schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103017",
"label": "fraudulent",
"label_confidence": 0.92,
"severity": "high",
"timestamp": "2026-01-03T02:17:00Z",
"trace_id": "25fc8a05-b78b-0b65-9903-e621a9c07979"
} | {
"account_age_days": 1637,
"account_id": "ACCT-7BFAED2CDA4A",
"baseline_risk_score": 0.351,
"kyc_tier": "tier_2",
"session_entropy": 0.465
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 298,
"timestamp": "2026-01-02T16:39:00Z",
"transaction_amount_usd": 15.6
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.93,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 710102.06,
"financial_exposure_usd": 975310.81,
"recoverable_pct": 0.101
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109214",
"label": "benign",
"label_confidence": 0.613,
"severity": "low",
"timestamp": "2026-01-07T09:34:00Z",
"trace_id": "0dddfcf0-f80b-312f-e589-1a162a6bf04f"
} | {
"account_age_days": 1499,
"account_id": "ACCT-2F6FAE2D6DAA",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.514
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 454,
"timestamp": "2026-01-07T09:34:00Z",
"transaction_amount_usd": 4906.16
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.485,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 955.48,
"financial_exposure_usd": 1230.26,
"recoverable_pct": 0.501
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105883",
"label": "fraudulent",
"label_confidence": 0.911,
"severity": "medium",
"timestamp": "2026-01-05T02:03:00Z",
"trace_id": "70b4703d-b0ec-9f6a-baad-cc8d482b8abf"
} | {
"account_age_days": 516,
"account_id": "ACCT-4007A188D581",
"baseline_risk_score": 0.091,
"kyc_tier": "tier_1",
"session_entropy": 0.134
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 328,
"timestamp": "2026-01-04T13:43:00Z",
"transaction_amount_usd": 2.79
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.738,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2244762.32,
"financial_exposure_usd": 4898493.51,
"recoverable_pct": 0.474
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104144",
"label": "fraudulent",
"label_confidence": 0.624,
"severity": "high",
"timestamp": "2026-01-03T21:04:00Z",
"trace_id": "e9a0669c-fd69-53ac-c4fb-e186e37e2e71"
} | {
"account_age_days": 1900,
"account_id": "ACCT-FB5432496B26",
"baseline_risk_score": 0.163,
"kyc_tier": "tier_1",
"session_entropy": 0.364
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 86,
"timestamp": "2026-01-03T08:58:00Z",
"transaction_amount_usd": 23.34
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.736,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4081042.58,
"financial_exposure_usd": 7153896.88,
"recoverable_pct": 0.971
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101064",
"label": "fraudulent",
"label_confidence": 0.936,
"severity": "medium",
"timestamp": "2026-01-01T17:44:00Z",
"trace_id": "c4eaad2c-57f3-224d-ba6b-2015edfc6a45"
} | {
"account_age_days": 1534,
"account_id": "ACCT-B0D58F5E9A2F",
"baseline_risk_score": 0.502,
"kyc_tier": "tier_3",
"session_entropy": 0.389
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 366,
"timestamp": "2026-01-01T12:57:00Z",
"transaction_amount_usd": 17.25
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.52,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 9",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 467894.62,
"financial_exposure_usd": 787594.24,
"recoverable_pct": 0.523
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109310",
"label": "benign",
"label_confidence": 0.684,
"severity": "high",
"timestamp": "2026-01-07T11:10:00Z",
"trace_id": "bae49482-88f9-277d-32eb-0b2d68129eef"
} | {
"account_age_days": 1394,
"account_id": "ACCT-1A0806A81493",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.624
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 1015,
"timestamp": "2026-01-07T11:10:00Z",
"transaction_amount_usd": 7827.54
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.504,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3810.25,
"financial_exposure_usd": 4173.02,
"recoverable_pct": 0.791
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108629",
"label": "benign",
"label_confidence": 0.695,
"severity": "low",
"timestamp": "2026-01-06T23:49:00Z",
"trace_id": "7659c426-15ae-26df-0533-730e771f866e"
} | {
"account_age_days": 1947,
"account_id": "ACCT-F25E49423C9E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.306
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 675,
"timestamp": "2026-01-06T23:49:00Z",
"transaction_amount_usd": 4824.63
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.785,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1361.19,
"financial_exposure_usd": 2615.3,
"recoverable_pct": 0.501
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106941",
"label": "benign",
"label_confidence": 0.583,
"severity": "high",
"timestamp": "2026-01-05T19:41:00Z",
"trace_id": "a1cd2ae2-f906-1d2f-ad3a-17e2613fba4e"
} | {
"account_age_days": 1500,
"account_id": "ACCT-E869A80EDABE",
"baseline_risk_score": 0.065,
"kyc_tier": "tier_3",
"session_entropy": 0.934
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 587,
"timestamp": "2026-01-05T19:41:00Z",
"transaction_amount_usd": 11479.92
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.495,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2730.34,
"financial_exposure_usd": 3486.93,
"recoverable_pct": 0.457
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103902",
"label": "fraudulent",
"label_confidence": 0.921,
"severity": "low",
"timestamp": "2026-01-03T17:02:00Z",
"trace_id": "f14c1ea2-05de-6f07-613f-55f51ddf07e4"
} | {
"account_age_days": 24,
"account_id": "ACCT-94F191787A3B",
"baseline_risk_score": 0.123,
"kyc_tier": "tier_3",
"session_entropy": 0.775
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 104,
"timestamp": "2026-01-03T17:02:00Z",
"transaction_amount_usd": 2893412.63
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.714,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2029247.39,
"financial_exposure_usd": 2643185.45,
"recoverable_pct": 0.54
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102343",
"label": "fraudulent",
"label_confidence": 0.841,
"severity": "critical",
"timestamp": "2026-01-02T15:03:00Z",
"trace_id": "a59de50d-c672-9dea-02a2-afd85014d4f4"
} | {
"account_age_days": 1200,
"account_id": "ACCT-4BA6FB5B6981",
"baseline_risk_score": 0.53,
"kyc_tier": "tier_3",
"session_entropy": 0.411
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 949,
"timestamp": "2026-01-02T15:03:00Z",
"transaction_amount_usd": 69193.49
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.409,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 458327.76,
"financial_exposure_usd": 669496.11,
"recoverable_pct": 0.085
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108571",
"label": "benign",
"label_confidence": 0.741,
"severity": "low",
"timestamp": "2026-01-06T22:51:00Z",
"trace_id": "928a7ce6-dc12-a8da-e748-46945d05234c"
} | {
"account_age_days": 1840,
"account_id": "ACCT-281B5B3374B0",
"baseline_risk_score": 0.097,
"kyc_tier": "tier_3",
"session_entropy": 0.914
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 81,
"timestamp": "2026-01-06T10:33:00Z",
"transaction_amount_usd": 24.72
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.454,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 529.83,
"financial_exposure_usd": 773.25,
"recoverable_pct": 0.779
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102111",
"label": "fraudulent",
"label_confidence": 0.825,
"severity": "critical",
"timestamp": "2026-01-02T11:11:00Z",
"trace_id": "4394c9cf-424f-e84b-9501-6cf535c0a6dd"
} | {
"account_age_days": 366,
"account_id": "ACCT-94CCB0FC2591",
"baseline_risk_score": 0.371,
"kyc_tier": "tier_1",
"session_entropy": 0.4
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "DE",
"latency_ms": 214,
"timestamp": "2026-01-02T11:11:00Z",
"transaction_amount_usd": 62658.61
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.735,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 388638.78,
"financial_exposure_usd": 902508.68,
"recoverable_pct": 0.404
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109441",
"label": "benign",
"label_confidence": 0.509,
"severity": "low",
"timestamp": "2026-01-07T13:21:00Z",
"trace_id": "01ab6112-b423-8989-333b-e6fb78e9211b"
} | {
"account_age_days": 1118,
"account_id": "ACCT-73EB3228C8A2",
"baseline_risk_score": 0.098,
"kyc_tier": "tier_2",
"session_entropy": 0.324
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 133,
"timestamp": "2026-01-07T04:58:00Z",
"transaction_amount_usd": 10.41
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.791,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 584.1,
"financial_exposure_usd": 1438.24,
"recoverable_pct": 0.91
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100627",
"label": "fraudulent",
"label_confidence": 0.875,
"severity": "critical",
"timestamp": "2026-01-01T10:27:00Z",
"trace_id": "1a84b79b-e079-b05a-bb50-b2c2b622a25a"
} | {
"account_age_days": 1377,
"account_id": "ACCT-35783061CB00",
"baseline_risk_score": 0.572,
"kyc_tier": "tier_2",
"session_entropy": 0.479
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 365,
"timestamp": "2026-01-01T06:34:00Z",
"transaction_amount_usd": 4.25
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.51,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 244178.85,
"financial_exposure_usd": 418315.47,
"recoverable_pct": 0.311
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100920",
"label": "fraudulent",
"label_confidence": 0.905,
"severity": "high",
"timestamp": "2026-01-01T15:20:00Z",
"trace_id": "e976beca-64d3-c064-9b20-936e8182168e"
} | {
"account_age_days": 858,
"account_id": "ACCT-7E4ED23F82EA",
"baseline_risk_score": 0.403,
"kyc_tier": "tier_1",
"session_entropy": 0.822
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 1067,
"timestamp": "2026-01-01T15:20:00Z",
"transaction_amount_usd": 103302.6
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.633,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 814620.05,
"financial_exposure_usd": 1011153.3,
"recoverable_pct": 0.529
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104084",
"label": "fraudulent",
"label_confidence": 0.911,
"severity": "high",
"timestamp": "2026-01-03T20:04:00Z",
"trace_id": "434b0dfc-2680-7441-3f9a-b1251222b6bb"
} | {
"account_age_days": 247,
"account_id": "ACCT-6A660DD34DA3",
"baseline_risk_score": 0.424,
"kyc_tier": "tier_1",
"session_entropy": 0.738
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 641,
"timestamp": "2026-01-03T20:04:00Z",
"transaction_amount_usd": 471241.07
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.844,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3248435.21,
"financial_exposure_usd": 4532744.8,
"recoverable_pct": 0.735
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101944",
"label": "fraudulent",
"label_confidence": 0.892,
"severity": "critical",
"timestamp": "2026-01-02T08:24:00Z",
"trace_id": "5d7ee5c4-4d48-7adb-d08d-1dba7af45514"
} | {
"account_age_days": 1373,
"account_id": "ACCT-843E32F3F9A3",
"baseline_risk_score": 0.444,
"kyc_tier": "tier_3",
"session_entropy": 0.413
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 334,
"timestamp": "2026-01-02T01:59:00Z",
"transaction_amount_usd": 0.03
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.444,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 209376.59,
"financial_exposure_usd": 488321.65,
"recoverable_pct": 0.704
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105334",
"label": "fraudulent",
"label_confidence": 0.79,
"severity": "medium",
"timestamp": "2026-01-04T16:54:00Z",
"trace_id": "fb664060-5eac-0cfe-d51c-e8a51cc1532d"
} | {
"account_age_days": 1765,
"account_id": "ACCT-D09B5ACB1A3B",
"baseline_risk_score": 0.201,
"kyc_tier": "tier_3",
"session_entropy": 0.885
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 307,
"timestamp": "2026-01-04T12:36:00Z",
"transaction_amount_usd": 24.41
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.438,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2159061.35,
"financial_exposure_usd": 3249577.58,
"recoverable_pct": 0.982
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107121",
"label": "benign",
"label_confidence": 0.627,
"severity": "medium",
"timestamp": "2026-01-05T22:41:00Z",
"trace_id": "90fadb23-1eae-4083-12a5-6a09558d117f"
} | {
"account_age_days": 1585,
"account_id": "ACCT-56B3645F1D6E",
"baseline_risk_score": 0.117,
"kyc_tier": "tier_3",
"session_entropy": 0.948
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 395,
"timestamp": "2026-01-05T15:00:00Z",
"transaction_amount_usd": 20.77
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.507,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2463.79,
"financial_exposure_usd": 4853.56,
"recoverable_pct": 0.537
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107931",
"label": "benign",
"label_confidence": 0.748,
"severity": "high",
"timestamp": "2026-01-06T12:11:00Z",
"trace_id": "0892efed-8d0a-93b9-3870-80846d2cb200"
} | {
"account_age_days": 156,
"account_id": "ACCT-81C57DF9146E",
"baseline_risk_score": 0.128,
"kyc_tier": "tier_1",
"session_entropy": 0.927
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 1091,
"timestamp": "2026-01-06T12:11:00Z",
"transaction_amount_usd": 14748.66
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.713,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2693.22,
"financial_exposure_usd": 3194.56,
"recoverable_pct": 0.651
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106658",
"label": "fraudulent",
"label_confidence": 0.77,
"severity": "medium",
"timestamp": "2026-01-05T14:58:00Z",
"trace_id": "95b781b7-67c5-c2c3-d6eb-0f5618ed4e1e"
} | {
"account_age_days": 1582,
"account_id": "ACCT-00CDE6BAE1E0",
"baseline_risk_score": 0.422,
"kyc_tier": "tier_1",
"session_entropy": 0.937
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 163,
"timestamp": "2026-01-05T04:33:00Z",
"transaction_amount_usd": 8.81
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.539,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4172666.11,
"financial_exposure_usd": 6372566.68,
"recoverable_pct": 0.481
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101775",
"label": "fraudulent",
"label_confidence": 0.899,
"severity": "medium",
"timestamp": "2026-01-02T05:35:00Z",
"trace_id": "8326ca99-4174-63dd-bab1-462528ffca55"
} | {
"account_age_days": 1072,
"account_id": "ACCT-F845A7C9C2DF",
"baseline_risk_score": 0.386,
"kyc_tier": "tier_3",
"session_entropy": 0.481
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "DE",
"latency_ms": 1000,
"timestamp": "2026-01-02T05:35:00Z",
"transaction_amount_usd": 637.01
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.393,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 938196.57,
"financial_exposure_usd": 1348043.16,
"recoverable_pct": 0.118
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107094",
"label": "benign",
"label_confidence": 0.59,
"severity": "low",
"timestamp": "2026-01-05T22:14:00Z",
"trace_id": "0624bc31-d440-2231-24a1-f347ce7ea402"
} | {
"account_age_days": 482,
"account_id": "ACCT-51DEC5354E6D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.638
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 346,
"timestamp": "2026-01-05T22:14:00Z",
"transaction_amount_usd": 14869.24
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.472,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3627.75,
"financial_exposure_usd": 3890.56,
"recoverable_pct": 0.978
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100108",
"label": "fraudulent",
"label_confidence": 0.842,
"severity": "critical",
"timestamp": "2026-01-01T01:48:00Z",
"trace_id": "1db3c075-6fb9-de37-7796-048fb4b9fb73"
} | {
"account_age_days": 185,
"account_id": "ACCT-C5583A17F70D",
"baseline_risk_score": 0.403,
"kyc_tier": "tier_1",
"session_entropy": 0.836
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 155,
"timestamp": "2025-12-31T16:57:00Z",
"transaction_amount_usd": 11.44
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.448,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 416567.61,
"financial_exposure_usd": 729589.63,
"recoverable_pct": 0.64
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101800",
"label": "fraudulent",
"label_confidence": 0.835,
"severity": "medium",
"timestamp": "2026-01-02T06:00:00Z",
"trace_id": "575f3187-9524-d7d3-18f9-0f210a0a4db0"
} | {
"account_age_days": 1942,
"account_id": "ACCT-509736FF3CAC",
"baseline_risk_score": 0.516,
"kyc_tier": "tier_1",
"session_entropy": 0.745
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 851,
"timestamp": "2026-01-02T06:00:00Z",
"transaction_amount_usd": 74429.94
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.566,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 126783.76,
"financial_exposure_usd": 217575.53,
"recoverable_pct": 0.296
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101837",
"label": "fraudulent",
"label_confidence": 0.767,
"severity": "critical",
"timestamp": "2026-01-02T06:37:00Z",
"trace_id": "ba7bfea2-3823-eb5c-4b71-6ac247788371"
} | {
"account_age_days": 181,
"account_id": "ACCT-D8F8B369C813",
"baseline_risk_score": 0.35,
"kyc_tier": "tier_2",
"session_entropy": 0.57
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 1117,
"timestamp": "2026-01-02T06:37:00Z",
"transaction_amount_usd": 57390.06
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.559,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 810924.83,
"financial_exposure_usd": 919090.73,
"recoverable_pct": 0.233
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102387",
"label": "fraudulent",
"label_confidence": 0.784,
"severity": "high",
"timestamp": "2026-01-02T15:47:00Z",
"trace_id": "dc699678-3fe2-c214-f4e6-69fd1a779682"
} | {
"account_age_days": 1755,
"account_id": "ACCT-EE62C6D8D450",
"baseline_risk_score": 0.494,
"kyc_tier": "tier_2",
"session_entropy": 0.295
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 92,
"timestamp": "2026-01-02T14:35:00Z",
"transaction_amount_usd": 8.6
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.628,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 627731.37,
"financial_exposure_usd": 984746.46,
"recoverable_pct": 0.424
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103715",
"label": "fraudulent",
"label_confidence": 0.715,
"severity": "high",
"timestamp": "2026-01-03T13:55:00Z",
"trace_id": "42fdc46d-0dcb-04d3-f728-f695794dbb56"
} | {
"account_age_days": 1460,
"account_id": "ACCT-9F1FCA303E02",
"baseline_risk_score": 0.102,
"kyc_tier": "tier_3",
"session_entropy": 0.885
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 525,
"timestamp": "2026-01-03T13:55:00Z",
"transaction_amount_usd": 676709.52
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.915,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3315990.45,
"financial_exposure_usd": 4468480.57,
"recoverable_pct": 0.56
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100810",
"label": "fraudulent",
"label_confidence": 0.763,
"severity": "high",
"timestamp": "2026-01-01T13:30:00Z",
"trace_id": "9a5ffbb9-1ee1-54b6-7be4-297bdc67c7fa"
} | {
"account_age_days": 1535,
"account_id": "ACCT-38FA8EC4C530",
"baseline_risk_score": 0.256,
"kyc_tier": "tier_2",
"session_entropy": 0.343
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 1186,
"timestamp": "2026-01-01T13:30:00Z",
"transaction_amount_usd": 35944.94
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.397,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 199009.84,
"financial_exposure_usd": 412548.44,
"recoverable_pct": 0.181
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106581",
"label": "fraudulent",
"label_confidence": 0.736,
"severity": "medium",
"timestamp": "2026-01-05T13:41:00Z",
"trace_id": "d0ab69c7-275a-127a-81c1-8f8dd269a5ef"
} | {
"account_age_days": 663,
"account_id": "ACCT-20A0E6C17D56",
"baseline_risk_score": 0.104,
"kyc_tier": "tier_2",
"session_entropy": 0.296
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 528,
"timestamp": "2026-01-05T13:41:00Z",
"transaction_amount_usd": 445785.83
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.86,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 414276.5,
"financial_exposure_usd": 735625.82,
"recoverable_pct": 0.422
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105549",
"label": "fraudulent",
"label_confidence": 0.812,
"severity": "medium",
"timestamp": "2026-01-04T20:29:00Z",
"trace_id": "a771b7d4-c5af-3af4-c468-8cb4c7ab72f5"
} | {
"account_age_days": 66,
"account_id": "ACCT-99FD319A298E",
"baseline_risk_score": 0.071,
"kyc_tier": "tier_2",
"session_entropy": 0.453
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 437,
"timestamp": "2026-01-04T20:29:00Z",
"transaction_amount_usd": 1598291.6
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.47,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 7392841.57,
"financial_exposure_usd": 8052075.39,
"recoverable_pct": 0.731
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100606",
"label": "fraudulent",
"label_confidence": 0.768,
"severity": "medium",
"timestamp": "2026-01-01T10:06:00Z",
"trace_id": "5afbadd8-4509-d4f8-1377-0b12985d37b8"
} | {
"account_age_days": 759,
"account_id": "ACCT-83E504A9462F",
"baseline_risk_score": 0.506,
"kyc_tier": "tier_2",
"session_entropy": 0.487
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 1170,
"timestamp": "2026-01-01T10:06:00Z",
"transaction_amount_usd": 28731.02
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.821,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 3",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 764839.83,
"financial_exposure_usd": 799486.56,
"recoverable_pct": 0.643
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102665",
"label": "fraudulent",
"label_confidence": 0.947,
"severity": "medium",
"timestamp": "2026-01-02T20:25:00Z",
"trace_id": "52d45fee-727a-91be-485d-64575cad2a4e"
} | {
"account_age_days": 1414,
"account_id": "ACCT-C7EBED0BE9C5",
"baseline_risk_score": 0.361,
"kyc_tier": "tier_1",
"session_entropy": 0.195
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 366,
"timestamp": "2026-01-02T20:25:00Z",
"transaction_amount_usd": 16919.26
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.782,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 492757.47,
"financial_exposure_usd": 1004561.08,
"recoverable_pct": 0.784
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103142",
"label": "fraudulent",
"label_confidence": 0.918,
"severity": "critical",
"timestamp": "2026-01-03T04:22:00Z",
"trace_id": "02bae28c-5d11-9244-d9a5-d7b595a37af5"
} | {
"account_age_days": 1823,
"account_id": "ACCT-845513B3AB61",
"baseline_risk_score": 0.608,
"kyc_tier": "tier_2",
"session_entropy": 0.142
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 864,
"timestamp": "2026-01-03T04:22:00Z",
"transaction_amount_usd": 9921.87
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.479,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 991514.24,
"financial_exposure_usd": 994302.67,
"recoverable_pct": 0.615
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108564",
"label": "benign",
"label_confidence": 0.73,
"severity": "high",
"timestamp": "2026-01-06T22:44:00Z",
"trace_id": "56fe25b4-a3ab-828d-618c-dc3d303493c6"
} | {
"account_age_days": 1768,
"account_id": "ACCT-110B04B9F75F",
"baseline_risk_score": 0.123,
"kyc_tier": "tier_2",
"session_entropy": 0.31
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 740,
"timestamp": "2026-01-06T22:44:00Z",
"transaction_amount_usd": 9583.31
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.536,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3277.72,
"financial_exposure_usd": 3424.65,
"recoverable_pct": 0.659
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102427",
"label": "fraudulent",
"label_confidence": 0.825,
"severity": "high",
"timestamp": "2026-01-02T16:27:00Z",
"trace_id": "e774c060-a0bd-7cdc-5ed2-ed6c6466bf98"
} | {
"account_age_days": 1140,
"account_id": "ACCT-E9F245794F46",
"baseline_risk_score": 0.32,
"kyc_tier": "tier_1",
"session_entropy": 0.473
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 510,
"timestamp": "2026-01-02T16:27:00Z",
"transaction_amount_usd": 76554.97
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.746,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 250019.77,
"financial_exposure_usd": 459584.46,
"recoverable_pct": 0.529
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100104",
"label": "fraudulent",
"label_confidence": 0.972,
"severity": "critical",
"timestamp": "2026-01-01T01:44:00Z",
"trace_id": "a89ea4df-471c-10ae-cdb4-adabca27cd69"
} | {
"account_age_days": 1929,
"account_id": "ACCT-BD4C938CD76A",
"baseline_risk_score": 0.258,
"kyc_tier": "tier_1",
"session_entropy": 0.663
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 240,
"timestamp": "2025-12-31T15:57:00Z",
"transaction_amount_usd": 0.5
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.502,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 268856.46,
"financial_exposure_usd": 459143.3,
"recoverable_pct": 0.815
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105412",
"label": "fraudulent",
"label_confidence": 0.911,
"severity": "high",
"timestamp": "2026-01-04T18:12:00Z",
"trace_id": "2276f2c1-bc3a-83e7-93d5-940f41416a5c"
} | {
"account_age_days": 1783,
"account_id": "ACCT-4D1754F78675",
"baseline_risk_score": 0.186,
"kyc_tier": "tier_1",
"session_entropy": 0.852
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 266,
"timestamp": "2026-01-04T11:57:00Z",
"transaction_amount_usd": 14.86
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POST... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.661,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 947826.52,
"financial_exposure_usd": 1996214.08,
"recoverable_pct": 0.752
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107257",
"label": "benign",
"label_confidence": 0.627,
"severity": "low",
"timestamp": "2026-01-06T00:57:00Z",
"trace_id": "fe3d8ea8-1533-a992-f748-a617567a38fe"
} | {
"account_age_days": 567,
"account_id": "ACCT-B501CB96F5A3",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.289
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 463,
"timestamp": "2026-01-06T00:57:00Z",
"transaction_amount_usd": 14848.26
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.744,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1916.02,
"financial_exposure_usd": 4339.69,
"recoverable_pct": 0.501
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101594",
"label": "fraudulent",
"label_confidence": 0.837,
"severity": "critical",
"timestamp": "2026-01-02T02:34:00Z",
"trace_id": "dc74a207-3cbf-2998-4e15-98ecc9541d91"
} | {
"account_age_days": 336,
"account_id": "ACCT-B61637CE7132",
"baseline_risk_score": 0.503,
"kyc_tier": "tier_1",
"session_entropy": 0.175
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 205,
"timestamp": "2026-01-01T17:02:00Z",
"transaction_amount_usd": 4.77
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.647,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 496744.11,
"financial_exposure_usd": 626416.81,
"recoverable_pct": 0.838
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105318",
"label": "fraudulent",
"label_confidence": 0.724,
"severity": "medium",
"timestamp": "2026-01-04T16:38:00Z",
"trace_id": "b42c60e5-e03f-2c34-fdba-62640784f92d"
} | {
"account_age_days": 1285,
"account_id": "ACCT-9568D4951536",
"baseline_risk_score": 0.219,
"kyc_tier": "tier_1",
"session_entropy": 0.812
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 213,
"timestamp": "2026-01-04T12:34:00Z",
"transaction_amount_usd": 20.96
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.723,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1888001.11,
"financial_exposure_usd": 4628363.4,
"recoverable_pct": 0.408
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106651",
"label": "fraudulent",
"label_confidence": 0.757,
"severity": "high",
"timestamp": "2026-01-05T14:51:00Z",
"trace_id": "216beab3-3ed0-99d1-cf8c-4bcc2f155a1e"
} | {
"account_age_days": 519,
"account_id": "ACCT-3D39D8C55170",
"baseline_risk_score": 0.321,
"kyc_tier": "tier_3",
"session_entropy": 0.535
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 1048,
"timestamp": "2026-01-05T14:51:00Z",
"transaction_amount_usd": 1731420.05
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.561,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2016416.88,
"financial_exposure_usd": 4033502.03,
"recoverable_pct": 0.987
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100524",
"label": "fraudulent",
"label_confidence": 0.815,
"severity": "high",
"timestamp": "2026-01-01T08:44:00Z",
"trace_id": "fc3b7a0b-da6d-7a6d-8686-7a7792181d0d"
} | {
"account_age_days": 234,
"account_id": "ACCT-9B8BF42CE915",
"baseline_risk_score": 0.291,
"kyc_tier": "tier_2",
"session_entropy": 0.33
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 212,
"timestamp": "2026-01-01T06:22:00Z",
"transaction_amount_usd": 8.43
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.521,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 500035.11,
"financial_exposure_usd": 943748.33,
"recoverable_pct": 0.436
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105393",
"label": "fraudulent",
"label_confidence": 0.714,
"severity": "medium",
"timestamp": "2026-01-04T17:53:00Z",
"trace_id": "3e07ae95-9d01-5000-05d5-8810d1096f52"
} | {
"account_age_days": 1092,
"account_id": "ACCT-98B6291B6C5C",
"baseline_risk_score": 0.262,
"kyc_tier": "tier_1",
"session_entropy": 0.737
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 1036,
"timestamp": "2026-01-04T17:53:00Z",
"transaction_amount_usd": 755493.42
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.635,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3492375.42,
"financial_exposure_usd": 3764061.76,
"recoverable_pct": 0.841
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108404",
"label": "benign",
"label_confidence": 0.68,
"severity": "low",
"timestamp": "2026-01-06T20:04:00Z",
"trace_id": "ffd20dd3-55a5-d787-58dd-7b3dbefcdbe1"
} | {
"account_age_days": 620,
"account_id": "ACCT-99A0F0FDB144",
"baseline_risk_score": 0.105,
"kyc_tier": "tier_2",
"session_entropy": 0.458
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 167,
"timestamp": "2026-01-06T20:04:00Z",
"transaction_amount_usd": 12790.88
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.557,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1482.77,
"financial_exposure_usd": 3463.29,
"recoverable_pct": 0.569
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106931",
"label": "benign",
"label_confidence": 0.678,
"severity": "medium",
"timestamp": "2026-01-05T19:31:00Z",
"trace_id": "7ccff871-7ed7-1305-8e26-9360ca33939a"
} | {
"account_age_days": 504,
"account_id": "ACCT-CF09BD4071C4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.139
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 649,
"timestamp": "2026-01-05T19:31:00Z",
"transaction_amount_usd": 7578.95
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.51,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 3274.33,
"financial_exposure_usd": 3409.31,
"recoverable_pct": 0.914
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101776",
"label": "fraudulent",
"label_confidence": 0.762,
"severity": "medium",
"timestamp": "2026-01-02T05:36:00Z",
"trace_id": "02d8b9dd-3b38-79ea-1512-01e6792a59a7"
} | {
"account_age_days": 1290,
"account_id": "ACCT-863B73B808C6",
"baseline_risk_score": 0.369,
"kyc_tier": "tier_2",
"session_entropy": 0.276
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 323,
"timestamp": "2026-01-02T05:36:00Z",
"transaction_amount_usd": 47518.58
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.621,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 846330.78,
"financial_exposure_usd": 938648.35,
"recoverable_pct": 0.377
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101240",
"label": "fraudulent",
"label_confidence": 0.962,
"severity": "critical",
"timestamp": "2026-01-01T20:40:00Z",
"trace_id": "50209b3b-5075-36b5-160f-fc1a96fb7cac"
} | {
"account_age_days": 644,
"account_id": "ACCT-95B84E7AB160",
"baseline_risk_score": 0.401,
"kyc_tier": "tier_3",
"session_entropy": 0.35
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 313,
"timestamp": "2026-01-01T10:36:00Z",
"transaction_amount_usd": 5.8
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.545,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 841348.27,
"financial_exposure_usd": 914485.86,
"recoverable_pct": 0.31
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107213",
"label": "benign",
"label_confidence": 0.569,
"severity": "low",
"timestamp": "2026-01-06T00:13:00Z",
"trace_id": "51430834-e70f-e02b-4962-c06d030114a6"
} | {
"account_age_days": 477,
"account_id": "ACCT-3E8F0B5A0968",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.56
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 745,
"timestamp": "2026-01-06T00:13:00Z",
"transaction_amount_usd": 3492.09
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.665,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1047.54,
"financial_exposure_usd": 1474.6,
"recoverable_pct": 0.752
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102776",
"label": "fraudulent",
"label_confidence": 0.808,
"severity": "low",
"timestamp": "2026-01-02T22:16:00Z",
"trace_id": "f6dd4324-6ae6-9fb8-629e-1250b9cbcf5e"
} | {
"account_age_days": 1553,
"account_id": "ACCT-BB5BF9F8CAF9",
"baseline_risk_score": 0.543,
"kyc_tier": "tier_2",
"session_entropy": 0.804
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "US",
"latency_ms": 918,
"timestamp": "2026-01-02T22:16:00Z",
"transaction_amount_usd": 88042.43
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.917,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 1242822.4,
"financial_exposure_usd": 1266229.68,
"recoverable_pct": 0.615
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101255",
"label": "fraudulent",
"label_confidence": 0.806,
"severity": "critical",
"timestamp": "2026-01-01T20:55:00Z",
"trace_id": "cc5191c4-db09-e2c4-1b90-0d9f1cc7aaf2"
} | {
"account_age_days": 1101,
"account_id": "ACCT-5979D88B430F",
"baseline_risk_score": 0.433,
"kyc_tier": "tier_3",
"session_entropy": 0.358
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 361,
"timestamp": "2026-01-01T20:55:00Z",
"transaction_amount_usd": 94869.92
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.598,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 436122.96,
"financial_exposure_usd": 710145.36,
"recoverable_pct": 0.403
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100215",
"label": "fraudulent",
"label_confidence": 0.921,
"severity": "critical",
"timestamp": "2026-01-01T03:35:00Z",
"trace_id": "6ae06e01-47ac-aec9-137b-41c25f7131e1"
} | {
"account_age_days": 1683,
"account_id": "ACCT-9919BE9116A2",
"baseline_risk_score": 0.536,
"kyc_tier": "tier_2",
"session_entropy": 0.412
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 141,
"timestamp": "2025-12-31T15:23:00Z",
"transaction_amount_usd": 6.57
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.448,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 151814.65,
"financial_exposure_usd": 181657.49,
"recoverable_pct": 0.46
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105038",
"label": "fraudulent",
"label_confidence": 0.792,
"severity": "medium",
"timestamp": "2026-01-04T11:58:00Z",
"trace_id": "3b0f91d4-675a-49a4-d5a3-f6586110508a"
} | {
"account_age_days": 1355,
"account_id": "ACCT-51A559E85043",
"baseline_risk_score": 0.347,
"kyc_tier": "tier_3",
"session_entropy": 0.885
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 920,
"timestamp": "2026-01-04T11:58:00Z",
"transaction_amount_usd": 2351852.72
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.923,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 9080413.29,
"financial_exposure_usd": 9406312.16,
"recoverable_pct": 0.763
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100286",
"label": "fraudulent",
"label_confidence": 0.944,
"severity": "critical",
"timestamp": "2026-01-01T04:46:00Z",
"trace_id": "b7a7d1ba-c6e4-3494-5e31-7e803d56400b"
} | {
"account_age_days": 1021,
"account_id": "ACCT-7F808DBCADC0",
"baseline_risk_score": 0.354,
"kyc_tier": "tier_1",
"session_entropy": 0.141
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 622,
"timestamp": "2026-01-01T04:46:00Z",
"transaction_amount_usd": 32250.56
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.872,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 593705.18,
"financial_exposure_usd": 728561.48,
"recoverable_pct": 0.349
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106461",
"label": "fraudulent",
"label_confidence": 0.71,
"severity": "low",
"timestamp": "2026-01-05T11:41:00Z",
"trace_id": "76c2b407-8dfe-4831-b30f-9c10a3bda08d"
} | {
"account_age_days": 1928,
"account_id": "ACCT-1A69022AD9AE",
"baseline_risk_score": 0.111,
"kyc_tier": "tier_1",
"session_entropy": 0.729
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 206,
"timestamp": "2026-01-05T04:10:00Z",
"transaction_amount_usd": 20.74
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.557,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 6940772.62,
"financial_exposure_usd": 7306864.73,
"recoverable_pct": 0.868
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107634",
"label": "benign",
"label_confidence": 0.75,
"severity": "medium",
"timestamp": "2026-01-06T07:14:00Z",
"trace_id": "2de4fe6e-de67-202d-55ae-941569fbcebd"
} | {
"account_age_days": 1090,
"account_id": "ACCT-CCA698A2E70C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.685
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 494,
"timestamp": "2026-01-06T07:14:00Z",
"transaction_amount_usd": 2820.54
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.664,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2017.06,
"financial_exposure_usd": 2588.91,
"recoverable_pct": 0.836
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107595",
"label": "benign",
"label_confidence": 0.671,
"severity": "high",
"timestamp": "2026-01-06T06:35:00Z",
"trace_id": "50776862-ce17-98be-b6dd-1ed5d072e1e1"
} | {
"account_age_days": 1667,
"account_id": "ACCT-18E2946D4DA4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.883
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 181,
"timestamp": "2026-01-05T21:26:00Z",
"transaction_amount_usd": 4.61
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.49,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 4835.85,
"financial_exposure_usd": 6111.57,
"recoverable_pct": 0.629
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109012",
"label": "benign",
"label_confidence": 0.494,
"severity": "low",
"timestamp": "2026-01-07T06:12:00Z",
"trace_id": "86a83a68-2914-2cd7-9767-08856e21a62c"
} | {
"account_age_days": 1638,
"account_id": "ACCT-C92B3E5BEAD1",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.526
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 138,
"timestamp": "2026-01-07T04:08:00Z",
"transaction_amount_usd": 14.53
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.73,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 633.79,
"financial_exposure_usd": 1379.47,
"recoverable_pct": 0.725
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105513",
"label": "fraudulent",
"label_confidence": 0.774,
"severity": "medium",
"timestamp": "2026-01-04T19:53:00Z",
"trace_id": "7120d3ca-594d-f804-d980-79b69da05297"
} | {
"account_age_days": 1867,
"account_id": "ACCT-8BBB0D467F7B",
"baseline_risk_score": 0.349,
"kyc_tier": "tier_2",
"session_entropy": 0.832
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 211,
"timestamp": "2026-01-04T19:53:00Z",
"transaction_amount_usd": 516716.34
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.481,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3382426.87,
"financial_exposure_usd": 6614708.41,
"recoverable_pct": 0.44
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104226",
"label": "fraudulent",
"label_confidence": 0.899,
"severity": "critical",
"timestamp": "2026-01-03T22:26:00Z",
"trace_id": "8b763cd9-eb8b-7cbd-4ee2-ee8a49ee825f"
} | {
"account_age_days": 198,
"account_id": "ACCT-01DC27469A84",
"baseline_risk_score": 0.111,
"kyc_tier": "tier_3",
"session_entropy": 0.335
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 830,
"timestamp": "2026-01-03T22:26:00Z",
"transaction_amount_usd": 55851.42
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.731,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 5836118,
"financial_exposure_usd": 6257465.35,
"recoverable_pct": 0.652
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108111",
"label": "benign",
"label_confidence": 0.698,
"severity": "low",
"timestamp": "2026-01-06T15:11:00Z",
"trace_id": "3a40cc86-1ef3-7726-d0dd-be684bb91b4f"
} | {
"account_age_days": 1337,
"account_id": "ACCT-388BA948BDEE",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.146
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 865,
"timestamp": "2026-01-06T15:11:00Z",
"transaction_amount_usd": 11933.63
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.722,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 4738.63,
"financial_exposure_usd": 6759.15,
"recoverable_pct": 0.788
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107927",
"label": "benign",
"label_confidence": 0.466,
"severity": "medium",
"timestamp": "2026-01-06T12:07:00Z",
"trace_id": "4ddebe65-8870-baa1-b244-474f7be18116"
} | {
"account_age_days": 31,
"account_id": "ACCT-983E21D9C4C7",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.301
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 247,
"timestamp": "2026-01-06T05:16:00Z",
"transaction_amount_usd": 11.96
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.489,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 743.72,
"financial_exposure_usd": 1070.36,
"recoverable_pct": 0.663
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109268",
"label": "benign",
"label_confidence": 0.692,
"severity": "medium",
"timestamp": "2026-01-07T10:28:00Z",
"trace_id": "9a4fe829-09ba-87ea-3b72-2410150f773f"
} | {
"account_age_days": 1698,
"account_id": "ACCT-7BBD6E750896",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.221
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 590,
"timestamp": "2026-01-07T10:28:00Z",
"transaction_amount_usd": 3665.3
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.713,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3358.89,
"financial_exposure_usd": 4458.8,
"recoverable_pct": 0.82
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103763",
"label": "fraudulent",
"label_confidence": 0.698,
"severity": "high",
"timestamp": "2026-01-03T14:43:00Z",
"trace_id": "1c45e5cb-7ae4-8168-3225-960a04cbd581"
} | {
"account_age_days": 1243,
"account_id": "ACCT-F96524CD114E",
"baseline_risk_score": 0.353,
"kyc_tier": "tier_1",
"session_entropy": 0.58
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 231,
"timestamp": "2026-01-03T14:43:00Z",
"transaction_amount_usd": 344883.21
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.477,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2063125.68,
"financial_exposure_usd": 3060923.71,
"recoverable_pct": 0.693
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104618",
"label": "fraudulent",
"label_confidence": 0.852,
"severity": "high",
"timestamp": "2026-01-04T04:58:00Z",
"trace_id": "43bd88a4-61f7-69c1-a3f9-2bc9c8c37b8f"
} | {
"account_age_days": 1735,
"account_id": "ACCT-9E8CDA0BFFB4",
"baseline_risk_score": 0.27,
"kyc_tier": "tier_2",
"session_entropy": 0.706
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 347,
"timestamp": "2026-01-03T23:24:00Z",
"transaction_amount_usd": 19.61
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.858,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4000508.91,
"financial_exposure_usd": 5592322.2,
"recoverable_pct": 0.438
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108309",
"label": "benign",
"label_confidence": 0.459,
"severity": "low",
"timestamp": "2026-01-06T18:29:00Z",
"trace_id": "5a6c865d-49c4-68c6-09d5-b8a2a315d851"
} | {
"account_age_days": 930,
"account_id": "ACCT-EDE63302E616",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.421
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 760,
"timestamp": "2026-01-06T18:29:00Z",
"transaction_amount_usd": 13428.34
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.54,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1470.2,
"financial_exposure_usd": 2614.39,
"recoverable_pct": 0.76
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100406",
"label": "fraudulent",
"label_confidence": 0.781,
"severity": "high",
"timestamp": "2026-01-01T06:46:00Z",
"trace_id": "2c5b5c64-9996-379f-6c65-ae6bffbd04fd"
} | {
"account_age_days": 699,
"account_id": "ACCT-7323EAB30554",
"baseline_risk_score": 0.498,
"kyc_tier": "tier_1",
"session_entropy": 0.329
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 270,
"timestamp": "2026-01-01T06:46:00Z",
"transaction_amount_usd": 28430.45
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.867,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 1057612.29,
"financial_exposure_usd": 1074319.32,
"recoverable_pct": 0.725
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101345",
"label": "fraudulent",
"label_confidence": 0.959,
"severity": "high",
"timestamp": "2026-01-01T22:25:00Z",
"trace_id": "2ea7b400-7845-ba38-bd33-c0e0547c144a"
} | {
"account_age_days": 1829,
"account_id": "ACCT-3F2BABFDBB5F",
"baseline_risk_score": 0.633,
"kyc_tier": "tier_3",
"session_entropy": 0.187
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 260,
"timestamp": "2026-01-01T15:37:00Z",
"transaction_amount_usd": 0.76
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.527,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 676629.04,
"financial_exposure_usd": 774354.72,
"recoverable_pct": 0.456
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106492",
"label": "fraudulent",
"label_confidence": 0.888,
"severity": "low",
"timestamp": "2026-01-05T12:12:00Z",
"trace_id": "5509fb3c-6f5e-31d5-4ab2-f21e250badf2"
} | {
"account_age_days": 1480,
"account_id": "ACCT-A07461491A62",
"baseline_risk_score": 0.063,
"kyc_tier": "tier_3",
"session_entropy": 0.556
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 349,
"timestamp": "2026-01-05T03:12:00Z",
"transaction_amount_usd": 4.34
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.64,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 3089985.85,
"financial_exposure_usd": 5243292.15,
"recoverable_pct": 0.515
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101649",
"label": "fraudulent",
"label_confidence": 0.825,
"severity": "high",
"timestamp": "2026-01-02T03:29:00Z",
"trace_id": "e3616c92-1753-74cd-2b9d-e57b80706987"
} | {
"account_age_days": 330,
"account_id": "ACCT-CEACA3D6B6F7",
"baseline_risk_score": 0.557,
"kyc_tier": "tier_1",
"session_entropy": 0.282
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 323,
"timestamp": "2026-01-02T03:29:00Z",
"transaction_amount_usd": 88407.6
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.355,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 442219.97,
"financial_exposure_usd": 499142.61,
"recoverable_pct": 0.304
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109880",
"label": "benign",
"label_confidence": 0.55,
"severity": "high",
"timestamp": "2026-01-07T20:40:00Z",
"trace_id": "f57790d6-adad-7982-ad17-b3ecf4e17503"
} | {
"account_age_days": 552,
"account_id": "ACCT-998198B6B969",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.707
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 977,
"timestamp": "2026-01-07T20:40:00Z",
"transaction_amount_usd": 10664.29
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.478,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 4795.07,
"financial_exposure_usd": 7197.23,
"recoverable_pct": 0.502
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103006",
"label": "fraudulent",
"label_confidence": 0.761,
"severity": "medium",
"timestamp": "2026-01-03T02:06:00Z",
"trace_id": "3c113037-4afe-46f0-95e3-f63aa1b14fdb"
} | {
"account_age_days": 1222,
"account_id": "ACCT-3B1BCF99AAD8",
"baseline_risk_score": 0.615,
"kyc_tier": "tier_1",
"session_entropy": 0.302
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 303,
"timestamp": "2026-01-03T00:31:00Z",
"transaction_amount_usd": 8.5
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.678,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 636347.21,
"financial_exposure_usd": 1159384.39,
"recoverable_pct": 0.75
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103096",
"label": "fraudulent",
"label_confidence": 0.772,
"severity": "critical",
"timestamp": "2026-01-03T03:36:00Z",
"trace_id": "848830f5-786a-ed35-c274-0e16d3c86566"
} | {
"account_age_days": 1998,
"account_id": "ACCT-614B5D7A863E",
"baseline_risk_score": 0.597,
"kyc_tier": "tier_2",
"session_entropy": 0.707
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 292,
"timestamp": "2026-01-02T16:17:00Z",
"transaction_amount_usd": 13.97
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.528,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 392989.42,
"financial_exposure_usd": 653908.83,
"recoverable_pct": 0.467
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108396",
"label": "benign",
"label_confidence": 0.682,
"severity": "low",
"timestamp": "2026-01-06T19:56:00Z",
"trace_id": "9f07261e-7418-4b98-1a51-635a9bd99da9"
} | {
"account_age_days": 1319,
"account_id": "ACCT-33E131236875",
"baseline_risk_score": 0.082,
"kyc_tier": "tier_1",
"session_entropy": 0.631
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 979,
"timestamp": "2026-01-06T19:56:00Z",
"transaction_amount_usd": 1289.6
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.453,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3025.44,
"financial_exposure_usd": 3848.39,
"recoverable_pct": 0.464
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103742",
"label": "fraudulent",
"label_confidence": 0.657,
"severity": "high",
"timestamp": "2026-01-03T14:22:00Z",
"trace_id": "71e0ca99-5504-9e47-bc94-f4e15b828b60"
} | {
"account_age_days": 959,
"account_id": "ACCT-F1A809994536",
"baseline_risk_score": 0.303,
"kyc_tier": "tier_3",
"session_entropy": 0.292
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 455,
"timestamp": "2026-01-03T14:22:00Z",
"transaction_amount_usd": 1853936.43
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.803,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1701931.82,
"financial_exposure_usd": 2624044.65,
"recoverable_pct": 0.433
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101882",
"label": "fraudulent",
"label_confidence": 0.757,
"severity": "medium",
"timestamp": "2026-01-02T07:22:00Z",
"trace_id": "db7bd225-bb1a-bec7-07cf-c8ca1392b996"
} | {
"account_age_days": 1030,
"account_id": "ACCT-75AA2806B2AB",
"baseline_risk_score": 0.267,
"kyc_tier": "tier_1",
"session_entropy": 0.817
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 132,
"timestamp": "2026-01-01T19:58:00Z",
"transaction_amount_usd": 7.53
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.684,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 719080.33,
"financial_exposure_usd": 818440.11,
"recoverable_pct": 0.296
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100939",
"label": "fraudulent",
"label_confidence": 0.875,
"severity": "high",
"timestamp": "2026-01-01T15:39:00Z",
"trace_id": "52bfd4d2-be10-4b91-5fb0-abd20dc9ff83"
} | {
"account_age_days": 1007,
"account_id": "ACCT-10E722B1884C",
"baseline_risk_score": 0.263,
"kyc_tier": "tier_1",
"session_entropy": 0.664
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CA",
"latency_ms": 769,
"timestamp": "2026-01-01T15:39:00Z",
"transaction_amount_usd": 23226.19
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.714,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 240631.86,
"financial_exposure_usd": 517655.81,
"recoverable_pct": 0.776
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107972",
"label": "benign",
"label_confidence": 0.47,
"severity": "low",
"timestamp": "2026-01-06T12:52:00Z",
"trace_id": "98d63cf0-184a-8b5f-1166-434339281386"
} | {
"account_age_days": 1100,
"account_id": "ACCT-2A9FE2C1D42E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.568
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 164,
"timestamp": "2026-01-06T12:52:00Z",
"transaction_amount_usd": 7187.54
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.706,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2668.68,
"financial_exposure_usd": 6044.1,
"recoverable_pct": 0.578
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109367",
"label": "benign",
"label_confidence": 0.526,
"severity": "medium",
"timestamp": "2026-01-07T12:07:00Z",
"trace_id": "319eaaaf-ac29-60a7-ceb2-81dce6341ccd"
} | {
"account_age_days": 1262,
"account_id": "ACCT-4E7488CC5D57",
"baseline_risk_score": 0.112,
"kyc_tier": "tier_2",
"session_entropy": 0.627
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 102,
"timestamp": "2026-01-07T12:07:00Z",
"transaction_amount_usd": 960.81
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.704,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2345.35,
"financial_exposure_usd": 3793.45,
"recoverable_pct": 0.562
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101288",
"label": "fraudulent",
"label_confidence": 0.906,
"severity": "high",
"timestamp": "2026-01-01T21:28:00Z",
"trace_id": "14c186a4-0449-89a7-14a7-da4ec6e76e74"
} | {
"account_age_days": 576,
"account_id": "ACCT-0E073F8C0E9D",
"baseline_risk_score": 0.617,
"kyc_tier": "tier_3",
"session_entropy": 0.104
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 94,
"timestamp": "2026-01-01T09:08:00Z",
"transaction_amount_usd": 16.88
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.91,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 606829.93,
"financial_exposure_usd": 985902.22,
"recoverable_pct": 0.122
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101792",
"label": "fraudulent",
"label_confidence": 0.87,
"severity": "critical",
"timestamp": "2026-01-02T05:52:00Z",
"trace_id": "3420bbc3-9e6c-7ec2-2692-4c9a79a8187b"
} | {
"account_age_days": 1049,
"account_id": "ACCT-3B8040102DBC",
"baseline_risk_score": 0.259,
"kyc_tier": "tier_3",
"session_entropy": 0.363
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 184,
"timestamp": "2026-01-01T16:54:00Z",
"transaction_amount_usd": 12.01
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.757,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 1471453.55,
"financial_exposure_usd": 1698535.75,
"recoverable_pct": 0.166
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109205",
"label": "benign",
"label_confidence": 0.572,
"severity": "low",
"timestamp": "2026-01-07T09:25:00Z",
"trace_id": "9f5f0115-5cad-ad47-434c-d7085b596bec"
} | {
"account_age_days": 998,
"account_id": "ACCT-13CFC746A729",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.454
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 369,
"timestamp": "2026-01-07T03:13:00Z",
"transaction_amount_usd": 0.98
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.678,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2138.48,
"financial_exposure_usd": 5216.17,
"recoverable_pct": 0.717
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105976",
"label": "fraudulent",
"label_confidence": 0.662,
"severity": "high",
"timestamp": "2026-01-05T03:36:00Z",
"trace_id": "19958729-cf36-dd7f-96c9-6fded221d80a"
} | {
"account_age_days": 794,
"account_id": "ACCT-989ED9E7BA21",
"baseline_risk_score": 0.055,
"kyc_tier": "tier_2",
"session_entropy": 0.364
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 609,
"timestamp": "2026-01-05T03:36:00Z",
"transaction_amount_usd": 1049193.75
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.512,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1725947.6,
"financial_exposure_usd": 2041881.48,
"recoverable_pct": 0.572
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100068",
"label": "fraudulent",
"label_confidence": 0.919,
"severity": "high",
"timestamp": "2026-01-01T01:08:00Z",
"trace_id": "42d7f112-0130-d66b-932d-16486769b0f1"
} | {
"account_age_days": 514,
"account_id": "ACCT-3AAD584034EF",
"baseline_risk_score": 0.33,
"kyc_tier": "tier_3",
"session_entropy": 0.272
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 319,
"timestamp": "2026-01-01T01:08:00Z",
"transaction_amount_usd": 13222.56
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.444,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 485169.3,
"financial_exposure_usd": 1028059.86,
"recoverable_pct": 0.067
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105464",
"label": "fraudulent",
"label_confidence": 0.731,
"severity": "medium",
"timestamp": "2026-01-04T19:04:00Z",
"trace_id": "5a993d67-b534-c251-bdaa-b29b9714b3a7"
} | {
"account_age_days": 254,
"account_id": "ACCT-76477AC8BB1A",
"baseline_risk_score": 0.367,
"kyc_tier": "tier_3",
"session_entropy": 0.424
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 307,
"timestamp": "2026-01-04T17:10:00Z",
"transaction_amount_usd": 2.14
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.589,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4297006.09,
"financial_exposure_usd": 5349124.56,
"recoverable_pct": 0.812
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100565",
"label": "fraudulent",
"label_confidence": 0.869,
"severity": "low",
"timestamp": "2026-01-01T09:25:00Z",
"trace_id": "e4fe920f-b905-3838-727f-c72bd2ad4cf7"
} | {
"account_age_days": 540,
"account_id": "ACCT-003C6335700A",
"baseline_risk_score": 0.34,
"kyc_tier": "tier_1",
"session_entropy": 0.15
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "BR",
"latency_ms": 537,
"timestamp": "2026-01-01T09:25:00Z",
"transaction_amount_usd": 111221.08
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.692,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 670481.16,
"financial_exposure_usd": 694938.19,
"recoverable_pct": 0.24
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105972",
"label": "fraudulent",
"label_confidence": 0.811,
"severity": "medium",
"timestamp": "2026-01-05T03:32:00Z",
"trace_id": "9664968b-296b-8b61-17d1-de219a952350"
} | {
"account_age_days": 961,
"account_id": "ACCT-12BEBF5F068A",
"baseline_risk_score": 0.398,
"kyc_tier": "tier_1",
"session_entropy": 0.441
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 436,
"timestamp": "2026-01-05T03:32:00Z",
"transaction_amount_usd": 1074342.31
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.589,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2072777.35,
"financial_exposure_usd": 2722044.34,
"recoverable_pct": 0.92
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100361",
"label": "fraudulent",
"label_confidence": 0.882,
"severity": "medium",
"timestamp": "2026-01-01T06:01:00Z",
"trace_id": "08614abb-e7b2-8e4a-ad16-24e170a26ad8"
} | {
"account_age_days": 1681,
"account_id": "ACCT-C2E36A0AEA3C",
"baseline_risk_score": 0.641,
"kyc_tier": "tier_2",
"session_entropy": 0.941
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 344,
"timestamp": "2025-12-31T23:18:00Z",
"transaction_amount_usd": 15.09
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.922,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 570865.22,
"financial_exposure_usd": 1297904.16,
"recoverable_pct": 0.185
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101778",
"label": "fraudulent",
"label_confidence": 0.979,
"severity": "high",
"timestamp": "2026-01-02T05:38:00Z",
"trace_id": "f41881a5-995b-3474-85f1-36f5bd34739b"
} | {
"account_age_days": 16,
"account_id": "ACCT-8A5D9C95BBCA",
"baseline_risk_score": 0.258,
"kyc_tier": "tier_2",
"session_entropy": 0.583
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 1185,
"timestamp": "2026-01-02T05:38:00Z",
"transaction_amount_usd": 67680.28
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.869,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 670095.48,
"financial_exposure_usd": 1199225.03,
"recoverable_pct": 0.671
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108146",
"label": "benign",
"label_confidence": 0.659,
"severity": "critical",
"timestamp": "2026-01-06T15:46:00Z",
"trace_id": "4f322919-e06d-1fa9-e025-2280fd5c6ba1"
} | {
"account_age_days": 659,
"account_id": "ACCT-4E5CE2A74F45",
"baseline_risk_score": 0.068,
"kyc_tier": "tier_1",
"session_entropy": 0.849
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 140,
"timestamp": "2026-01-06T11:52:00Z",
"transaction_amount_usd": 22.63
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.649,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2294.07,
"financial_exposure_usd": 2468.8,
"recoverable_pct": 0.984
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103893",
"label": "fraudulent",
"label_confidence": 0.793,
"severity": "critical",
"timestamp": "2026-01-03T16:53:00Z",
"trace_id": "03dffef6-ce7f-1928-e569-75d2347ec63e"
} | {
"account_age_days": 981,
"account_id": "ACCT-27312350792D",
"baseline_risk_score": 0.208,
"kyc_tier": "tier_1",
"session_entropy": 0.474
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 1196,
"timestamp": "2026-01-03T16:53:00Z",
"transaction_amount_usd": 945182.16
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.919,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 7774665.32,
"financial_exposure_usd": 8162218.56,
"recoverable_pct": 0.454
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108609",
"label": "benign",
"label_confidence": 0.623,
"severity": "low",
"timestamp": "2026-01-06T23:29:00Z",
"trace_id": "bb4b24d8-c753-1f78-df6b-1986acc1ca64"
} | {
"account_age_days": 794,
"account_id": "ACCT-2B1E9B3C8B35",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.2
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 1169,
"timestamp": "2026-01-06T23:29:00Z",
"transaction_amount_usd": 10384.51
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.61,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1740.53,
"financial_exposure_usd": 2908.54,
"recoverable_pct": 0.451
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107506",
"label": "benign",
"label_confidence": 0.529,
"severity": "medium",
"timestamp": "2026-01-06T05:06:00Z",
"trace_id": "e18b92fb-26da-13dc-8a1b-88f2b1c49d75"
} | {
"account_age_days": 741,
"account_id": "ACCT-E873BA840F80",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.932
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 82,
"timestamp": "2026-01-06T05:06:00Z",
"transaction_amount_usd": 13359.2
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.701,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3799.67,
"financial_exposure_usd": 5479.67,
"recoverable_pct": 0.828
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102550",
"label": "fraudulent",
"label_confidence": 0.932,
"severity": "critical",
"timestamp": "2026-01-02T18:30:00Z",
"trace_id": "147d9d8a-43e8-c1b1-c43d-c38d1901c420"
} | {
"account_age_days": 1319,
"account_id": "ACCT-A7133F5A138B",
"baseline_risk_score": 0.393,
"kyc_tier": "tier_1",
"session_entropy": 0.947
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "HK",
"latency_ms": 1107,
"timestamp": "2026-01-02T18:30:00Z",
"transaction_amount_usd": 106117.15
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.76,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 555850.68,
"financial_exposure_usd": 958326.09,
"recoverable_pct": 0.492
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101842",
"label": "fraudulent",
"label_confidence": 0.773,
"severity": "low",
"timestamp": "2026-01-02T06:42:00Z",
"trace_id": "3878cada-6402-2325-7319-7a684b5a1149"
} | {
"account_age_days": 1527,
"account_id": "ACCT-F5C7C6689A59",
"baseline_risk_score": 0.33,
"kyc_tier": "tier_3",
"session_entropy": 0.703
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 248,
"timestamp": "2026-01-01T19:20:00Z",
"transaction_amount_usd": 6.41
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.729,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 357199.94,
"financial_exposure_usd": 656408.71,
"recoverable_pct": 0.547
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100779",
"label": "fraudulent",
"label_confidence": 0.944,
"severity": "high",
"timestamp": "2026-01-01T12:59:00Z",
"trace_id": "dc091cf0-589c-ba77-5f59-07ac68e5d3b1"
} | {
"account_age_days": 1225,
"account_id": "ACCT-6957DC86204A",
"baseline_risk_score": 0.426,
"kyc_tier": "tier_1",
"session_entropy": 0.211
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 112,
"timestamp": "2026-01-01T08:46:00Z",
"transaction_amount_usd": 2.68
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.427,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 307777.77,
"financial_exposure_usd": 614531.54,
"recoverable_pct": 0.091
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101077",
"label": "fraudulent",
"label_confidence": 0.821,
"severity": "medium",
"timestamp": "2026-01-01T17:57:00Z",
"trace_id": "f9e08b50-ed6d-5d99-4f60-ae74f37269b0"
} | {
"account_age_days": 1674,
"account_id": "ACCT-C322F6BBCA72",
"baseline_risk_score": 0.358,
"kyc_tier": "tier_3",
"session_entropy": 0.414
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 1058,
"timestamp": "2026-01-01T17:57:00Z",
"transaction_amount_usd": 14314.19
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.681,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 602500.24,
"financial_exposure_usd": 893195.16,
"recoverable_pct": 0.119
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101394",
"label": "fraudulent",
"label_confidence": 0.753,
"severity": "high",
"timestamp": "2026-01-01T23:14:00Z",
"trace_id": "980cdbe6-d546-c3a3-965a-801b129c8517"
} | {
"account_age_days": 1728,
"account_id": "ACCT-B8FB6A0B491D",
"baseline_risk_score": 0.615,
"kyc_tier": "tier_1",
"session_entropy": 0.889
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 644,
"timestamp": "2026-01-01T23:14:00Z",
"transaction_amount_usd": 23086.41
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.52,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 779142.61,
"financial_exposure_usd": 1008661.61,
"recoverable_pct": 0.599
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108416",
"label": "benign",
"label_confidence": 0.632,
"severity": "medium",
"timestamp": "2026-01-06T20:16:00Z",
"trace_id": "209ed4bd-c858-689f-f0f8-bb3fa3993e8a"
} | {
"account_age_days": 1934,
"account_id": "ACCT-B51B936218DA",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.317
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 856,
"timestamp": "2026-01-06T20:16:00Z",
"transaction_amount_usd": 4126.43
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.557,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1538.34,
"financial_exposure_usd": 1544.33,
"recoverable_pct": 0.845
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103565",
"label": "fraudulent",
"label_confidence": 0.646,
"severity": "high",
"timestamp": "2026-01-03T11:25:00Z",
"trace_id": "4bfb6fc0-d446-6987-0a40-ab3d9851f9bd"
} | {
"account_age_days": 665,
"account_id": "ACCT-7739EA98D981",
"baseline_risk_score": 0.159,
"kyc_tier": "tier_3",
"session_entropy": 0.486
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 575,
"timestamp": "2026-01-03T11:25:00Z",
"transaction_amount_usd": 1141668.39
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.925,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3533391.27,
"financial_exposure_usd": 5814701.33,
"recoverable_pct": 0.601
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.