schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100755",
"label": "fraudulent",
"label_confidence": 0.772,
"severity": "medium",
"timestamp": "2026-01-01T12:35:00Z",
"trace_id": "00b60e38-74d4-88ee-80c9-d17f69af3d0f"
} | {
"account_age_days": 1749,
"account_id": "ACCT-76CB084682F1",
"baseline_risk_score": 0.633,
"kyc_tier": "tier_2",
"session_entropy": 0.324
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 811,
"timestamp": "2026-01-01T12:35:00Z",
"transaction_amount_usd": 51257.77
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.539,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 535647.42,
"financial_exposure_usd": 1118420.05,
"recoverable_pct": 0.508
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107916",
"label": "benign",
"label_confidence": 0.462,
"severity": "high",
"timestamp": "2026-01-06T11:56:00Z",
"trace_id": "cb7fe8ff-438e-ca79-6bb5-63e0981c848a"
} | {
"account_age_days": 570,
"account_id": "ACCT-CACC7520121A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.346
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 1196,
"timestamp": "2026-01-06T11:56:00Z",
"transaction_amount_usd": 14942.12
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.681,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1434.27,
"financial_exposure_usd": 2912.3,
"recoverable_pct": 0.408
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100180",
"label": "fraudulent",
"label_confidence": 0.828,
"severity": "critical",
"timestamp": "2026-01-01T03:00:00Z",
"trace_id": "f15e609c-b297-fa7f-f719-ae4398cb3cb4"
} | {
"account_age_days": 1876,
"account_id": "ACCT-996337AA9C4E",
"baseline_risk_score": 0.398,
"kyc_tier": "tier_1",
"session_entropy": 0.739
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 126,
"timestamp": "2025-12-31T17:02:00Z",
"transaction_amount_usd": 19.71
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.433,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 510190.38,
"financial_exposure_usd": 1196089.27,
"recoverable_pct": 0.257
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103580",
"label": "fraudulent",
"label_confidence": 0.881,
"severity": "critical",
"timestamp": "2026-01-03T11:40:00Z",
"trace_id": "0401c85b-3d05-b221-f913-ef6d55f913b5"
} | {
"account_age_days": 1527,
"account_id": "ACCT-E9C6D149E763",
"baseline_risk_score": 0.149,
"kyc_tier": "tier_2",
"session_entropy": 0.744
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 106,
"timestamp": "2026-01-02T23:02:00Z",
"transaction_amount_usd": 23.29
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.464,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2200318.73,
"financial_exposure_usd": 3401902.08,
"recoverable_pct": 0.898
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108240",
"label": "benign",
"label_confidence": 0.632,
"severity": "high",
"timestamp": "2026-01-06T17:20:00Z",
"trace_id": "da136577-69a5-0e3a-b9c5-6bae5dcd5e1f"
} | {
"account_age_days": 998,
"account_id": "ACCT-846D092383F4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.564
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 332,
"timestamp": "2026-01-06T17:20:00Z",
"transaction_amount_usd": 184.01
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.696,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1795,
"financial_exposure_usd": 2703.82,
"recoverable_pct": 0.677
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104930",
"label": "fraudulent",
"label_confidence": 0.8,
"severity": "medium",
"timestamp": "2026-01-04T10:10:00Z",
"trace_id": "dae9a2e7-8c17-f6f3-3d92-fb8716a8bf7e"
} | {
"account_age_days": 1114,
"account_id": "ACCT-002885BBCC0B",
"baseline_risk_score": 0.121,
"kyc_tier": "tier_3",
"session_entropy": 0.187
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 501,
"timestamp": "2026-01-04T10:10:00Z",
"transaction_amount_usd": 2953251.07
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.41,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 4195899.07,
"financial_exposure_usd": 5467430.65,
"recoverable_pct": 0.996
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109186",
"label": "benign",
"label_confidence": 0.511,
"severity": "low",
"timestamp": "2026-01-07T09:06:00Z",
"trace_id": "c3c5d3bb-d7de-9e65-dddb-986bc13db833"
} | {
"account_age_days": 1868,
"account_id": "ACCT-5C763ADB07FB",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.321
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 144,
"timestamp": "2026-01-07T09:06:00Z",
"transaction_amount_usd": 13068.04
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.659,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1213.66,
"financial_exposure_usd": 1409.07,
"recoverable_pct": 0.431
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106530",
"label": "fraudulent",
"label_confidence": 0.715,
"severity": "high",
"timestamp": "2026-01-05T12:50:00Z",
"trace_id": "4ed3de6a-a0c2-c97f-14db-c0c27f8c30c0"
} | {
"account_age_days": 605,
"account_id": "ACCT-68D80A19E388",
"baseline_risk_score": 0.34,
"kyc_tier": "tier_3",
"session_entropy": 0.735
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 574,
"timestamp": "2026-01-05T12:50:00Z",
"transaction_amount_usd": 51520.14
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.905,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 6051761.89,
"financial_exposure_usd": 6103889.5,
"recoverable_pct": 0.462
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104789",
"label": "fraudulent",
"label_confidence": 0.91,
"severity": "high",
"timestamp": "2026-01-04T07:49:00Z",
"trace_id": "acbd58e0-c0b7-741e-933d-a004b2dd0b53"
} | {
"account_age_days": 1112,
"account_id": "ACCT-93E0954E19F7",
"baseline_risk_score": 0.295,
"kyc_tier": "tier_1",
"session_entropy": 0.661
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 145,
"timestamp": "2026-01-04T07:49:00Z",
"transaction_amount_usd": 1713824.88
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.634,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 596800.9,
"financial_exposure_usd": 1220854.89,
"recoverable_pct": 0.751
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100216",
"label": "fraudulent",
"label_confidence": 0.876,
"severity": "critical",
"timestamp": "2026-01-01T03:36:00Z",
"trace_id": "2c88d257-6831-429e-58c7-14f2a3aa1839"
} | {
"account_age_days": 1184,
"account_id": "ACCT-D1C1A2DBA82A",
"baseline_risk_score": 0.569,
"kyc_tier": "tier_2",
"session_entropy": 0.434
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 1092,
"timestamp": "2026-01-01T03:36:00Z",
"transaction_amount_usd": 56364.36
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.763,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 535690.27,
"financial_exposure_usd": 1000376.07,
"recoverable_pct": 0.547
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102961",
"label": "fraudulent",
"label_confidence": 0.753,
"severity": "critical",
"timestamp": "2026-01-03T01:21:00Z",
"trace_id": "d12fe6e6-091c-9aa9-912b-0823315eba45"
} | {
"account_age_days": 23,
"account_id": "ACCT-0E9EB68AF962",
"baseline_risk_score": 0.622,
"kyc_tier": "tier_3",
"session_entropy": 0.485
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 287,
"timestamp": "2026-01-02T18:55:00Z",
"transaction_amount_usd": 7.03
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.793,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 549991.54,
"financial_exposure_usd": 732891.22,
"recoverable_pct": 0.031
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100705",
"label": "fraudulent",
"label_confidence": 0.834,
"severity": "high",
"timestamp": "2026-01-01T11:45:00Z",
"trace_id": "46175fce-4bf7-dc4a-d496-1a223b7f9f07"
} | {
"account_age_days": 1734,
"account_id": "ACCT-229CC46A9AB4",
"baseline_risk_score": 0.252,
"kyc_tier": "tier_3",
"session_entropy": 0.502
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 186,
"timestamp": "2026-01-01T07:03:00Z",
"transaction_amount_usd": 24.99
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.468,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 265343.18,
"financial_exposure_usd": 376935.41,
"recoverable_pct": 0.03
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102969",
"label": "fraudulent",
"label_confidence": 0.848,
"severity": "high",
"timestamp": "2026-01-03T01:29:00Z",
"trace_id": "663ce85f-57ae-a8c6-b8e2-8fc008d4a5e4"
} | {
"account_age_days": 1454,
"account_id": "ACCT-C0D3FE857006",
"baseline_risk_score": 0.315,
"kyc_tier": "tier_2",
"session_entropy": 0.285
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 1000,
"timestamp": "2026-01-03T01:29:00Z",
"transaction_amount_usd": 31145.39
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.732,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 561294.58,
"financial_exposure_usd": 594088.54,
"recoverable_pct": 0.27
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104772",
"label": "fraudulent",
"label_confidence": 0.671,
"severity": "low",
"timestamp": "2026-01-04T07:32:00Z",
"trace_id": "f925626d-cc68-1c0d-0e8a-df975c9c2154"
} | {
"account_age_days": 319,
"account_id": "ACCT-2B5D7A802623",
"baseline_risk_score": 0.064,
"kyc_tier": "tier_2",
"session_entropy": 0.629
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 139,
"timestamp": "2026-01-04T05:11:00Z",
"transaction_amount_usd": 3.82
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.352,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4473592.01,
"financial_exposure_usd": 6658832.2,
"recoverable_pct": 0.499
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109293",
"label": "benign",
"label_confidence": 0.603,
"severity": "medium",
"timestamp": "2026-01-07T10:53:00Z",
"trace_id": "b476532f-5d8e-e626-ee44-ca99816dba65"
} | {
"account_age_days": 1292,
"account_id": "ACCT-2CDE581D2F98",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.756
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 569,
"timestamp": "2026-01-07T10:53:00Z",
"transaction_amount_usd": 12734.29
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.657,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3204.5,
"financial_exposure_usd": 5259.85,
"recoverable_pct": 0.947
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103271",
"label": "fraudulent",
"label_confidence": 0.937,
"severity": "critical",
"timestamp": "2026-01-03T06:31:00Z",
"trace_id": "c4db3f9f-a6f1-d129-e99b-6678a66110d9"
} | {
"account_age_days": 554,
"account_id": "ACCT-916048D39307",
"baseline_risk_score": 0.348,
"kyc_tier": "tier_1",
"session_entropy": 0.409
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 106,
"timestamp": "2026-01-02T20:06:00Z",
"transaction_amount_usd": 19.45
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.76,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 275247.37,
"financial_exposure_usd": 597514.92,
"recoverable_pct": 0.675
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100098",
"label": "fraudulent",
"label_confidence": 0.921,
"severity": "medium",
"timestamp": "2026-01-01T01:38:00Z",
"trace_id": "5b7d9d2d-22af-f503-b17a-ff6de0d96670"
} | {
"account_age_days": 1412,
"account_id": "ACCT-DB583DD920F3",
"baseline_risk_score": 0.372,
"kyc_tier": "tier_1",
"session_entropy": 0.69
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 228,
"timestamp": "2025-12-31T22:07:00Z",
"transaction_amount_usd": 23.88
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.425,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 944979.69,
"financial_exposure_usd": 955813.12,
"recoverable_pct": 0.361
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101900",
"label": "fraudulent",
"label_confidence": 0.873,
"severity": "critical",
"timestamp": "2026-01-02T07:40:00Z",
"trace_id": "d86b1fc3-cc9d-593a-8999-2d385d97670f"
} | {
"account_age_days": 952,
"account_id": "ACCT-BBE5C7911F9A",
"baseline_risk_score": 0.582,
"kyc_tier": "tier_1",
"session_entropy": 0.321
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 122,
"timestamp": "2026-01-01T23:28:00Z",
"transaction_amount_usd": 10.52
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.673,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 407910.77,
"financial_exposure_usd": 495098.7,
"recoverable_pct": 0.367
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102727",
"label": "fraudulent",
"label_confidence": 0.754,
"severity": "critical",
"timestamp": "2026-01-02T21:27:00Z",
"trace_id": "2f5f8dd1-bb0f-3d6f-8915-109499875cdd"
} | {
"account_age_days": 1956,
"account_id": "ACCT-AEC7F8320B73",
"baseline_risk_score": 0.266,
"kyc_tier": "tier_3",
"session_entropy": 0.141
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 141,
"timestamp": "2026-01-02T18:19:00Z",
"transaction_amount_usd": 21.45
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.737,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 663695.87,
"financial_exposure_usd": 978698.16,
"recoverable_pct": 0.566
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107216",
"label": "benign",
"label_confidence": 0.721,
"severity": "high",
"timestamp": "2026-01-06T00:16:00Z",
"trace_id": "b77fd0e1-3fe3-efec-528f-1b4eaa22a25d"
} | {
"account_age_days": 1525,
"account_id": "ACCT-1C9DF25BF8E4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.243
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 123,
"timestamp": "2026-01-05T14:08:00Z",
"transaction_amount_usd": 8.78
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.667,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2381.38,
"financial_exposure_usd": 2466.36,
"recoverable_pct": 0.723
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101177",
"label": "fraudulent",
"label_confidence": 0.857,
"severity": "high",
"timestamp": "2026-01-01T19:37:00Z",
"trace_id": "d7e9f93b-4181-9218-372f-c7425ef5b6ec"
} | {
"account_age_days": 546,
"account_id": "ACCT-716E6E22A866",
"baseline_risk_score": 0.589,
"kyc_tier": "tier_3",
"session_entropy": 0.235
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "MY",
"latency_ms": 547,
"timestamp": "2026-01-01T19:37:00Z",
"transaction_amount_usd": 78688.25
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.684,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 328845.56,
"financial_exposure_usd": 420747.57,
"recoverable_pct": 0.473
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106335",
"label": "fraudulent",
"label_confidence": 0.649,
"severity": "high",
"timestamp": "2026-01-05T09:35:00Z",
"trace_id": "cd18c981-05de-c31d-51cc-7dc7ded6b197"
} | {
"account_age_days": 627,
"account_id": "ACCT-C9D13462AF26",
"baseline_risk_score": 0.114,
"kyc_tier": "tier_2",
"session_entropy": 0.621
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 951,
"timestamp": "2026-01-05T09:35:00Z",
"transaction_amount_usd": 2767967.28
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.781,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3085425.08,
"financial_exposure_usd": 5421480.98,
"recoverable_pct": 0.41
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100318",
"label": "fraudulent",
"label_confidence": 0.971,
"severity": "high",
"timestamp": "2026-01-01T05:18:00Z",
"trace_id": "a0b5e6c3-bdcb-3eb2-c0c2-8c419155ed93"
} | {
"account_age_days": 535,
"account_id": "ACCT-04A6DCA6F908",
"baseline_risk_score": 0.554,
"kyc_tier": "tier_3",
"session_entropy": 0.261
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 1169,
"timestamp": "2026-01-01T05:18:00Z",
"transaction_amount_usd": 17094.21
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.391,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 278983.86,
"financial_exposure_usd": 469381.25,
"recoverable_pct": 0.203
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106978",
"label": "benign",
"label_confidence": 0.58,
"severity": "critical",
"timestamp": "2026-01-05T20:18:00Z",
"trace_id": "37d0a6a9-23f4-8b19-1918-2025c708e25f"
} | {
"account_age_days": 497,
"account_id": "ACCT-DFE1675C93BD",
"baseline_risk_score": 0.196,
"kyc_tier": "tier_2",
"session_entropy": 0.844
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 458,
"timestamp": "2026-01-05T20:18:00Z",
"transaction_amount_usd": 9765.87
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.613,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1586.62,
"financial_exposure_usd": 2074.31,
"recoverable_pct": 0.885
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107505",
"label": "benign",
"label_confidence": 0.545,
"severity": "high",
"timestamp": "2026-01-06T05:05:00Z",
"trace_id": "2d1e4822-4fea-0568-6dec-86b677df351f"
} | {
"account_age_days": 824,
"account_id": "ACCT-7FF74C717520",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.567
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 1000,
"timestamp": "2026-01-06T05:05:00Z",
"transaction_amount_usd": 8201.19
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.648,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1763.36,
"financial_exposure_usd": 2055.67,
"recoverable_pct": 0.695
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100024",
"label": "fraudulent",
"label_confidence": 0.757,
"severity": "high",
"timestamp": "2026-01-01T00:24:00Z",
"trace_id": "a59b457f-c0d7-ac73-095f-fa8140d92bce"
} | {
"account_age_days": 912,
"account_id": "ACCT-F2E6195F732E",
"baseline_risk_score": 0.63,
"kyc_tier": "tier_1",
"session_entropy": 0.415
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 303,
"timestamp": "2025-12-31T20:54:00Z",
"transaction_amount_usd": 6.83
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.433,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 603781.82,
"financial_exposure_usd": 945151.08,
"recoverable_pct": 0.552
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100256",
"label": "fraudulent",
"label_confidence": 0.825,
"severity": "critical",
"timestamp": "2026-01-01T04:16:00Z",
"trace_id": "4e0bec8f-a07d-4d6c-01d0-468ca528698b"
} | {
"account_age_days": 1262,
"account_id": "ACCT-F48783EB939F",
"baseline_risk_score": 0.62,
"kyc_tier": "tier_1",
"session_entropy": 0.582
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 292,
"timestamp": "2025-12-31T17:14:00Z",
"transaction_amount_usd": 2.25
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.879,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 355615.23,
"financial_exposure_usd": 423511.25,
"recoverable_pct": 0.679
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101947",
"label": "fraudulent",
"label_confidence": 0.975,
"severity": "critical",
"timestamp": "2026-01-02T08:27:00Z",
"trace_id": "3df7f9f4-c1a0-1087-fd8f-816c9e9afefd"
} | {
"account_age_days": 206,
"account_id": "ACCT-7AE997F0EA6F",
"baseline_risk_score": 0.622,
"kyc_tier": "tier_2",
"session_entropy": 0.287
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 206,
"timestamp": "2026-01-02T08:27:00Z",
"transaction_amount_usd": 27442.74
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.634,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 554858.12,
"financial_exposure_usd": 764406.47,
"recoverable_pct": 0.505
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104354",
"label": "fraudulent",
"label_confidence": 0.715,
"severity": "medium",
"timestamp": "2026-01-04T00:34:00Z",
"trace_id": "3351a0a7-5af6-cc85-2a6d-ceed5af75729"
} | {
"account_age_days": 376,
"account_id": "ACCT-84A26C74A3ED",
"baseline_risk_score": 0.233,
"kyc_tier": "tier_1",
"session_entropy": 0.941
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 870,
"timestamp": "2026-01-04T00:34:00Z",
"transaction_amount_usd": 2420430.11
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.425,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5014537.1,
"financial_exposure_usd": 5457525.84,
"recoverable_pct": 0.56
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108492",
"label": "benign",
"label_confidence": 0.461,
"severity": "high",
"timestamp": "2026-01-06T21:32:00Z",
"trace_id": "27a9c435-205c-ac48-e3d1-964a3a8926d0"
} | {
"account_age_days": 1443,
"account_id": "ACCT-5EA636E4BB39",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.308
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 335,
"timestamp": "2026-01-06T21:32:00Z",
"transaction_amount_usd": 4495.11
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.788,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1957.11,
"financial_exposure_usd": 3057.85,
"recoverable_pct": 0.929
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108347",
"label": "benign",
"label_confidence": 0.732,
"severity": "low",
"timestamp": "2026-01-06T19:07:00Z",
"trace_id": "551ecf32-73e7-da58-88af-0d821c83be34"
} | {
"account_age_days": 1955,
"account_id": "ACCT-EB46B1B80398",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.274
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 232,
"timestamp": "2026-01-06T19:07:00Z",
"transaction_amount_usd": 1246.02
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.548,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3869.7,
"financial_exposure_usd": 3965.66,
"recoverable_pct": 0.872
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104486",
"label": "fraudulent",
"label_confidence": 0.803,
"severity": "critical",
"timestamp": "2026-01-04T02:46:00Z",
"trace_id": "1bf17f5d-7700-a69f-162e-a03f2f964dad"
} | {
"account_age_days": 884,
"account_id": "ACCT-5501427B5A79",
"baseline_risk_score": 0.409,
"kyc_tier": "tier_1",
"session_entropy": 0.77
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 379,
"timestamp": "2026-01-04T02:46:00Z",
"transaction_amount_usd": 2333813.94
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.845,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 532606.83,
"financial_exposure_usd": 1192656.03,
"recoverable_pct": 0.591
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103056",
"label": "fraudulent",
"label_confidence": 0.931,
"severity": "critical",
"timestamp": "2026-01-03T02:56:00Z",
"trace_id": "7233b8ac-a4e8-5d00-cb68-78757eae0016"
} | {
"account_age_days": 1505,
"account_id": "ACCT-972ABE77F716",
"baseline_risk_score": 0.616,
"kyc_tier": "tier_3",
"session_entropy": 0.884
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 199,
"timestamp": "2026-01-03T01:36:00Z",
"transaction_amount_usd": 11.09
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.93,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 856139.33,
"financial_exposure_usd": 952885.99,
"recoverable_pct": 0.205
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108251",
"label": "benign",
"label_confidence": 0.732,
"severity": "low",
"timestamp": "2026-01-06T17:31:00Z",
"trace_id": "c13fd740-4d83-107e-9b67-68a165471bbd"
} | {
"account_age_days": 842,
"account_id": "ACCT-0E82B54FE349",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.249
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 122,
"timestamp": "2026-01-06T17:31:00Z",
"transaction_amount_usd": 8878.1
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.663,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2289.98,
"financial_exposure_usd": 4509.1,
"recoverable_pct": 0.73
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103318",
"label": "fraudulent",
"label_confidence": 0.9,
"severity": "medium",
"timestamp": "2026-01-03T07:18:00Z",
"trace_id": "15395244-b4ba-9a55-6a96-b1334cb24c57"
} | {
"account_age_days": 1803,
"account_id": "ACCT-8A5CF1A6AB6A",
"baseline_risk_score": 0.544,
"kyc_tier": "tier_3",
"session_entropy": 0.344
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 310,
"timestamp": "2026-01-02T22:21:00Z",
"transaction_amount_usd": 10.34
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.532,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 693913.5,
"financial_exposure_usd": 702671.68,
"recoverable_pct": 0.584
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103149",
"label": "fraudulent",
"label_confidence": 0.936,
"severity": "medium",
"timestamp": "2026-01-03T04:29:00Z",
"trace_id": "9e16b27a-4bd6-8d37-fa79-f60220dbac39"
} | {
"account_age_days": 629,
"account_id": "ACCT-8F6DB921114B",
"baseline_risk_score": 0.56,
"kyc_tier": "tier_1",
"session_entropy": 0.336
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 116,
"timestamp": "2026-01-03T00:35:00Z",
"transaction_amount_usd": 2.52
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.859,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 284218.63,
"financial_exposure_usd": 378137.6,
"recoverable_pct": 0.141
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108889",
"label": "benign",
"label_confidence": 0.632,
"severity": "low",
"timestamp": "2026-01-07T04:09:00Z",
"trace_id": "5172baac-cca7-2b97-f088-8ea0cb206e18"
} | {
"account_age_days": 1633,
"account_id": "ACCT-F6A6B3B1AE07",
"baseline_risk_score": 0.199,
"kyc_tier": "tier_1",
"session_entropy": 0.38
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 338,
"timestamp": "2026-01-06T23:59:00Z",
"transaction_amount_usd": 1.25
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.708,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3571.22,
"financial_exposure_usd": 5003.54,
"recoverable_pct": 0.409
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109584",
"label": "benign",
"label_confidence": 0.663,
"severity": "low",
"timestamp": "2026-01-07T15:44:00Z",
"trace_id": "20603178-93cb-1017-e849-7a5a9d4a2176"
} | {
"account_age_days": 1520,
"account_id": "ACCT-D10AABDF358B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.191
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 1104,
"timestamp": "2026-01-07T15:44:00Z",
"transaction_amount_usd": 7697.4
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.799,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 720.58,
"financial_exposure_usd": 1287.28,
"recoverable_pct": 0.626
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103562",
"label": "fraudulent",
"label_confidence": 0.934,
"severity": "medium",
"timestamp": "2026-01-03T11:22:00Z",
"trace_id": "fcfcc55b-dff3-3776-2e23-047e74e520f0"
} | {
"account_age_days": 884,
"account_id": "ACCT-FE36C3FAFFD4",
"baseline_risk_score": 0.312,
"kyc_tier": "tier_1",
"session_entropy": 0.639
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 323,
"timestamp": "2026-01-03T11:22:00Z",
"transaction_amount_usd": 1638802.82
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.809,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 858500.36,
"financial_exposure_usd": 1770767.12,
"recoverable_pct": 0.825
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105467",
"label": "fraudulent",
"label_confidence": 0.86,
"severity": "high",
"timestamp": "2026-01-04T19:07:00Z",
"trace_id": "7c0a4ce4-fefa-51a5-9855-4018fb7589b9"
} | {
"account_age_days": 73,
"account_id": "ACCT-3891F8ACF958",
"baseline_risk_score": 0.069,
"kyc_tier": "tier_2",
"session_entropy": 0.571
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 905,
"timestamp": "2026-01-04T19:07:00Z",
"transaction_amount_usd": 194926.57
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.674,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 6060867.15,
"financial_exposure_usd": 9417636.12,
"recoverable_pct": 0.939
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108273",
"label": "benign",
"label_confidence": 0.475,
"severity": "critical",
"timestamp": "2026-01-06T17:53:00Z",
"trace_id": "9e170caa-90db-4d81-501d-4f263f0e0356"
} | {
"account_age_days": 907,
"account_id": "ACCT-668C241B4BCC",
"baseline_risk_score": 0.113,
"kyc_tier": "tier_1",
"session_entropy": 0.792
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 1036,
"timestamp": "2026-01-06T17:53:00Z",
"transaction_amount_usd": 13518.34
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.701,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2829.9,
"financial_exposure_usd": 4035.36,
"recoverable_pct": 0.858
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107367",
"label": "benign",
"label_confidence": 0.669,
"severity": "low",
"timestamp": "2026-01-06T02:47:00Z",
"trace_id": "1dd85573-ae4f-be9b-2361-180b72360b03"
} | {
"account_age_days": 1799,
"account_id": "ACCT-12B222F47DF9",
"baseline_risk_score": 0.18,
"kyc_tier": "tier_3",
"session_entropy": 0.718
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 896,
"timestamp": "2026-01-06T02:47:00Z",
"transaction_amount_usd": 4827.12
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.538,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 752.3,
"financial_exposure_usd": 1182.73,
"recoverable_pct": 0.694
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101890",
"label": "fraudulent",
"label_confidence": 0.923,
"severity": "high",
"timestamp": "2026-01-02T07:30:00Z",
"trace_id": "560bc01e-b141-ddc5-6bcc-a8dc45f5f586"
} | {
"account_age_days": 1035,
"account_id": "ACCT-E49200CC4601",
"baseline_risk_score": 0.569,
"kyc_tier": "tier_3",
"session_entropy": 0.441
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 996,
"timestamp": "2026-01-02T07:30:00Z",
"transaction_amount_usd": 96401.51
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.681,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 297044.34,
"financial_exposure_usd": 561920.89,
"recoverable_pct": 0.024
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107900",
"label": "benign",
"label_confidence": 0.52,
"severity": "critical",
"timestamp": "2026-01-06T11:40:00Z",
"trace_id": "58ed7346-6223-6480-c311-55c1ace9b6a4"
} | {
"account_age_days": 1023,
"account_id": "ACCT-9B7C6102D070",
"baseline_risk_score": 0.064,
"kyc_tier": "tier_2",
"session_entropy": 0.596
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 310,
"timestamp": "2026-01-06T09:40:00Z",
"transaction_amount_usd": 13.16
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.734,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1076.56,
"financial_exposure_usd": 1882.64,
"recoverable_pct": 0.996
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102624",
"label": "fraudulent",
"label_confidence": 0.815,
"severity": "low",
"timestamp": "2026-01-02T19:44:00Z",
"trace_id": "96967848-5791-617a-11f8-bea676412b49"
} | {
"account_age_days": 1071,
"account_id": "ACCT-5A179EEF50FF",
"baseline_risk_score": 0.367,
"kyc_tier": "tier_3",
"session_entropy": 0.92
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CA",
"latency_ms": 920,
"timestamp": "2026-01-02T19:44:00Z",
"transaction_amount_usd": 88743.9
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.702,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 464748.19,
"financial_exposure_usd": 1124022.29,
"recoverable_pct": 0.148
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102324",
"label": "fraudulent",
"label_confidence": 0.937,
"severity": "high",
"timestamp": "2026-01-02T14:44:00Z",
"trace_id": "bd636106-6d3a-c077-23cb-b1ed76dba190"
} | {
"account_age_days": 459,
"account_id": "ACCT-B43403CBAE85",
"baseline_risk_score": 0.339,
"kyc_tier": "tier_1",
"session_entropy": 0.52
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 355,
"timestamp": "2026-01-02T05:07:00Z",
"transaction_amount_usd": 3.68
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.866,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 742959.88,
"financial_exposure_usd": 1147001.36,
"recoverable_pct": 0.689
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105669",
"label": "fraudulent",
"label_confidence": 0.663,
"severity": "critical",
"timestamp": "2026-01-04T22:29:00Z",
"trace_id": "09a585a5-9910-e99a-1651-52f3e5bf94de"
} | {
"account_age_days": 654,
"account_id": "ACCT-0CF2931158EA",
"baseline_risk_score": 0.077,
"kyc_tier": "tier_1",
"session_entropy": 0.308
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 706,
"timestamp": "2026-01-04T22:29:00Z",
"transaction_amount_usd": 2703606.89
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.351,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1425260.08,
"financial_exposure_usd": 2222327.8,
"recoverable_pct": 0.742
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106356",
"label": "fraudulent",
"label_confidence": 0.812,
"severity": "medium",
"timestamp": "2026-01-05T09:56:00Z",
"trace_id": "25c6d97c-ce22-a35e-55ba-ad3074dc425c"
} | {
"account_age_days": 1029,
"account_id": "ACCT-A4A30E96A803",
"baseline_risk_score": 0.354,
"kyc_tier": "tier_1",
"session_entropy": 0.254
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 1073,
"timestamp": "2026-01-05T09:56:00Z",
"transaction_amount_usd": 2163985.76
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.681,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1939045.03,
"financial_exposure_usd": 3912275.66,
"recoverable_pct": 0.667
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108830",
"label": "benign",
"label_confidence": 0.624,
"severity": "medium",
"timestamp": "2026-01-07T03:10:00Z",
"trace_id": "dc522893-7c24-02c3-005f-d2de8d814779"
} | {
"account_age_days": 432,
"account_id": "ACCT-1AE7A0D692C8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.482
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 556,
"timestamp": "2026-01-07T03:10:00Z",
"transaction_amount_usd": 6363.88
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.506,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 642.86,
"financial_exposure_usd": 1484.79,
"recoverable_pct": 0.78
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102914",
"label": "fraudulent",
"label_confidence": 0.824,
"severity": "critical",
"timestamp": "2026-01-03T00:34:00Z",
"trace_id": "a7f101d7-7f5f-75f1-99dd-a6bc7e4473a7"
} | {
"account_age_days": 1813,
"account_id": "ACCT-03981BC9C66D",
"baseline_risk_score": 0.506,
"kyc_tier": "tier_2",
"session_entropy": 0.519
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 1007,
"timestamp": "2026-01-03T00:34:00Z",
"transaction_amount_usd": 108479.71
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.408,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 357955.95,
"financial_exposure_usd": 392102.76,
"recoverable_pct": 0.503
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104248",
"label": "fraudulent",
"label_confidence": 0.66,
"severity": "medium",
"timestamp": "2026-01-03T22:48:00Z",
"trace_id": "e6917298-e77f-4859-2493-03914853ead7"
} | {
"account_age_days": 357,
"account_id": "ACCT-F204284F7D19",
"baseline_risk_score": 0.406,
"kyc_tier": "tier_1",
"session_entropy": 0.193
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 182,
"timestamp": "2026-01-03T13:18:00Z",
"transaction_amount_usd": 0.72
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.498,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3356776.08,
"financial_exposure_usd": 3573017.71,
"recoverable_pct": 0.602
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104894",
"label": "fraudulent",
"label_confidence": 0.947,
"severity": "medium",
"timestamp": "2026-01-04T09:34:00Z",
"trace_id": "e2c32ecb-4f3d-5bec-ca35-bfa54965c180"
} | {
"account_age_days": 467,
"account_id": "ACCT-F0D837E74AE2",
"baseline_risk_score": 0.388,
"kyc_tier": "tier_3",
"session_entropy": 0.734
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 109,
"timestamp": "2026-01-04T00:48:00Z",
"transaction_amount_usd": 18.47
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.841,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3427561.19,
"financial_exposure_usd": 6366235.38,
"recoverable_pct": 0.971
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102726",
"label": "fraudulent",
"label_confidence": 0.962,
"severity": "low",
"timestamp": "2026-01-02T21:26:00Z",
"trace_id": "7762a9c2-0e22-d44b-564f-56f1586ca622"
} | {
"account_age_days": 862,
"account_id": "ACCT-69A3294778B1",
"baseline_risk_score": 0.258,
"kyc_tier": "tier_2",
"session_entropy": 0.526
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 493,
"timestamp": "2026-01-02T21:26:00Z",
"transaction_amount_usd": 75792.3
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.745,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 605607.7,
"financial_exposure_usd": 971483.87,
"recoverable_pct": 0.379
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103939",
"label": "fraudulent",
"label_confidence": 0.678,
"severity": "medium",
"timestamp": "2026-01-03T17:39:00Z",
"trace_id": "b3517662-d55d-f606-a0e8-09ed87cd7bb6"
} | {
"account_age_days": 1021,
"account_id": "ACCT-2313BC3C8F5E",
"baseline_risk_score": 0.248,
"kyc_tier": "tier_1",
"session_entropy": 0.943
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 1102,
"timestamp": "2026-01-03T17:39:00Z",
"transaction_amount_usd": 394327.78
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.421,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2418587.2,
"financial_exposure_usd": 3701450.35,
"recoverable_pct": 0.496
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100093",
"label": "fraudulent",
"label_confidence": 0.787,
"severity": "low",
"timestamp": "2026-01-01T01:33:00Z",
"trace_id": "1c71a821-22f1-c32b-47d5-ac920f4555da"
} | {
"account_age_days": 934,
"account_id": "ACCT-BF4E2E469204",
"baseline_risk_score": 0.518,
"kyc_tier": "tier_2",
"session_entropy": 0.596
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 428,
"timestamp": "2026-01-01T01:33:00Z",
"transaction_amount_usd": 20958.56
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.875,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 476146.18,
"financial_exposure_usd": 931852.28,
"recoverable_pct": 0.741
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107518",
"label": "benign",
"label_confidence": 0.652,
"severity": "low",
"timestamp": "2026-01-06T05:18:00Z",
"trace_id": "c012b5e7-770f-1b4c-7d72-be69013e3fad"
} | {
"account_age_days": 1398,
"account_id": "ACCT-A4AC0D52161D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.849
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 1126,
"timestamp": "2026-01-06T05:18:00Z",
"transaction_amount_usd": 5126.34
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.622,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 848.19,
"financial_exposure_usd": 1163.89,
"recoverable_pct": 0.461
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102464",
"label": "fraudulent",
"label_confidence": 0.866,
"severity": "critical",
"timestamp": "2026-01-02T17:04:00Z",
"trace_id": "ef6bdb97-1867-4086-dc83-75b80364efa0"
} | {
"account_age_days": 1001,
"account_id": "ACCT-0720652866CC",
"baseline_risk_score": 0.453,
"kyc_tier": "tier_1",
"session_entropy": 0.491
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 125,
"timestamp": "2026-01-02T13:42:00Z",
"transaction_amount_usd": 2.42
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.484,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 155277.43,
"financial_exposure_usd": 367481.68,
"recoverable_pct": 0.502
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109575",
"label": "benign",
"label_confidence": 0.743,
"severity": "medium",
"timestamp": "2026-01-07T15:35:00Z",
"trace_id": "bfed9ad7-5f26-9ca3-c51b-639b168fbfd4"
} | {
"account_age_days": 1845,
"account_id": "ACCT-42C9CC85A2D8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.384
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 540,
"timestamp": "2026-01-07T15:35:00Z",
"transaction_amount_usd": 4939.68
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.621,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 765.35,
"financial_exposure_usd": 1553.58,
"recoverable_pct": 0.86
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102501",
"label": "fraudulent",
"label_confidence": 0.894,
"severity": "medium",
"timestamp": "2026-01-02T17:41:00Z",
"trace_id": "9021ab0e-b2f6-7045-8f12-cf9eec4c8faf"
} | {
"account_age_days": 1088,
"account_id": "ACCT-FE4A7038557F",
"baseline_risk_score": 0.604,
"kyc_tier": "tier_1",
"session_entropy": 0.337
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 782,
"timestamp": "2026-01-02T17:41:00Z",
"transaction_amount_usd": 4531.26
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.936,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 875369.96,
"financial_exposure_usd": 932518.18,
"recoverable_pct": 0.145
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101105",
"label": "fraudulent",
"label_confidence": 0.972,
"severity": "high",
"timestamp": "2026-01-01T18:25:00Z",
"trace_id": "82edde4e-1574-5e66-363f-03da981066a0"
} | {
"account_age_days": 1887,
"account_id": "ACCT-C7EDAD1DB5D7",
"baseline_risk_score": 0.373,
"kyc_tier": "tier_2",
"session_entropy": 0.272
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 203,
"timestamp": "2026-01-01T10:07:00Z",
"transaction_amount_usd": 19.7
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.659,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 694383.04,
"financial_exposure_usd": 744552.37,
"recoverable_pct": 0.64
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106191",
"label": "fraudulent",
"label_confidence": 0.802,
"severity": "medium",
"timestamp": "2026-01-05T07:11:00Z",
"trace_id": "051256b0-3462-2f80-08fd-e9dd355e2ed3"
} | {
"account_age_days": 104,
"account_id": "ACCT-246F11339938",
"baseline_risk_score": 0.279,
"kyc_tier": "tier_1",
"session_entropy": 0.707
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 383,
"timestamp": "2026-01-05T03:38:00Z",
"transaction_amount_usd": 8.34
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.444,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1511295.69,
"financial_exposure_usd": 2284425.92,
"recoverable_pct": 0.475
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105205",
"label": "fraudulent",
"label_confidence": 0.878,
"severity": "medium",
"timestamp": "2026-01-04T14:45:00Z",
"trace_id": "81f9a7a2-71ca-62e7-b3aa-7e325f4dcc3f"
} | {
"account_age_days": 915,
"account_id": "ACCT-C4A2BCEFBEE2",
"baseline_risk_score": 0.25,
"kyc_tier": "tier_1",
"session_entropy": 0.585
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 195,
"timestamp": "2026-01-04T14:45:00Z",
"transaction_amount_usd": 440354.82
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.444,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2554386.18,
"financial_exposure_usd": 2860160.36,
"recoverable_pct": 0.721
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105012",
"label": "fraudulent",
"label_confidence": 0.742,
"severity": "high",
"timestamp": "2026-01-04T11:32:00Z",
"trace_id": "4aa39230-0978-dbd1-f95e-23690836649e"
} | {
"account_age_days": 531,
"account_id": "ACCT-F8EEE719965B",
"baseline_risk_score": 0.422,
"kyc_tier": "tier_3",
"session_entropy": 0.565
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 1001,
"timestamp": "2026-01-04T11:32:00Z",
"transaction_amount_usd": 543866.42
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.758,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4076233.06,
"financial_exposure_usd": 4249976.11,
"recoverable_pct": 0.801
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104914",
"label": "fraudulent",
"label_confidence": 0.604,
"severity": "critical",
"timestamp": "2026-01-04T09:54:00Z",
"trace_id": "2959335e-c78f-920c-6a74-d21b894f66b0"
} | {
"account_age_days": 822,
"account_id": "ACCT-6FF2C81011D7",
"baseline_risk_score": 0.086,
"kyc_tier": "tier_1",
"session_entropy": 0.399
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 871,
"timestamp": "2026-01-04T09:54:00Z",
"transaction_amount_usd": 1386723.13
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.717,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1932419.33,
"financial_exposure_usd": 3509489.21,
"recoverable_pct": 0.951
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107836",
"label": "benign",
"label_confidence": 0.744,
"severity": "high",
"timestamp": "2026-01-06T10:36:00Z",
"trace_id": "46423162-1b76-a51a-d930-de69d05eda16"
} | {
"account_age_days": 1820,
"account_id": "ACCT-A545CB16BDA9",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.615
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 383,
"timestamp": "2026-01-06T10:36:00Z",
"transaction_amount_usd": 7426.42
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.775,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 5238.03,
"financial_exposure_usd": 8100.68,
"recoverable_pct": 0.565
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108557",
"label": "benign",
"label_confidence": 0.493,
"severity": "medium",
"timestamp": "2026-01-06T22:37:00Z",
"trace_id": "7e08b404-77d4-fde3-e26a-5c41c5309b98"
} | {
"account_age_days": 1483,
"account_id": "ACCT-4695D584D9D4",
"baseline_risk_score": 0.124,
"kyc_tier": "tier_1",
"session_entropy": 0.221
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 398,
"timestamp": "2026-01-06T21:36:00Z",
"transaction_amount_usd": 8.6
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.481,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 803.65,
"financial_exposure_usd": 1927.91,
"recoverable_pct": 0.875
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101829",
"label": "fraudulent",
"label_confidence": 0.909,
"severity": "high",
"timestamp": "2026-01-02T06:29:00Z",
"trace_id": "cbd97a38-c729-1bfc-a485-5bcbb1cdba0b"
} | {
"account_age_days": 700,
"account_id": "ACCT-8AC57EE22340",
"baseline_risk_score": 0.624,
"kyc_tier": "tier_1",
"session_entropy": 0.422
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 1185,
"timestamp": "2026-01-02T06:29:00Z",
"transaction_amount_usd": 67673.81
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.831,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 578275.16,
"financial_exposure_usd": 1059942.23,
"recoverable_pct": 0.646
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105322",
"label": "fraudulent",
"label_confidence": 0.662,
"severity": "medium",
"timestamp": "2026-01-04T16:42:00Z",
"trace_id": "fc9cbf8f-e7dd-2108-9a5d-a20d8b778873"
} | {
"account_age_days": 140,
"account_id": "ACCT-3E20ADF19C98",
"baseline_risk_score": 0.202,
"kyc_tier": "tier_1",
"session_entropy": 0.783
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 353,
"timestamp": "2026-01-04T16:42:00Z",
"transaction_amount_usd": 1743239.05
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.54,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2696007.55,
"financial_exposure_usd": 2933864.9,
"recoverable_pct": 0.949
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105504",
"label": "fraudulent",
"label_confidence": 0.652,
"severity": "high",
"timestamp": "2026-01-04T19:44:00Z",
"trace_id": "2346e57e-78ec-334e-ad3b-194d713f837c"
} | {
"account_age_days": 438,
"account_id": "ACCT-55D1DA837D79",
"baseline_risk_score": 0.299,
"kyc_tier": "tier_3",
"session_entropy": 0.599
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 399,
"timestamp": "2026-01-04T19:44:00Z",
"transaction_amount_usd": 738771.55
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.536,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1460006.93,
"financial_exposure_usd": 2213143.53,
"recoverable_pct": 0.811
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102755",
"label": "fraudulent",
"label_confidence": 0.851,
"severity": "critical",
"timestamp": "2026-01-02T21:55:00Z",
"trace_id": "5ce1a3ee-bbfd-a126-064f-5baa0e10392a"
} | {
"account_age_days": 1939,
"account_id": "ACCT-2700392DC7B0",
"baseline_risk_score": 0.423,
"kyc_tier": "tier_3",
"session_entropy": 0.668
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "BR",
"latency_ms": 311,
"timestamp": "2026-01-02T21:55:00Z",
"transaction_amount_usd": 67946.39
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.437,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 419266,
"financial_exposure_usd": 1012014.64,
"recoverable_pct": 0.821
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104442",
"label": "fraudulent",
"label_confidence": 0.796,
"severity": "low",
"timestamp": "2026-01-04T02:02:00Z",
"trace_id": "0b590e98-3668-398d-c81c-a07303b3f322"
} | {
"account_age_days": 446,
"account_id": "ACCT-ADA7BEBFDB8A",
"baseline_risk_score": 0.29,
"kyc_tier": "tier_3",
"session_entropy": 0.626
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 325,
"timestamp": "2026-01-03T20:55:00Z",
"transaction_amount_usd": 12.88
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.781,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2806590.95,
"financial_exposure_usd": 4562313.16,
"recoverable_pct": 0.71
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106522",
"label": "fraudulent",
"label_confidence": 0.837,
"severity": "medium",
"timestamp": "2026-01-05T12:42:00Z",
"trace_id": "cb70db2f-6468-5ca8-cd0c-39773e8cd8fe"
} | {
"account_age_days": 1082,
"account_id": "ACCT-A2C2188C031A",
"baseline_risk_score": 0.153,
"kyc_tier": "tier_2",
"session_entropy": 0.428
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 1130,
"timestamp": "2026-01-05T12:42:00Z",
"transaction_amount_usd": 1240134.19
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_B... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.88,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 5296093.23,
"financial_exposure_usd": 6023644.46,
"recoverable_pct": 0.814
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105594",
"label": "fraudulent",
"label_confidence": 0.634,
"severity": "medium",
"timestamp": "2026-01-04T21:14:00Z",
"trace_id": "a586d2c0-dc37-81b9-aa88-85dd8b71b95b"
} | {
"account_age_days": 1890,
"account_id": "ACCT-BBBDE21B9D7A",
"baseline_risk_score": 0.103,
"kyc_tier": "tier_3",
"session_entropy": 0.578
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 319,
"timestamp": "2026-01-04T09:59:00Z",
"transaction_amount_usd": 19.04
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.626,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1421597.37,
"financial_exposure_usd": 3301584.31,
"recoverable_pct": 0.626
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105909",
"label": "fraudulent",
"label_confidence": 0.873,
"severity": "high",
"timestamp": "2026-01-05T02:29:00Z",
"trace_id": "0a7345c4-6d8c-8b24-50ac-ecc57c524ac7"
} | {
"account_age_days": 492,
"account_id": "ACCT-965FE9D38122",
"baseline_risk_score": 0.247,
"kyc_tier": "tier_3",
"session_entropy": 0.613
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 586,
"timestamp": "2026-01-05T02:29:00Z",
"transaction_amount_usd": 1887571.41
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.849,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5643238.99,
"financial_exposure_usd": 6870348.07,
"recoverable_pct": 0.565
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106144",
"label": "fraudulent",
"label_confidence": 0.644,
"severity": "critical",
"timestamp": "2026-01-05T06:24:00Z",
"trace_id": "2a1e9e39-dc58-466f-d0d3-432bf881aed1"
} | {
"account_age_days": 1433,
"account_id": "ACCT-2BD6C7C90F1E",
"baseline_risk_score": 0.335,
"kyc_tier": "tier_1",
"session_entropy": 0.759
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 547,
"timestamp": "2026-01-05T06:24:00Z",
"transaction_amount_usd": 283750.84
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.69,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 3088957.65,
"financial_exposure_usd": 3283719.63,
"recoverable_pct": 0.69
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100328",
"label": "fraudulent",
"label_confidence": 0.95,
"severity": "low",
"timestamp": "2026-01-01T05:28:00Z",
"trace_id": "9631be62-13b4-98db-d9bc-e2196fb398f4"
} | {
"account_age_days": 1890,
"account_id": "ACCT-E3164F25E22F",
"baseline_risk_score": 0.469,
"kyc_tier": "tier_1",
"session_entropy": 0.746
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 146,
"timestamp": "2026-01-01T03:59:00Z",
"transaction_amount_usd": 11.92
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.59,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 694112.75,
"financial_exposure_usd": 1040042.34,
"recoverable_pct": 0.662
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101526",
"label": "fraudulent",
"label_confidence": 0.886,
"severity": "medium",
"timestamp": "2026-01-02T01:26:00Z",
"trace_id": "0e4582f0-b8b2-f826-a514-13161da3bdca"
} | {
"account_age_days": 1473,
"account_id": "ACCT-1FE48755960B",
"baseline_risk_score": 0.31,
"kyc_tier": "tier_1",
"session_entropy": 0.443
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "LU",
"latency_ms": 660,
"timestamp": "2026-01-02T01:26:00Z",
"transaction_amount_usd": 75636.25
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.949,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 224855.44,
"financial_exposure_usd": 546514.78,
"recoverable_pct": 0.113
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106998",
"label": "benign",
"label_confidence": 0.535,
"severity": "low",
"timestamp": "2026-01-05T20:38:00Z",
"trace_id": "d3a35e17-86d3-f2aa-137f-702130ca4e32"
} | {
"account_age_days": 1567,
"account_id": "ACCT-B90132ED5FDF",
"baseline_risk_score": 0.135,
"kyc_tier": "tier_2",
"session_entropy": 0.156
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 156,
"timestamp": "2026-01-05T10:32:00Z",
"transaction_amount_usd": 11.22
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.641,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2027.94,
"financial_exposure_usd": 2368.19,
"recoverable_pct": 0.557
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103506",
"label": "fraudulent",
"label_confidence": 0.838,
"severity": "high",
"timestamp": "2026-01-03T10:26:00Z",
"trace_id": "6b3ee76e-aa11-dafe-1770-89005347986f"
} | {
"account_age_days": 1829,
"account_id": "ACCT-26EE9D57390B",
"baseline_risk_score": 0.179,
"kyc_tier": "tier_2",
"session_entropy": 0.311
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 214,
"timestamp": "2026-01-03T04:15:00Z",
"transaction_amount_usd": 13.9
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.887,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2915640.87,
"financial_exposure_usd": 4381478.27,
"recoverable_pct": 0.699
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106528",
"label": "fraudulent",
"label_confidence": 0.672,
"severity": "critical",
"timestamp": "2026-01-05T12:48:00Z",
"trace_id": "1ef9e17a-361b-f686-b3b6-f82c06ce5259"
} | {
"account_age_days": 653,
"account_id": "ACCT-0412416DA6F9",
"baseline_risk_score": 0.153,
"kyc_tier": "tier_2",
"session_entropy": 0.496
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 129,
"timestamp": "2026-01-05T07:55:00Z",
"transaction_amount_usd": 12.7
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.729,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4070650.81,
"financial_exposure_usd": 4284071.18,
"recoverable_pct": 0.968
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103059",
"label": "fraudulent",
"label_confidence": 0.81,
"severity": "high",
"timestamp": "2026-01-03T02:59:00Z",
"trace_id": "e2979180-25de-0a7b-178a-e506e5e449d8"
} | {
"account_age_days": 1632,
"account_id": "ACCT-E54B1880C4C4",
"baseline_risk_score": 0.277,
"kyc_tier": "tier_2",
"session_entropy": 0.273
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NL",
"latency_ms": 259,
"timestamp": "2026-01-03T02:59:00Z",
"transaction_amount_usd": 46537.98
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.386,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 481206.92,
"financial_exposure_usd": 660182.37,
"recoverable_pct": 0.267
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102574",
"label": "fraudulent",
"label_confidence": 0.9,
"severity": "medium",
"timestamp": "2026-01-02T18:54:00Z",
"trace_id": "f2902836-78db-51f2-8321-d67dde103707"
} | {
"account_age_days": 208,
"account_id": "ACCT-D99509932484",
"baseline_risk_score": 0.323,
"kyc_tier": "tier_1",
"session_entropy": 0.151
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 387,
"timestamp": "2026-01-02T18:07:00Z",
"transaction_amount_usd": 13.17
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.626,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 283590.8,
"financial_exposure_usd": 525407.95,
"recoverable_pct": 0.339
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107282",
"label": "benign",
"label_confidence": 0.486,
"severity": "medium",
"timestamp": "2026-01-06T01:22:00Z",
"trace_id": "b6362545-8971-c70c-464e-e758d29e6add"
} | {
"account_age_days": 1116,
"account_id": "ACCT-2D6FDA504DA0",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.274
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 343,
"timestamp": "2026-01-06T01:22:00Z",
"transaction_amount_usd": 4625.51
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.569,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2931.69,
"financial_exposure_usd": 3201.17,
"recoverable_pct": 0.692
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109096",
"label": "benign",
"label_confidence": 0.686,
"severity": "low",
"timestamp": "2026-01-07T07:36:00Z",
"trace_id": "d7e80963-e886-58b6-643d-6808bc630a2a"
} | {
"account_age_days": 1980,
"account_id": "ACCT-4D0E7751FEA2",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.42
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 241,
"timestamp": "2026-01-07T03:37:00Z",
"transaction_amount_usd": 2.9
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.726,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 4970.19,
"financial_exposure_usd": 7085.4,
"recoverable_pct": 0.493
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100009",
"label": "fraudulent",
"label_confidence": 0.863,
"severity": "high",
"timestamp": "2026-01-01T00:09:00Z",
"trace_id": "cbd58bf6-1efd-76e9-ce37-14af99b49350"
} | {
"account_age_days": 1419,
"account_id": "ACCT-4B5305E517D2",
"baseline_risk_score": 0.508,
"kyc_tier": "tier_1",
"session_entropy": 0.288
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 778,
"timestamp": "2026-01-01T00:09:00Z",
"transaction_amount_usd": 41990.85
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.748,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 480109.62,
"financial_exposure_usd": 701959.5,
"recoverable_pct": 0.451
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106186",
"label": "fraudulent",
"label_confidence": 0.788,
"severity": "medium",
"timestamp": "2026-01-05T07:06:00Z",
"trace_id": "54b5dda4-57f0-c876-d805-815d925ed389"
} | {
"account_age_days": 9,
"account_id": "ACCT-6E88BF04C154",
"baseline_risk_score": 0.265,
"kyc_tier": "tier_1",
"session_entropy": 0.357
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 496,
"timestamp": "2026-01-05T07:06:00Z",
"transaction_amount_usd": 270567.81
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.699,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4195921.94,
"financial_exposure_usd": 4525864.6,
"recoverable_pct": 0.448
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100967",
"label": "fraudulent",
"label_confidence": 0.888,
"severity": "medium",
"timestamp": "2026-01-01T16:07:00Z",
"trace_id": "a8ffb81c-b98a-be5f-6cbf-31fb177be9e6"
} | {
"account_age_days": 465,
"account_id": "ACCT-643B0587EADC",
"baseline_risk_score": 0.402,
"kyc_tier": "tier_2",
"session_entropy": 0.891
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 532,
"timestamp": "2026-01-01T16:07:00Z",
"transaction_amount_usd": 34896.62
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.539,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 1421037.68,
"financial_exposure_usd": 1443741.69,
"recoverable_pct": 0.076
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108246",
"label": "benign",
"label_confidence": 0.718,
"severity": "medium",
"timestamp": "2026-01-06T17:26:00Z",
"trace_id": "e8dfa93b-7d51-32dd-8e64-d5191b842315"
} | {
"account_age_days": 1556,
"account_id": "ACCT-593A4D2F8F2F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.113
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 313,
"timestamp": "2026-01-06T17:26:00Z",
"transaction_amount_usd": 3393
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.537,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 2",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 399.28,
"financial_exposure_usd": 899.07,
"recoverable_pct": 0.886
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108785",
"label": "benign",
"label_confidence": 0.51,
"severity": "low",
"timestamp": "2026-01-07T02:25:00Z",
"trace_id": "d1a3eb0c-602d-3da0-4119-da0ac409ff87"
} | {
"account_age_days": 224,
"account_id": "ACCT-E5F2C92FCE27",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.113
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 390,
"timestamp": "2026-01-06T19:39:00Z",
"transaction_amount_usd": 7.05
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.728,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3296.34,
"financial_exposure_usd": 4951.26,
"recoverable_pct": 0.487
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102352",
"label": "fraudulent",
"label_confidence": 0.778,
"severity": "critical",
"timestamp": "2026-01-02T15:12:00Z",
"trace_id": "b4b849fe-4626-3c67-e9c6-6047e5fc5502"
} | {
"account_age_days": 401,
"account_id": "ACCT-A16B58BAD171",
"baseline_risk_score": 0.606,
"kyc_tier": "tier_1",
"session_entropy": 0.174
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 875,
"timestamp": "2026-01-02T15:12:00Z",
"transaction_amount_usd": 107058.97
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.383,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 613865.09,
"financial_exposure_usd": 680592.6,
"recoverable_pct": 0.466
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104496",
"label": "fraudulent",
"label_confidence": 0.676,
"severity": "high",
"timestamp": "2026-01-04T02:56:00Z",
"trace_id": "047dde26-a988-5f36-2433-2537834ff6e3"
} | {
"account_age_days": 1890,
"account_id": "ACCT-9B1E5EF52E67",
"baseline_risk_score": 0.177,
"kyc_tier": "tier_3",
"session_entropy": 0.307
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 564,
"timestamp": "2026-01-04T02:56:00Z",
"transaction_amount_usd": 1676306.17
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.768,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2250959.39,
"financial_exposure_usd": 2576009.5,
"recoverable_pct": 0.726
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104422",
"label": "fraudulent",
"label_confidence": 0.689,
"severity": "medium",
"timestamp": "2026-01-04T01:42:00Z",
"trace_id": "5aad1b29-90b9-23ce-58e7-19bbcd63fa9f"
} | {
"account_age_days": 1558,
"account_id": "ACCT-7B6909825D47",
"baseline_risk_score": 0.238,
"kyc_tier": "tier_3",
"session_entropy": 0.196
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 274,
"timestamp": "2026-01-04T01:42:00Z",
"transaction_amount_usd": 284586.09
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.496,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2143938.76,
"financial_exposure_usd": 2475214.61,
"recoverable_pct": 0.793
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104572",
"label": "fraudulent",
"label_confidence": 0.711,
"severity": "high",
"timestamp": "2026-01-04T04:12:00Z",
"trace_id": "56e0be89-f921-2167-707e-cd747b3c0467"
} | {
"account_age_days": 817,
"account_id": "ACCT-AAD27048A02C",
"baseline_risk_score": 0.271,
"kyc_tier": "tier_2",
"session_entropy": 0.203
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 252,
"timestamp": "2026-01-04T03:16:00Z",
"transaction_amount_usd": 14.02
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.891,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3285745.03,
"financial_exposure_usd": 6671852.43,
"recoverable_pct": 0.931
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107648",
"label": "benign",
"label_confidence": 0.605,
"severity": "critical",
"timestamp": "2026-01-06T07:28:00Z",
"trace_id": "2a8f8422-46df-7929-e989-40e375d3dcdb"
} | {
"account_age_days": 1595,
"account_id": "ACCT-DB2F804B0289",
"baseline_risk_score": 0.152,
"kyc_tier": "tier_2",
"session_entropy": 0.621
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 941,
"timestamp": "2026-01-06T07:28:00Z",
"transaction_amount_usd": 9519
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.635,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1353.64,
"financial_exposure_usd": 2406.41,
"recoverable_pct": 0.939
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102939",
"label": "fraudulent",
"label_confidence": 0.884,
"severity": "critical",
"timestamp": "2026-01-03T00:59:00Z",
"trace_id": "78111578-0c27-6a84-f4e9-bf62404b6a4d"
} | {
"account_age_days": 1853,
"account_id": "ACCT-C76FD5AB6A66",
"baseline_risk_score": 0.413,
"kyc_tier": "tier_2",
"session_entropy": 0.372
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 1045,
"timestamp": "2026-01-03T00:59:00Z",
"transaction_amount_usd": 21686.06
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.739,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 509178.04,
"financial_exposure_usd": 514396.21,
"recoverable_pct": 0.648
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108983",
"label": "benign",
"label_confidence": 0.673,
"severity": "medium",
"timestamp": "2026-01-07T05:43:00Z",
"trace_id": "a805d3e3-0ab5-ce1a-752d-5651213025a4"
} | {
"account_age_days": 1555,
"account_id": "ACCT-167392A27BD4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.527
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 179,
"timestamp": "2026-01-06T22:49:00Z",
"transaction_amount_usd": 16.68
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.487,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2817.14,
"financial_exposure_usd": 2939.2,
"recoverable_pct": 0.858
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107804",
"label": "benign",
"label_confidence": 0.74,
"severity": "high",
"timestamp": "2026-01-06T10:04:00Z",
"trace_id": "11e6d176-e02c-6215-1407-01e7ee509a0c"
} | {
"account_age_days": 216,
"account_id": "ACCT-FA72AF60662C",
"baseline_risk_score": 0.185,
"kyc_tier": "tier_2",
"session_entropy": 0.121
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 1103,
"timestamp": "2026-01-06T10:04:00Z",
"transaction_amount_usd": 615.07
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.675,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3492.55,
"financial_exposure_usd": 6317.47,
"recoverable_pct": 0.767
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108886",
"label": "benign",
"label_confidence": 0.594,
"severity": "low",
"timestamp": "2026-01-07T04:06:00Z",
"trace_id": "3dbd4ca2-ad71-4a57-6ab8-ac82fe5c1fd2"
} | {
"account_age_days": 1622,
"account_id": "ACCT-1C765CA82F9C",
"baseline_risk_score": 0.177,
"kyc_tier": "tier_2",
"session_entropy": 0.619
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 207,
"timestamp": "2026-01-07T01:07:00Z",
"transaction_amount_usd": 17.85
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.597,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 547.09,
"financial_exposure_usd": 746.9,
"recoverable_pct": 0.692
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104128",
"label": "fraudulent",
"label_confidence": 0.655,
"severity": "critical",
"timestamp": "2026-01-03T20:48:00Z",
"trace_id": "f0e0f9c3-5397-3891-1d60-9876a34cff62"
} | {
"account_age_days": 1162,
"account_id": "ACCT-452F1487FD8A",
"baseline_risk_score": 0.227,
"kyc_tier": "tier_1",
"session_entropy": 0.835
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 546,
"timestamp": "2026-01-03T20:48:00Z",
"transaction_amount_usd": 1131379.8
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.427,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3490571.38,
"financial_exposure_usd": 4042842.34,
"recoverable_pct": 0.564
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109014",
"label": "benign",
"label_confidence": 0.616,
"severity": "low",
"timestamp": "2026-01-07T06:14:00Z",
"trace_id": "ed711418-8af9-3e59-e639-ef1d28078709"
} | {
"account_age_days": 1149,
"account_id": "ACCT-197C44F382FB",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.641
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 987,
"timestamp": "2026-01-07T06:14:00Z",
"transaction_amount_usd": 10081.27
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.633,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2020.91,
"financial_exposure_usd": 2485.29,
"recoverable_pct": 0.994
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.