity": "low",
"timestamp": "2026-01-03T04:01:00Z",
"trace_id": "82f0e930-8531-c279-1890-a5073c1dd231"
} | {
"account_age_days": 341,
"account_id": "ACCT-278586B814B7",
"baseline_risk_score": 0.553,
"kyc_tier": "tier_2",
"session_entropy": 0.196
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 1166,
"timestamp": "2026-01-03T04:01:00Z",
"transaction_amount_usd": 37716.65
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.887,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 461263.28,
"financial_exposure_usd": 1152108.67,
"recoverable_pct": 0.063
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107424",
"label": "benign",
"label_confidence": 0.486,
"severity": "high",
"timestamp": "2026-01-06T03:44:00Z",
"trace_id": "3ef37f88-38f9-6115-7274-8e2235ed6fe3"
} | {
"account_age_days": 787,
"account_id": "ACCT-D2F2641AEF00",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.207
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 158,
"timestamp": "2026-01-06T03:44:00Z",
"transaction_amount_usd": 4079.1
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.604,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1151.99,
"financial_exposure_usd": 1934.31,
"recoverable_pct": 0.703
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106036",
"label": "fraudulent",
"label_confidence": 0.713,
"severity": "low",
"timestamp": "2026-01-05T04:36:00Z",
"trace_id": "efeb0743-d025-4157-0dd5-b9abd0eefeaf"
} | {
"account_age_days": 604,
"account_id": "ACCT-8D33CD1E288D",
"baseline_risk_score": 0.077,
"kyc_tier": "tier_1",
"session_entropy": 0.732
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 1170,
"timestamp": "2026-01-05T04:36:00Z",
"transaction_amount_usd": 2441203.15
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.656,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1561185.43,
"financial_exposure_usd": 1983823.34,
"recoverable_pct": 0.822
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107243",
"label": "benign",
"label_confidence": 0.648,
"severity": "critical",
"timestamp": "2026-01-06T00:43:00Z",
"trace_id": "b5f5f321-65ba-e77b-c865-4bb420f505a7"
} | {
"account_age_days": 66,
"account_id": "ACCT-98EE6A937F05",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.532
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 547,
"timestamp": "2026-01-06T00:43:00Z",
"transaction_amount_usd": 12017.69
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.477,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3166.8,
"financial_exposure_usd": 4725.01,
"recoverable_pct": 0.64
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103520",
"label": "fraudulent",
"label_confidence": 0.716,
"severity": "critical",
"timestamp": "2026-01-03T10:40:00Z",
"trace_id": "6554db00-8d45-f278-f3ae-acb1be9743e1"
} | {
"account_age_days": 1946,
"account_id": "ACCT-551D18AEE816",
"baseline_risk_score": 0.218,
"kyc_tier": "tier_1",
"session_entropy": 0.332
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 603,
"timestamp": "2026-01-03T10:40:00Z",
"transaction_amount_usd": 846769.54
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.81,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 1367067.48,
"financial_exposure_usd": 3315880.31,
"recoverable_pct": 0.829
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107733",
"label": "benign",
"label_confidence": 0.676,
"severity": "medium",
"timestamp": "2026-01-06T08:53:00Z",
"trace_id": "fdf0b97f-e650-d015-09db-89103570e79b"
} | {
"account_age_days": 644,
"account_id": "ACCT-0621278ADA48",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.877
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 310,
"timestamp": "2026-01-06T05:48:00Z",
"transaction_amount_usd": 15.24
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.555,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 500.12,
"financial_exposure_usd": 570.27,
"recoverable_pct": 0.928
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103012",
"label": "fraudulent",
"label_confidence": 0.948,
"severity": "high",
"timestamp": "2026-01-03T02:12:00Z",
"trace_id": "02cccd14-2bd2-c80e-6bf8-816e0cbb497f"
} | {
"account_age_days": 1695,
"account_id": "ACCT-9963F2DAC8DD",
"baseline_risk_score": 0.636,
"kyc_tier": "tier_3",
"session_entropy": 0.155
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 163,
"timestamp": "2026-01-02T17:56:00Z",
"transaction_amount_usd": 1.15
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.757,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 338067.99,
"financial_exposure_usd": 427487.89,
"recoverable_pct": 0.546
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102242",
"label": "fraudulent",
"label_confidence": 0.842,
"severity": "medium",
"timestamp": "2026-01-02T13:22:00Z",
"trace_id": "e7818a47-2f5f-3bc3-e658-67189b80d43e"
} | {
"account_age_days": 240,
"account_id": "ACCT-AA2F1B791D62",
"baseline_risk_score": 0.454,
"kyc_tier": "tier_3",
"session_entropy": 0.922
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 945,
"timestamp": "2026-01-02T13:22:00Z",
"transaction_amount_usd": 52113.27
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.716,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 139996.44,
"financial_exposure_usd": 305335.94,
"recoverable_pct": 0.741
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105977",
"label": "fraudulent",
"label_confidence": 0.878,
"severity": "medium",
"timestamp": "2026-01-05T03:37:00Z",
"trace_id": "66b2a679-bbb1-1340-faf9-a89f78cfc8de"
} | {
"account_age_days": 867,
"account_id": "ACCT-9BBCA2961D35",
"baseline_risk_score": 0.406,
"kyc_tier": "tier_3",
"session_entropy": 0.578
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 153,
"timestamp": "2026-01-05T01:26:00Z",
"transaction_amount_usd": 12.4
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.466,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3587723.88,
"financial_exposure_usd": 4558409.79,
"recoverable_pct": 0.972
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101464",
"label": "fraudulent",
"label_confidence": 0.917,
"severity": "medium",
"timestamp": "2026-01-02T00:24:00Z",
"trace_id": "c10f2046-2873-482e-9eca-3a6acefa22b5"
} | {
"account_age_days": 1596,
"account_id": "ACCT-B5A8C9173E68",
"baseline_risk_score": 0.348,
"kyc_tier": "tier_2",
"session_entropy": 0.728
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "MY",
"latency_ms": 878,
"timestamp": "2026-01-02T00:24:00Z",
"transaction_amount_usd": 76959.83
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.545,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 80135.37,
"financial_exposure_usd": 114100.11,
"recoverable_pct": 0.846
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106834",
"label": "benign",
"label_confidence": 0.639,
"severity": "low",
"timestamp": "2026-01-05T17:54:00Z",
"trace_id": "e9011525-45ad-fcf2-8529-6a92cc9e934d"
} | {
"account_age_days": 1486,
"account_id": "ACCT-650DA4808240",
"baseline_risk_score": 0.165,
"kyc_tier": "tier_3",
"session_entropy": 0.726
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 187,
"timestamp": "2026-01-05T05:36:00Z",
"transaction_amount_usd": 1.42
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.573,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1111.64,
"financial_exposure_usd": 1235.54,
"recoverable_pct": 0.911
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108221",
"label": "benign",
"label_confidence": 0.567,
"severity": "medium",
"timestamp": "2026-01-06T17:01:00Z",
"trace_id": "fc42a6bc-e768-9df5-a042-6a389f00c284"
} | {
"account_age_days": 431,
"account_id": "ACCT-7E7D59E49C84",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.838
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 470,
"timestamp": "2026-01-06T17:01:00Z",
"transaction_amount_usd": 9141.88
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.771,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 350.44,
"financial_exposure_usd": 853.28,
"recoverable_pct": 0.7
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105402",
"label": "fraudulent",
"label_confidence": 0.863,
"severity": "low",
"timestamp": "2026-01-04T18:02:00Z",
"trace_id": "dc2532e9-05a2-2ee7-9532-1892791dbe03"
} | {
"account_age_days": 290,
"account_id": "ACCT-DAB3C8629836",
"baseline_risk_score": 0.401,
"kyc_tier": "tier_1",
"session_entropy": 0.262
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 657,
"timestamp": "2026-01-04T18:02:00Z",
"transaction_amount_usd": 2307712.94
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.831,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 108069.67,
"financial_exposure_usd": 248285.92,
"recoverable_pct": 0.846
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102998",
"label": "fraudulent",
"label_confidence": 0.802,
"severity": "critical",
"timestamp": "2026-01-03T01:58:00Z",
"trace_id": "f2980bfe-5f06-ffa7-3c7c-c510dac81758"
} | {
"account_age_days": 1599,
"account_id": "ACCT-9092C843F25E",
"baseline_risk_score": 0.42,
"kyc_tier": "tier_2",
"session_entropy": 0.321
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 1150,
"timestamp": "2026-01-03T01:58:00Z",
"transaction_amount_usd": 30471.66
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.61,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 1082355.51,
"financial_exposure_usd": 1096530.56,
"recoverable_pct": 0.124
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102102",
"label": "fraudulent",
"label_confidence": 0.862,
"severity": "critical",
"timestamp": "2026-01-02T11:02:00Z",
"trace_id": "0f127957-f04b-2788-695f-9ec58c65bd5c"
} | {
"account_age_days": 1495,
"account_id": "ACCT-2DD7F155BD7C",
"baseline_risk_score": 0.481,
"kyc_tier": "tier_1",
"session_entropy": 0.857
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 246,
"timestamp": "2026-01-02T11:02:00Z",
"transaction_amount_usd": 37416.05
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.891,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 418600.47,
"financial_exposure_usd": 436634.56,
"recoverable_pct": 0.21
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107845",
"label": "benign",
"label_confidence": 0.571,
"severity": "high",
"timestamp": "2026-01-06T10:45:00Z",
"trace_id": "96e4543a-7dfc-ff69-8785-6ecdeb8b3ad2"
} | {
"account_age_days": 126,
"account_id": "ACCT-45F5739FB45A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.524
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 797,
"timestamp": "2026-01-06T10:45:00Z",
"transaction_amount_usd": 4626.49
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.793,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 6333.56,
"financial_exposure_usd": 6861.82,
"recoverable_pct": 0.648
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101117",
"label": "fraudulent",
"label_confidence": 0.833,
"severity": "medium",
"timestamp": "2026-01-01T18:37:00Z",
"trace_id": "7505bb0b-b415-4637-0a27-6c0f0afd5240"
} | {
"account_age_days": 252,
"account_id": "ACCT-68416979518E",
"baseline_risk_score": 0.479,
"kyc_tier": "tier_2",
"session_entropy": 0.612
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 801,
"timestamp": "2026-01-01T18:37:00Z",
"transaction_amount_usd": 4380.2
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.919,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 92119.95,
"financial_exposure_usd": 210829.28,
"recoverable_pct": 0.37
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102480",
"label": "fraudulent",
"label_confidence": 0.793,
"severity": "critical",
"timestamp": "2026-01-02T17:20:00Z",
"trace_id": "d41c5773-a747-a367-4770-6f59d5ca90c7"
} | {
"account_age_days": 282,
"account_id": "ACCT-B70F091895F6",
"baseline_risk_score": 0.418,
"kyc_tier": "tier_3",
"session_entropy": 0.207
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 351,
"timestamp": "2026-01-02T17:20:00Z",
"transaction_amount_usd": 100108.25
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.538,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 685954.17,
"financial_exposure_usd": 770806.57,
"recoverable_pct": 0.399
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103476",
"label": "fraudulent",
"label_confidence": 0.662,
"severity": "low",
"timestamp": "2026-01-03T09:56:00Z",
"trace_id": "1ef4fbd4-fb02-f8f3-c127-a848ecb12b66"
} | {
"account_age_days": 723,
"account_id": "ACCT-12A4D259CD58",
"baseline_risk_score": 0.218,
"kyc_tier": "tier_3",
"session_entropy": 0.727
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 398,
"timestamp": "2026-01-02T23:21:00Z",
"transaction_amount_usd": 22.55
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.446,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3785755.41,
"financial_exposure_usd": 4334727.75,
"recoverable_pct": 0.99
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100731",
"label": "fraudulent",
"label_confidence": 0.891,
"severity": "low",
"timestamp": "2026-01-01T12:11:00Z",
"trace_id": "f2861e66-7570-ea8f-853f-9c644083a88f"
} | {
"account_age_days": 526,
"account_id": "ACCT-5554E90E1F04",
"baseline_risk_score": 0.586,
"kyc_tier": "tier_1",
"session_entropy": 0.224
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 140,
"timestamp": "2026-01-01T01:53:00Z",
"transaction_amount_usd": 18.07
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.834,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 138049.67,
"financial_exposure_usd": 295983.74,
"recoverable_pct": 0.752
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108515",
"label": "benign",
"label_confidence": 0.548,
"severity": "medium",
"timestamp": "2026-01-06T21:55:00Z",
"trace_id": "2a89e4af-acf6-c2e8-9f85-48e9b84fc45c"
} | {
"account_age_days": 1375,
"account_id": "ACCT-E5C082D305F8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.907
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 1056,
"timestamp": "2026-01-06T21:55:00Z",
"transaction_amount_usd": 10743
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.632,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3894.18,
"financial_exposure_usd": 6989.4,
"recoverable_pct": 0.746
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106708",
"label": "benign",
"label_confidence": 0.481,
"severity": "low",
"timestamp": "2026-01-05T15:48:00Z",
"trace_id": "ff2e3450-5de9-70f4-8889-5ae0bca14c2b"
} | {
"account_age_days": 473,
"account_id": "ACCT-AE87801C3964",
"baseline_risk_score": 0.067,
"kyc_tier": "tier_2",
"session_entropy": 0.65
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 496,
"timestamp": "2026-01-05T15:48:00Z",
"transaction_amount_usd": 14215.54
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.545,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3040.7,
"financial_exposure_usd": 6295.38,
"recoverable_pct": 0.883
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107495",
"label": "benign",
"label_confidence": 0.636,
"severity": "low",
"timestamp": "2026-01-06T04:55:00Z",
"trace_id": "903a1b56-eb94-9073-64d7-3f53fb89e603"
} | {
"account_age_days": 1332,
"account_id": "ACCT-978CFDA80C87",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.198
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 1138,
"timestamp": "2026-01-06T04:55:00Z",
"transaction_amount_usd": 4588.83
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.578,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1837.46,
"financial_exposure_usd": 2722.32,
"recoverable_pct": 0.781
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100785",
"label": "fraudulent",
"label_confidence": 0.789,
"severity": "low",
"timestamp": "2026-01-01T13:05:00Z",
"trace_id": "4c875ea5-345d-dabb-13df-2ec137bd193f"
} | {
"account_age_days": 871,
"account_id": "ACCT-7BF6E09459D4",
"baseline_risk_score": 0.409,
"kyc_tier": "tier_2",
"session_entropy": 0.144
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 373,
"timestamp": "2026-01-01T01:25:00Z",
"transaction_amount_usd": 11
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.891,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 534041.57,
"financial_exposure_usd": 615737.12,
"recoverable_pct": 0.37
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106282",
"label": "fraudulent",
"label_confidence": 0.707,
"severity": "low",
"timestamp": "2026-01-05T08:42:00Z",
"trace_id": "3c9a7558-e1a2-779e-0d94-f24ef36eb9d8"
} | {
"account_age_days": 244,
"account_id": "ACCT-97D721C9F063",
"baseline_risk_score": 0.135,
"kyc_tier": "tier_1",
"session_entropy": 0.335
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 650,
"timestamp": "2026-01-05T08:42:00Z",
"transaction_amount_usd": 2060556.76
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.655,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2126260.96,
"financial_exposure_usd": 3201979.92,
"recoverable_pct": 0.809
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106378",
"label": "fraudulent",
"label_confidence": 0.826,
"severity": "medium",
"timestamp": "2026-01-05T10:18:00Z",
"trace_id": "9e197864-f9a2-105e-5798-d0c38c0189c6"
} | {
"account_age_days": 487,
"account_id": "ACCT-80F60DDC8FC1",
"baseline_risk_score": 0.27,
"kyc_tier": "tier_2",
"session_entropy": 0.751
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 1082,
"timestamp": "2026-01-05T10:18:00Z",
"transaction_amount_usd": 1904043.39
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.93,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 2631714.9,
"financial_exposure_usd": 5191881.24,
"recoverable_pct": 0.878
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109741",
"label": "benign",
"label_confidence": 0.587,
"severity": "high",
"timestamp": "2026-01-07T18:21:00Z",
"trace_id": "2f8ac881-7933-65ef-1e78-ba0964c93afc"
} | {
"account_age_days": 815,
"account_id": "ACCT-5DEEB7E8419B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.276
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 251,
"timestamp": "2026-01-07T18:21:00Z",
"transaction_amount_usd": 13679.77
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.654,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1737.91,
"financial_exposure_usd": 3614.79,
"recoverable_pct": 0.563
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108745",
"label": "benign",
"label_confidence": 0.453,
"severity": "low",
"timestamp": "2026-01-07T01:45:00Z",
"trace_id": "3fec37ba-53f2-68df-f7e7-dbe116ba949a"
} | {
"account_age_days": 1045,
"account_id": "ACCT-0CE3379FFAA4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.629
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 790,
"timestamp": "2026-01-07T01:45:00Z",
"transaction_amount_usd": 13962
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.761,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1454.89,
"financial_exposure_usd": 1490.68,
"recoverable_pct": 0.546
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100116",
"label": "fraudulent",
"label_confidence": 0.771,
"severity": "medium",
"timestamp": "2026-01-01T01:56:00Z",
"trace_id": "bc64c7e9-716e-c0b6-e3d9-de7faba23511"
} | {
"account_age_days": 1261,
"account_id": "ACCT-ADB94A816843",
"baseline_risk_score": 0.352,
"kyc_tier": "tier_2",
"session_entropy": 0.244
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "LU",
"latency_ms": 712,
"timestamp": "2026-01-01T01:56:00Z",
"transaction_amount_usd": 103981.45
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.366,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 576189.08,
"financial_exposure_usd": 995463.97,
"recoverable_pct": 0.084
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109672",
"label": "benign",
"label_confidence": 0.676,
"severity": "medium",
"timestamp": "2026-01-07T17:12:00Z",
"trace_id": "3382fb59-61e0-01c1-7f01-4da6d140102e"
} | {
"account_age_days": 1563,
"account_id": "ACCT-D7F474519BEA",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.205
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 875,
"timestamp": "2026-01-07T17:12:00Z",
"transaction_amount_usd": 6487.25
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.482,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2805.94,
"financial_exposure_usd": 6551.85,
"recoverable_pct": 0.446
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103418",
"label": "fraudulent",
"label_confidence": 0.767,
"severity": "critical",
"timestamp": "2026-01-03T08:58:00Z",
"trace_id": "c506f46b-ea10-a5d9-7e9d-732573098c60"
} | {
"account_age_days": 361,
"account_id": "ACCT-E806033FD70E",
"baseline_risk_score": 0.238,
"kyc_tier": "tier_2",
"session_entropy": 0.521
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 472,
"timestamp": "2026-01-03T08:58:00Z",
"transaction_amount_usd": 2812795.27
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.603,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5229874.52,
"financial_exposure_usd": 6141106.13,
"recoverable_pct": 0.659
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108267",
"label": "benign",
"label_confidence": 0.55,
"severity": "low",
"timestamp": "2026-01-06T17:47:00Z",
"trace_id": "c307eb95-9348-eb03-1a41-13d3f491912c"
} | {
"account_age_days": 355,
"account_id": "ACCT-25C5425FC914",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.662
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 93,
"timestamp": "2026-01-06T16:11:00Z",
"transaction_amount_usd": 21.57
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.765,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 8371.82,
"financial_exposure_usd": 9058.9,
"recoverable_pct": 0.871
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106545",
"label": "fraudulent",
"label_confidence": 0.902,
"severity": "high",
"timestamp": "2026-01-05T13:05:00Z",
"trace_id": "a743c858-5cc9-ebad-3a83-fa1b60f4b4af"
} | {
"account_age_days": 1259,
"account_id": "ACCT-35CBB500552E",
"baseline_risk_score": 0.369,
"kyc_tier": "tier_2",
"session_entropy": 0.346
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 681,
"timestamp": "2026-01-05T13:05:00Z",
"transaction_amount_usd": 387347.63
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.762,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 697496.54,
"financial_exposure_usd": 1233769.9,
"recoverable_pct": 0.557
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101825",
"label": "fraudulent",
"label_confidence": 0.903,
"severity": "medium",
"timestamp": "2026-01-02T06:25:00Z",
"trace_id": "eeaebbd1-d484-3dde-ba01-43e9af1e8bba"
} | {
"account_age_days": 724,
"account_id": "ACCT-F925C6AF463B",
"baseline_risk_score": 0.254,
"kyc_tier": "tier_1",
"session_entropy": 0.729
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CA",
"latency_ms": 1183,
"timestamp": "2026-01-02T06:25:00Z",
"transaction_amount_usd": 78566.61
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.759,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 583550.53,
"financial_exposure_usd": 1445335.55,
"recoverable_pct": 0.759
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102132",
"label": "fraudulent",
"label_confidence": 0.753,
"severity": "high",
"timestamp": "2026-01-02T11:32:00Z",
"trace_id": "c633066e-1f46-2ef8-803f-6ca2099f33ef"
} | {
"account_age_days": 641,
"account_id": "ACCT-DCA225A4050E",
"baseline_risk_score": 0.395,
"kyc_tier": "tier_3",
"session_entropy": 0.614
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "JP",
"latency_ms": 457,
"timestamp": "2026-01-02T11:32:00Z",
"transaction_amount_usd": 53807.7
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.914,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 1083753.63,
"financial_exposure_usd": 1126338.88,
"recoverable_pct": 0.633
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109810",
"label": "benign",
"label_confidence": 0.607,
"severity": "low",
"timestamp": "2026-01-07T19:30:00Z",
"trace_id": "7461a45c-e16d-e4a6-d925-95b1e344fc7e"
} | {
"account_age_days": 1211,
"account_id": "ACCT-C42D4D787A63",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.235
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 932,
"timestamp": "2026-01-07T19:30:00Z",
"transaction_amount_usd": 414.74
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.632,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2401.78,
"financial_exposure_usd": 3361.52,
"recoverable_pct": 0.907
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105792",
"label": "fraudulent",
"label_confidence": 0.887,
"severity": "medium",
"timestamp": "2026-01-05T00:32:00Z",
"trace_id": "99912a47-0d4c-a4b3-93f5-ed65d99c4901"
} | {
"account_age_days": 1713,
"account_id": "ACCT-24B817FE08E8",
"baseline_risk_score": 0.254,
"kyc_tier": "tier_3",
"session_entropy": 0.359
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 181,
"timestamp": "2026-01-05T00:32:00Z",
"transaction_amount_usd": 216337.46
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.869,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1793191.2,
"financial_exposure_usd": 4089760.27,
"recoverable_pct": 0.866
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106956",
"label": "benign",
"label_confidence": 0.617,
"severity": "low",
"timestamp": "2026-01-05T19:56:00Z",
"trace_id": "17d23b40-925c-ab1d-c951-196cd160140c"
} | {
"account_age_days": 871,
"account_id": "ACCT-CFF37636AD0A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.256
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 489,
"timestamp": "2026-01-05T19:56:00Z",
"transaction_amount_usd": 7604.79
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.674,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3971.13,
"financial_exposure_usd": 6178.1,
"recoverable_pct": 0.637
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104677",
"label": "fraudulent",
"label_confidence": 0.819,
"severity": "low",
"timestamp": "2026-01-04T05:57:00Z",
"trace_id": "bc1d88d2-841c-86f0-f649-5f2a6e51700c"
} | {
"account_age_days": 1817,
"account_id": "ACCT-B5EF5E72E9FD",
"baseline_risk_score": 0.116,
"kyc_tier": "tier_2",
"session_entropy": 0.5
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 270,
"timestamp": "2026-01-04T03:17:00Z",
"transaction_amount_usd": 2.34
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.713,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3431190.99,
"financial_exposure_usd": 6646643.9,
"recoverable_pct": 0.471
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109169",
"label": "benign",
"label_confidence": 0.678,
"severity": "medium",
"timestamp": "2026-01-07T08:49:00Z",
"trace_id": "814c36de-4824-823c-170c-d538c2061f61"
} | {
"account_age_days": 832,
"account_id": "ACCT-6290A25B4196",
"baseline_risk_score": 0.063,
"kyc_tier": "tier_2",
"session_entropy": 0.774
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 162,
"timestamp": "2026-01-07T07:16:00Z",
"transaction_amount_usd": 23.48
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.52,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 668.79,
"financial_exposure_usd": 1035.75,
"recoverable_pct": 0.817
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109382",
"label": "benign",
"label_confidence": 0.732,
"severity": "high",
"timestamp": "2026-01-07T12:22:00Z",
"trace_id": "577cabe4-45c8-c8d2-304e-ae2dbdbf6762"
} | {
"account_age_days": 1471,
"account_id": "ACCT-F1E80EFC4916",
"baseline_risk_score": 0.124,
"kyc_tier": "tier_2",
"session_entropy": 0.18
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 950,
"timestamp": "2026-01-07T12:22:00Z",
"transaction_amount_usd": 13574.3
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.483,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 919.56,
"financial_exposure_usd": 1078.64,
"recoverable_pct": 0.411
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109436",
"label": "benign",
"label_confidence": 0.626,
"severity": "high",
"timestamp": "2026-01-07T13:16:00Z",
"trace_id": "94790bb4-8f79-0438-9162-7f9a37f0604f"
} | {
"account_age_days": 1676,
"account_id": "ACCT-0C47BA9F28AB",
"baseline_risk_score": 0.057,
"kyc_tier": "tier_1",
"session_entropy": 0.164
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 191,
"timestamp": "2026-01-07T02:13:00Z",
"transaction_amount_usd": 23.27
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.759,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3575.79,
"financial_exposure_usd": 3715,
"recoverable_pct": 0.451
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102668",
"label": "fraudulent",
"label_confidence": 0.91,
"severity": "critical",
"timestamp": "2026-01-02T20:28:00Z",
"trace_id": "f520f202-f0b5-3fa5-716c-4c26ac27880d"
} | {
"account_age_days": 366,
"account_id": "ACCT-877B68111EB7",
"baseline_risk_score": 0.377,
"kyc_tier": "tier_3",
"session_entropy": 0.179
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 732,
"timestamp": "2026-01-02T20:28:00Z",
"transaction_amount_usd": 98225.6
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.498,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 497341.09,
"financial_exposure_usd": 906364.27,
"recoverable_pct": 0.112
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103910",
"label": "fraudulent",
"label_confidence": 0.841,
"severity": "critical",
"timestamp": "2026-01-03T17:10:00Z",
"trace_id": "6a76e862-1cba-6c7d-e3a2-bb53c06924fd"
} | {
"account_age_days": 1090,
"account_id": "ACCT-F99433176B6C",
"baseline_risk_score": 0.214,
"kyc_tier": "tier_3",
"session_entropy": 0.764
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 922,
"timestamp": "2026-01-03T17:10:00Z",
"transaction_amount_usd": 2080527.49
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.656,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5572842.91,
"financial_exposure_usd": 5776995.31,
"recoverable_pct": 0.953
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108506",
"label": "benign",
"label_confidence": 0.601,
"severity": "low",
"timestamp": "2026-01-06T21:46:00Z",
"trace_id": "3ba8148a-77d9-2611-d0d2-36bd05162cda"
} | {
"account_age_days": 557,
"account_id": "ACCT-77A3A87A2296",
"baseline_risk_score": 0.077,
"kyc_tier": "tier_3",
"session_entropy": 0.37
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 112,
"timestamp": "2026-01-06T21:46:00Z",
"transaction_amount_usd": 13521.46
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.674,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 766.26,
"financial_exposure_usd": 1290.8,
"recoverable_pct": 0.551
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106398",
"label": "fraudulent",
"label_confidence": 0.897,
"severity": "high",
"timestamp": "2026-01-05T10:38:00Z",
"trace_id": "ebce32e9-cf33-7739-804a-c3472808b28b"
} | {
"account_age_days": 1349,
"account_id": "ACCT-76FC1BF127CD",
"baseline_risk_score": 0.1,
"kyc_tier": "tier_3",
"session_entropy": 0.23
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 337,
"timestamp": "2026-01-05T10:38:00Z",
"transaction_amount_usd": 367151.7
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.676,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1823441.78,
"financial_exposure_usd": 4004739.29,
"recoverable_pct": 0.75
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107490",
"label": "benign",
"label_confidence": 0.737,
"severity": "medium",
"timestamp": "2026-01-06T04:50:00Z",
"trace_id": "f876bbe3-5660-295e-476d-a27bb7e069f3"
} | {
"account_age_days": 1921,
"account_id": "ACCT-3BA03A428951",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.581
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 996,
"timestamp": "2026-01-06T04:50:00Z",
"transaction_amount_usd": 6998.32
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.471,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3055.78,
"financial_exposure_usd": 7085.16,
"recoverable_pct": 0.619
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106382",
"label": "fraudulent",
"label_confidence": 0.936,
"severity": "medium",
"timestamp": "2026-01-05T10:22:00Z",
"trace_id": "25e0da30-9988-feb6-2638-e760ce8025df"
} | {
"account_age_days": 706,
"account_id": "ACCT-419147A426FB",
"baseline_risk_score": 0.184,
"kyc_tier": "tier_3",
"session_entropy": 0.248
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 399,
"timestamp": "2026-01-05T10:22:00Z",
"transaction_amount_usd": 1082765.12
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.839,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 176142.55,
"financial_exposure_usd": 281146.89,
"recoverable_pct": 0.547
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107137",
"label": "benign",
"label_confidence": 0.581,
"severity": "low",
"timestamp": "2026-01-05T22:57:00Z",
"trace_id": "9ba2c2e6-2ba6-4547-e517-404560bb52cf"
} | {
"account_age_days": 1573,
"account_id": "ACCT-94191ECF3539",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.623
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 85,
"timestamp": "2026-01-05T12:36:00Z",
"transaction_amount_usd": 8.1
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.777,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1258.5,
"financial_exposure_usd": 1560.17,
"recoverable_pct": 0.437
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100534",
"label": "fraudulent",
"label_confidence": 0.771,
"severity": "medium",
"timestamp": "2026-01-01T08:54:00Z",
"trace_id": "0e9aa279-c69a-bf22-a39b-386436baeaa4"
} | {
"account_age_days": 1685,
"account_id": "ACCT-349BF73A27A3",
"baseline_risk_score": 0.305,
"kyc_tier": "tier_2",
"session_entropy": 0.205
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 1104,
"timestamp": "2026-01-01T08:54:00Z",
"transaction_amount_usd": 27695.77
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.416,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 372992.93,
"financial_exposure_usd": 796779.62,
"recoverable_pct": 0.711
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101387",
"label": "fraudulent",
"label_confidence": 0.867,
"severity": "medium",
"timestamp": "2026-01-01T23:07:00Z",
"trace_id": "6bdf1279-9f7f-6bbe-8b2e-9e0ff227926e"
} | {
"account_age_days": 698,
"account_id": "ACCT-C8550495BD22",
"baseline_risk_score": 0.617,
"kyc_tier": "tier_2",
"session_entropy": 0.632
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 344,
"timestamp": "2026-01-01T11:03:00Z",
"transaction_amount_usd": 14.03
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.683,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 512988.29,
"financial_exposure_usd": 597360.02,
"recoverable_pct": 0.487
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107967",
"label": "benign",
"label_confidence": 0.683,
"severity": "low",
"timestamp": "2026-01-06T12:47:00Z",
"trace_id": "923580e5-f4e6-55b5-3dec-b0579129f18f"
} | {
"account_age_days": 1986,
"account_id": "ACCT-DE513A09A4DA",
"baseline_risk_score": 0.115,
"kyc_tier": "tier_2",
"session_entropy": 0.345
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 146,
"timestamp": "2026-01-06T12:47:00Z",
"transaction_amount_usd": 6565.89
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.662,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1381.43,
"financial_exposure_usd": 1945.41,
"recoverable_pct": 0.968
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103897",
"label": "fraudulent",
"label_confidence": 0.714,
"severity": "high",
"timestamp": "2026-01-03T16:57:00Z",
"trace_id": "e694ebe3-a2ba-163c-5ed4-2fe25d14c690"
} | {
"account_age_days": 1239,
"account_id": "ACCT-E1127777E6CB",
"baseline_risk_score": 0.273,
"kyc_tier": "tier_1",
"session_entropy": 0.707
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 206,
"timestamp": "2026-01-03T16:57:00Z",
"transaction_amount_usd": 2645262.16
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.448,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2911474.82,
"financial_exposure_usd": 3114972.04,
"recoverable_pct": 0.774
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108070",
"label": "benign",
"label_confidence": 0.547,
"severity": "high",
"timestamp": "2026-01-06T14:30:00Z",
"trace_id": "6a320d14-fa8b-2e62-4a4c-e6253324026f"
} | {
"account_age_days": 201,
"account_id": "ACCT-12584080AA2B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.879
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 388,
"timestamp": "2026-01-06T14:30:00Z",
"transaction_amount_usd": 4148.77
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.649,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1772.74,
"financial_exposure_usd": 2619.71,
"recoverable_pct": 0.797
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103010",
"label": "fraudulent",
"label_confidence": 0.839,
"severity": "critical",
"timestamp": "2026-01-03T02:10:00Z",
"trace_id": "7dfc4eaf-194a-95ee-9ab9-034583bb61e9"
} | {
"account_age_days": 530,
"account_id": "ACCT-0392341AE4B2",
"baseline_risk_score": 0.487,
"kyc_tier": "tier_3",
"session_entropy": 0.549
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "LU",
"latency_ms": 800,
"timestamp": "2026-01-03T02:10:00Z",
"transaction_amount_usd": 7773.99
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.542,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 670319.19,
"financial_exposure_usd": 891801.09,
"recoverable_pct": 0.403
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103123",
"label": "fraudulent",
"label_confidence": 0.968,
"severity": "high",
"timestamp": "2026-01-03T04:03:00Z",
"trace_id": "95585fed-0e5e-5a05-eb9d-6f6b6f3aa137"
} | {
"account_age_days": 678,
"account_id": "ACCT-A2B11851E3E4",
"baseline_risk_score": 0.297,
"kyc_tier": "tier_1",
"session_entropy": 0.934
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "LU",
"latency_ms": 340,
"timestamp": "2026-01-03T04:03:00Z",
"transaction_amount_usd": 92031.08
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.453,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 719209.45,
"financial_exposure_usd": 842376.86,
"recoverable_pct": 0.658
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106543",
"label": "fraudulent",
"label_confidence": 0.86,
"severity": "medium",
"timestamp": "2026-01-05T13:03:00Z",
"trace_id": "1017d9b1-b0b8-b57e-f671-e8b074bec226"
} | {
"account_age_days": 364,
"account_id": "ACCT-002DE78DFAE1",
"baseline_risk_score": 0.407,
"kyc_tier": "tier_2",
"session_entropy": 0.655
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 699,
"timestamp": "2026-01-05T13:03:00Z",
"transaction_amount_usd": 2008434.3
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.595,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1519515.56,
"financial_exposure_usd": 3559140.8,
"recoverable_pct": 0.889
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108541",
"label": "benign",
"label_confidence": 0.557,
"severity": "medium",
"timestamp": "2026-01-06T22:21:00Z",
"trace_id": "4d82e2ad-fdff-fbaf-de64-c0fc48b3288c"
} | {
"account_age_days": 703,
"account_id": "ACCT-3ADB97D74F2D",
"baseline_risk_score": 0.157,
"kyc_tier": "tier_1",
"session_entropy": 0.21
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 283,
"timestamp": "2026-01-06T20:19:00Z",
"transaction_amount_usd": 6.25
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.647,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3383.64,
"financial_exposure_usd": 7216.74,
"recoverable_pct": 0.976
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109668",
"label": "benign",
"label_confidence": 0.63,
"severity": "low",
"timestamp": "2026-01-07T17:08:00Z",
"trace_id": "6673a9da-4720-262f-e6a1-57b7669b26e0"
} | {
"account_age_days": 445,
"account_id": "ACCT-6F88F5136D45",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.227
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 185,
"timestamp": "2026-01-07T08:48:00Z",
"transaction_amount_usd": 7.98
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.663,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1031.01,
"financial_exposure_usd": 1406.88,
"recoverable_pct": 0.685
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105896",
"label": "fraudulent",
"label_confidence": 0.714,
"severity": "medium",
"timestamp": "2026-01-05T02:16:00Z",
"trace_id": "6cb39cd4-8d2f-6571-3062-8221d89cbac5"
} | {
"account_age_days": 503,
"account_id": "ACCT-4B149FD1F825",
"baseline_risk_score": 0.13,
"kyc_tier": "tier_3",
"session_entropy": 0.927
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 148,
"timestamp": "2026-01-05T02:16:00Z",
"transaction_amount_usd": 965147.1
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.383,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3252617.09,
"financial_exposure_usd": 4804202.17,
"recoverable_pct": 0.667
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109795",
"label": "benign",
"label_confidence": 0.539,
"severity": "medium",
"timestamp": "2026-01-07T19:15:00Z",
"trace_id": "d2d29287-d512-4eac-52cd-73d55f61b66b"
} | {
"account_age_days": 1946,
"account_id": "ACCT-A8A0829D3B5C",
"baseline_risk_score": 0.1,
"kyc_tier": "tier_1",
"session_entropy": 0.568
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 293,
"timestamp": "2026-01-07T17:17:00Z",
"transaction_amount_usd": 5.23
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.521,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 776.06,
"financial_exposure_usd": 783.24,
"recoverable_pct": 0.546
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109879",
"label": "benign",
"label_confidence": 0.517,
"severity": "medium",
"timestamp": "2026-01-07T20:39:00Z",
"trace_id": "b33df0d6-cd81-4420-d3c9-0884a5e3bd79"
} | {
"account_age_days": 1743,
"account_id": "ACCT-0C882E3F7AD3",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.465
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 1002,
"timestamp": "2026-01-07T20:39:00Z",
"transaction_amount_usd": 6163.72
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.479,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2338.89,
"financial_exposure_usd": 3374.13,
"recoverable_pct": 0.52
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107491",
"label": "benign",
"label_confidence": 0.666,
"severity": "medium",
"timestamp": "2026-01-06T04:51:00Z",
"trace_id": "83c751b7-37b9-78bb-e786-687e3a0c5ebd"
} | {
"account_age_days": 1581,
"account_id": "ACCT-6EF7001E7442",
"baseline_risk_score": 0.163,
"kyc_tier": "tier_2",
"session_entropy": 0.76
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 255,
"timestamp": "2026-01-06T00:34:00Z",
"transaction_amount_usd": 17.88
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.724,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 260.69,
"financial_exposure_usd": 295.97,
"recoverable_pct": 0.709
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100938",
"label": "fraudulent",
"label_confidence": 0.793,
"severity": "high",
"timestamp": "2026-01-01T15:38:00Z",
"trace_id": "ea093048-f80f-749b-2e4e-ee1fa534092e"
} | {
"account_age_days": 869,
"account_id": "ACCT-368453529461",
"baseline_risk_score": 0.408,
"kyc_tier": "tier_2",
"session_entropy": 0.118
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 1050,
"timestamp": "2026-01-01T15:38:00Z",
"transaction_amount_usd": 29052.43
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.897,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 698713.13,
"financial_exposure_usd": 1192466.28,
"recoverable_pct": 0.106
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104346",
"label": "fraudulent",
"label_confidence": 0.76,
"severity": "high",
"timestamp": "2026-01-04T00:26:00Z",
"trace_id": "9b49d4fe-ef3a-896c-06a7-b31e89deb054"
} | {
"account_age_days": 1381,
"account_id": "ACCT-93ED24F82F8C",
"baseline_risk_score": 0.117,
"kyc_tier": "tier_3",
"session_entropy": 0.778
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 135,
"timestamp": "2026-01-03T14:21:00Z",
"transaction_amount_usd": 18.27
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.572,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2518354.4,
"financial_exposure_usd": 5215832.33,
"recoverable_pct": 0.523
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108508",
"label": "benign",
"label_confidence": 0.728,
"severity": "medium",
"timestamp": "2026-01-06T21:48:00Z",
"trace_id": "a7dce7d4-989e-9e63-654a-b361679bc1ce"
} | {
"account_age_days": 1375,
"account_id": "ACCT-4F01FD03B41B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.135
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 725,
"timestamp": "2026-01-06T21:48:00Z",
"transaction_amount_usd": 249.95
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.722,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1340.74,
"financial_exposure_usd": 3308.01,
"recoverable_pct": 0.892
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100410",
"label": "fraudulent",
"label_confidence": 0.857,
"severity": "critical",
"timestamp": "2026-01-01T06:50:00Z",
"trace_id": "d79b37a1-b6cc-ece5-7a0e-1bfe16ba1b69"
} | {
"account_age_days": 613,
"account_id": "ACCT-71F57DEF98C6",
"baseline_risk_score": 0.442,
"kyc_tier": "tier_1",
"session_entropy": 0.398
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 811,
"timestamp": "2026-01-01T06:50:00Z",
"transaction_amount_usd": 26770.98
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.54,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 721306.33,
"financial_exposure_usd": 838807.84,
"recoverable_pct": 0.554
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108118",
"label": "benign",
"label_confidence": 0.575,
"severity": "low",
"timestamp": "2026-01-06T15:18:00Z",
"trace_id": "9ba987a3-6ee7-ff07-f421-ec62f52c7dc6"
} | {
"account_age_days": 1657,
"account_id": "ACCT-2192CEA6C993",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.686
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 264,
"timestamp": "2026-01-06T06:17:00Z",
"transaction_amount_usd": 0.02
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.68,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 2700.92,
"financial_exposure_usd": 3083.22,
"recoverable_pct": 0.714
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105650",
"label": "fraudulent",
"label_confidence": 0.899,
"severity": "medium",
"timestamp": "2026-01-04T22:10:00Z",
"trace_id": "8f764fbc-b11f-d66d-8689-d9c257e9c0c4"
} | {
"account_age_days": 1879,
"account_id": "ACCT-5CDE2C9336F8",
"baseline_risk_score": 0.115,
"kyc_tier": "tier_3",
"session_entropy": 0.416
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 1138,
"timestamp": "2026-01-04T22:10:00Z",
"transaction_amount_usd": 932014.12
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.809,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1104869.96,
"financial_exposure_usd": 1648239.49,
"recoverable_pct": 0.927
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105139",
"label": "fraudulent",
"label_confidence": 0.943,
"severity": "critical",
"timestamp": "2026-01-04T13:39:00Z",
"trace_id": "5d26d253-3558-57f5-c861-8f1c16cd4e58"
} | {
"account_age_days": 1195,
"account_id": "ACCT-AA335C02D347",
"baseline_risk_score": 0.26,
"kyc_tier": "tier_2",
"session_entropy": 0.57
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 798,
"timestamp": "2026-01-04T13:39:00Z",
"transaction_amount_usd": 2092733.33
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.783,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 5504218.07,
"financial_exposure_usd": 6581719.47,
"recoverable_pct": 0.714
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103543",
"label": "fraudulent",
"label_confidence": 0.707,
"severity": "critical",
"timestamp": "2026-01-03T11:03:00Z",
"trace_id": "ca8fe283-c460-7adf-2241-826c9435b34d"
} | {
"account_age_days": 1417,
"account_id": "ACCT-B6FAFB5796D1",
"baseline_risk_score": 0.396,
"kyc_tier": "tier_2",
"session_entropy": 0.53
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 246,
"timestamp": "2026-01-03T11:03:00Z",
"transaction_amount_usd": 2076774.68
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.654,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2792856.74,
"financial_exposure_usd": 4943905.16,
"recoverable_pct": 0.403
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104531",
"label": "fraudulent",
"label_confidence": 0.723,
"severity": "critical",
"timestamp": "2026-01-04T03:31:00Z",
"trace_id": "8c9c47f0-8755-fd47-3c7f-61d91e05063b"
} | {
"account_age_days": 363,
"account_id": "ACCT-57D0DD73E560",
"baseline_risk_score": 0.099,
"kyc_tier": "tier_1",
"session_entropy": 0.12
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 392,
"timestamp": "2026-01-03T16:29:00Z",
"transaction_amount_usd": 2.66
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.888,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3782801.17,
"financial_exposure_usd": 4578293.71,
"recoverable_pct": 0.909
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102688",
"label": "fraudulent",
"label_confidence": 0.879,
"severity": "critical",
"timestamp": "2026-01-02T20:48:00Z",
"trace_id": "2c30c9ac-2cd5-f177-5496-43eb87a6973a"
} | {
"account_age_days": 822,
"account_id": "ACCT-C354948C916D",
"baseline_risk_score": 0.598,
"kyc_tier": "tier_1",
"session_entropy": 0.841
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 149,
"timestamp": "2026-01-02T20:48:00Z",
"transaction_amount_usd": 81986.83
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.458,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 1288761.11,
"financial_exposure_usd": 1446744.75,
"recoverable_pct": 0.014
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109446",
"label": "benign",
"label_confidence": 0.617,
"severity": "medium",
"timestamp": "2026-01-07T13:26:00Z",
"trace_id": "6af7dccd-3944-60d8-96f5-dd0ddbc03ce5"
} | {
"account_age_days": 547,
"account_id": "ACCT-8D6359083279",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.182
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 929,
"timestamp": "2026-01-07T13:26:00Z",
"transaction_amount_usd": 1894.08
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.749,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 4313.5,
"financial_exposure_usd": 5409.88,
"recoverable_pct": 0.863
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104655",
"label": "fraudulent",
"label_confidence": 0.715,
"severity": "medium",
"timestamp": "2026-01-04T05:35:00Z",
"trace_id": "493242f0-ce76-6af5-0d1c-25dae76d8e1b"
} | {
"account_age_days": 946,
"account_id": "ACCT-AE8BE82B58EB",
"baseline_risk_score": 0.284,
"kyc_tier": "tier_1",
"session_entropy": 0.569
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 1141,
"timestamp": "2026-01-04T05:35:00Z",
"transaction_amount_usd": 1299517.83
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.947,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2591898.49,
"financial_exposure_usd": 4142257.54,
"recoverable_pct": 0.526
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105234",
"label": "fraudulent",
"label_confidence": 0.625,
"severity": "medium",
"timestamp": "2026-01-04T15:14:00Z",
"trace_id": "c9befabb-4f4e-bb2a-7b72-f1fb8eb1caef"
} | {
"account_age_days": 1571,
"account_id": "ACCT-D62F9F2F5F71",
"baseline_risk_score": 0.337,
"kyc_tier": "tier_3",
"session_entropy": 0.417
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 1109,
"timestamp": "2026-01-04T15:14:00Z",
"transaction_amount_usd": 1402846.54
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_B... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.506,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 5324979.89,
"financial_exposure_usd": 7326288.58,
"recoverable_pct": 0.414
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109641",
"label": "benign",
"label_confidence": 0.513,
"severity": "medium",
"timestamp": "2026-01-07T16:41:00Z",
"trace_id": "22097742-a3df-6fbe-9a3a-ac154fb0adcb"
} | {
"account_age_days": 133,
"account_id": "ACCT-B72F2C57465B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.348
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 651,
"timestamp": "2026-01-07T16:41:00Z",
"transaction_amount_usd": 13449.32
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.507,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 3",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 836.14,
"financial_exposure_usd": 1671.49,
"recoverable_pct": 0.851
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107541",
"label": "benign",
"label_confidence": 0.667,
"severity": "medium",
"timestamp": "2026-01-06T05:41:00Z",
"trace_id": "9372c37d-201a-d8d1-636e-fe9cb37bcc8d"
} | {
"account_age_days": 215,
"account_id": "ACCT-B4C5AF3F367B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.548
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 146,
"timestamp": "2026-01-06T04:59:00Z",
"transaction_amount_usd": 22.32
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.555,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3169.02,
"financial_exposure_usd": 3242.99,
"recoverable_pct": 0.874
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102151",
"label": "fraudulent",
"label_confidence": 0.918,
"severity": "critical",
"timestamp": "2026-01-02T11:51:00Z",
"trace_id": "14d4311f-40f2-b1af-cfc2-6f5e2d6f0a8a"
} | {
"account_age_days": 1164,
"account_id": "ACCT-E196B7D9C4A4",
"baseline_risk_score": 0.489,
"kyc_tier": "tier_3",
"session_entropy": 0.814
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 673,
"timestamp": "2026-01-02T11:51:00Z",
"transaction_amount_usd": 7737.52
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.515,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 582569.46,
"financial_exposure_usd": 1295214.96,
"recoverable_pct": 0.658
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104754",
"label": "fraudulent",
"label_confidence": 0.645,
"severity": "high",
"timestamp": "2026-01-04T07:14:00Z",
"trace_id": "1dd890f8-1965-2dd7-429b-1162a31071ba"
} | {
"account_age_days": 831,
"account_id": "ACCT-81B69C456C6E",
"baseline_risk_score": 0.366,
"kyc_tier": "tier_2",
"session_entropy": 0.733
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 263,
"timestamp": "2026-01-04T03:37:00Z",
"transaction_amount_usd": 0.55
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.566,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 9",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 686464.78,
"financial_exposure_usd": 887945.2,
"recoverable_pct": 0.607
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103953",
"label": "fraudulent",
"label_confidence": 0.942,
"severity": "medium",
"timestamp": "2026-01-03T17:53:00Z",
"trace_id": "05316cf6-5fd9-27a1-3c9d-694dd8c36e60"
} | {
"account_age_days": 1133,
"account_id": "ACCT-0C50869A239E",
"baseline_risk_score": 0.117,
"kyc_tier": "tier_1",
"session_entropy": 0.833
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 202,
"timestamp": "2026-01-03T17:53:00Z",
"transaction_amount_usd": 2096967.89
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.689,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2414526.04,
"financial_exposure_usd": 3623922.28,
"recoverable_pct": 0.525
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109078",
"label": "benign",
"label_confidence": 0.615,
"severity": "medium",
"timestamp": "2026-01-07T07:18:00Z",
"trace_id": "380c05ca-5b4a-04e9-073d-c7743a53fea6"
} | {
"account_age_days": 39,
"account_id": "ACCT-BA066C7086CB",
"baseline_risk_score": 0.093,
"kyc_tier": "tier_1",
"session_entropy": 0.629
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 263,
"timestamp": "2026-01-06T21:57:00Z",
"transaction_amount_usd": 21.05
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.64,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1367.27,
"financial_exposure_usd": 1808.95,
"recoverable_pct": 0.489
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107326",
"label": "benign",
"label_confidence": 0.461,
"severity": "medium",
"timestamp": "2026-01-06T02:06:00Z",
"trace_id": "e36c57c7-849d-b428-5c85-ed0e717e3363"
} | {
"account_age_days": 1339,
"account_id": "ACCT-C8B3E64C1DFA",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.255
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 304,
"timestamp": "2026-01-05T18:33:00Z",
"transaction_amount_usd": 7.39
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.572,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1865.24,
"financial_exposure_usd": 2045.2,
"recoverable_pct": 0.622
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104760",
"label": "fraudulent",
"label_confidence": 0.812,
"severity": "critical",
"timestamp": "2026-01-04T07:20:00Z",
"trace_id": "bc9c5af0-ab8a-e218-bae4-0cb058595e20"
} | {
"account_age_days": 375,
"account_id": "ACCT-177A1C06797F",
"baseline_risk_score": 0.184,
"kyc_tier": "tier_2",
"session_entropy": 0.204
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 724,
"timestamp": "2026-01-04T07:20:00Z",
"transaction_amount_usd": 1646019.46
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.877,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2782142.52,
"financial_exposure_usd": 3444593.24,
"recoverable_pct": 0.807
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100798",
"label": "fraudulent",
"label_confidence": 0.876,
"severity": "high",
"timestamp": "2026-01-01T13:18:00Z",
"trace_id": "9b59c5b6-407d-d06b-6171-3fc2aae142ac"
} | {
"account_age_days": 876,
"account_id": "ACCT-2CC2469C778D",
"baseline_risk_score": 0.335,
"kyc_tier": "tier_3",
"session_entropy": 0.606
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 795,
"timestamp": "2026-01-01T13:18:00Z",
"transaction_amount_usd": 39388.31
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.857,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 495597.4,
"financial_exposure_usd": 687318.8,
"recoverable_pct": 0.205
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108891",
"label": "benign",
"label_confidence": 0.632,
"severity": "medium",
"timestamp": "2026-01-07T04:11:00Z",
"trace_id": "0473714d-bbd6-fb80-87bf-19367a3b89cc"
} | {
"account_age_days": 1578,
"account_id": "ACCT-6ED8745E5642",
"baseline_risk_score": 0.184,
"kyc_tier": "tier_2",
"session_entropy": 0.568
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 527,
"timestamp": "2026-01-07T04:11:00Z",
"transaction_amount_usd": 9270.78
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.612,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 282.26,
"financial_exposure_usd": 368.11,
"recoverable_pct": 0.853
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100908",
"label": "fraudulent",
"label_confidence": 0.819,
"severity": "critical",
"timestamp": "2026-01-01T15:08:00Z",
"trace_id": "2a4a23a1-19f7-7747-4f90-4f7a9a384dbb"
} | {
"account_age_days": 1930,
"account_id": "ACCT-801A6259829C",
"baseline_risk_score": 0.412,
"kyc_tier": "tier_3",
"session_entropy": 0.905
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 382,
"timestamp": "2026-01-01T15:08:00Z",
"transaction_amount_usd": 78727.35
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.723,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 505913.37,
"financial_exposure_usd": 1194727.28,
"recoverable_pct": 0.56
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101661",
"label": "fraudulent",
"label_confidence": 0.839,
"severity": "high",
"timestamp": "2026-01-02T03:41:00Z",
"trace_id": "42181b96-4602-8835-8065-50696878a676"
} | {
"account_age_days": 1519,
"account_id": "ACCT-366F5D83E8F8",
"baseline_risk_score": 0.276,
"kyc_tier": "tier_1",
"session_entropy": 0.262
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 422,
"timestamp": "2026-01-02T03:41:00Z",
"transaction_amount_usd": 9495.94
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.556,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 186463.44,
"financial_exposure_usd": 345027.23,
"recoverable_pct": 0.048
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102537",
"label": "fraudulent",
"label_confidence": 0.845,
"severity": "low",
"timestamp": "2026-01-02T18:17:00Z",
"trace_id": "6f2de95c-c3fb-3fb6-03da-d5eb8ece9636"
} | {
"account_age_days": 26,
"account_id": "ACCT-F71650D32C81",
"baseline_risk_score": 0.541,
"kyc_tier": "tier_2",
"session_entropy": 0.945
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 515,
"timestamp": "2026-01-02T18:17:00Z",
"transaction_amount_usd": 62131.86
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.624,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 535828.69,
"financial_exposure_usd": 613296.02,
"recoverable_pct": 0.594
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109037",
"label": "benign",
"label_confidence": 0.747,
"severity": "high",
"timestamp": "2026-01-07T06:37:00Z",
"trace_id": "5fd419ef-edb1-3cd3-3a6f-6678f83db977"
} | {
"account_age_days": 1994,
"account_id": "ACCT-8937C5D03F66",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.108
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 112,
"timestamp": "2026-01-07T06:37:00Z",
"transaction_amount_usd": 623.06
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.467,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 143.92,
"financial_exposure_usd": 345.93,
"recoverable_pct": 0.93
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101101",
"label": "fraudulent",
"label_confidence": 0.891,
"severity": "critical",
"timestamp": "2026-01-01T18:21:00Z",
"trace_id": "cc1bb9e6-a88f-01cd-7ae4-bf8b7bcadb52"
} | {
"account_age_days": 1858,
"account_id": "ACCT-E05AE21F7330",
"baseline_risk_score": 0.263,
"kyc_tier": "tier_1",
"session_entropy": 0.168
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 639,
"timestamp": "2026-01-01T18:21:00Z",
"transaction_amount_usd": 22942.11
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.356,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 1209758.22,
"financial_exposure_usd": 1256052.36,
"recoverable_pct": 0.8
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102599",
"label": "fraudulent",
"label_confidence": 0.788,
"severity": "critical",
"timestamp": "2026-01-02T19:19:00Z",
"trace_id": "9a6940fd-a658-1eb6-4570-ab0723a229a5"
} | {
"account_age_days": 369,
"account_id": "ACCT-F2BB6A1B351B",
"baseline_risk_score": 0.611,
"kyc_tier": "tier_3",
"session_entropy": 0.902
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 227,
"timestamp": "2026-01-02T19:19:00Z",
"transaction_amount_usd": 118028.9
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.551,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 239067.45,
"financial_exposure_usd": 362710.09,
"recoverable_pct": 0.583
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104808",
"label": "fraudulent",
"label_confidence": 0.832,
"severity": "low",
"timestamp": "2026-01-04T08:08:00Z",
"trace_id": "ba72b177-a578-55d1-c22d-8f1f7a475d9c"
} | {
"account_age_days": 1577,
"account_id": "ACCT-89A7C3796739",
"baseline_risk_score": 0.434,
"kyc_tier": "tier_3",
"session_entropy": 0.949
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 115,
"timestamp": "2026-01-04T07:24:00Z",
"transaction_amount_usd": 14.06
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.75,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 5686526.59,
"financial_exposure_usd": 5847548.7,
"recoverable_pct": 0.866
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103723",
"label": "fraudulent",
"label_confidence": 0.862,
"severity": "high",
"timestamp": "2026-01-03T14:03:00Z",
"trace_id": "886c2fd4-efc6-0112-2285-9d8d874405df"
} | {
"account_age_days": 16,
"account_id": "ACCT-D19AFFFA7009",
"baseline_risk_score": 0.421,
"kyc_tier": "tier_1",
"session_entropy": 0.277
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 640,
"timestamp": "2026-01-03T14:03:00Z",
"transaction_amount_usd": 2090191.23
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.662,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1198080.16,
"financial_exposure_usd": 2342317.08,
"recoverable_pct": 0.758
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106045",
"label": "fraudulent",
"label_confidence": 0.789,
"severity": "medium",
"timestamp": "2026-01-05T04:45:00Z",
"trace_id": "c774a12a-d15f-f816-5a99-0c67bdaaaa30"
} | {
"account_age_days": 1650,
"account_id": "ACCT-D4CFD3C3FBFD",
"baseline_risk_score": 0.081,
"kyc_tier": "tier_3",
"session_entropy": 0.73
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 562,
"timestamp": "2026-01-05T04:45:00Z",
"transaction_amount_usd": 2766988.49
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.581,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4266846.48,
"financial_exposure_usd": 5034799.24,
"recoverable_pct": 0.477
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103232",
"label": "fraudulent",
"label_confidence": 0.942,
"severity": "critical",
"timestamp": "2026-01-03T05:52:00Z",
"trace_id": "def8f5bc-ccf8-f761-db4c-435a33d5ab1e"
} | {
"account_age_days": 539,
"account_id": "ACCT-0280E802153D",
"baseline_risk_score": 0.514,
"kyc_tier": "tier_3",
"session_entropy": 0.511
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 1100,
"timestamp": "2026-01-03T05:52:00Z",
"transaction_amount_usd": 116109.45
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.937,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 974862.95,
"financial_exposure_usd": 1060348.89,
"recoverable_pct": 0.25
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101765",
"label": "fraudulent",
"label_confidence": 0.919,
"severity": "critical",
"timestamp": "2026-01-02T05:25:00Z",
"trace_id": "f1f8a657-2bda-327a-a60f-305bf8592ec9"
} | {
"account_age_days": 737,
"account_id": "ACCT-3872A804CD63",
"baseline_risk_score": 0.548,
"kyc_tier": "tier_2",
"session_entropy": 0.822
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "BR",
"latency_ms": 1041,
"timestamp": "2026-01-02T05:25:00Z",
"transaction_amount_usd": 73867.98
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.725,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 218135.92,
"financial_exposure_usd": 304975.97,
"recoverable_pct": 0.533
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.