schema_version
stringclasses
1 value
event
dict
identity_context
dict
telemetry_stream
listlengths
6
9
vulnerability
dict
detection
dict
impact
dict
simulation
dict
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102987", "label": "fraudulent", "label_confidence": 0.771, "severity": "critical", "timestamp": "2026-01-03T01:47:00Z", "trace_id": "11af4347-7507-c443-28df-7b763c45d720" }
{ "account_age_days": 259, "account_id": "ACCT-F9CA2A82EF14", "baseline_risk_score": 0.504, "kyc_tier": "tier_1", "session_entropy": 0.784 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "NL", "latency_ms": 260, "timestamp": "2026-01-02T18:56:00Z", "transaction_amount_usd": 17.03 }, { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.759, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 699151.71, "financial_exposure_usd": 832822.57, "recoverable_pct": 0.209 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103929", "label": "fraudulent", "label_confidence": 0.937, "severity": "high", "timestamp": "2026-01-03T17:29:00Z", "trace_id": "5c89f2ef-3aeb-172f-bd14-7547e3e99469" }
{ "account_age_days": 394, "account_id": "ACCT-0370AB7CEFF4", "baseline_risk_score": 0.39, "kyc_tier": "tier_2", "session_entropy": 0.521 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "PK", "latency_ms": 997, "timestamp": "2026-01-03T17:29:00Z", "transaction_amount_usd": 2261147.11 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.424, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 4765466.9, "financial_exposure_usd": 6174057.61, "recoverable_pct": 0.955 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102144", "label": "fraudulent", "label_confidence": 0.939, "severity": "critical", "timestamp": "2026-01-02T11:44:00Z", "trace_id": "31c6e414-9aa5-a6ad-e50f-b90ff1dd4ba8" }
{ "account_age_days": 1373, "account_id": "ACCT-F4D06969388D", "baseline_risk_score": 0.593, "kyc_tier": "tier_1", "session_entropy": 0.466 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "MY", "latency_ms": 294, "timestamp": "2026-01-02T11:44:00Z", "transaction_amount_usd": 83710.79 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.837, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 274459.87, "financial_exposure_usd": 598934.41, "recoverable_pct": 0.223 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104738", "label": "fraudulent", "label_confidence": 0.752, "severity": "medium", "timestamp": "2026-01-04T06:58:00Z", "trace_id": "ebe6d700-988d-d6ec-72b5-5bbf65fe120f" }
{ "account_age_days": 1416, "account_id": "ACCT-1E7F244E2661", "baseline_risk_score": 0.182, "kyc_tier": "tier_3", "session_entropy": 0.6 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "CN", "latency_ms": 263, "timestamp": "2026-01-04T06:58:00Z", "transaction_amount_usd": 734602.95 }, { "asset": "USDT", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.747, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 3171726.07, "financial_exposure_usd": 3898217.86, "recoverable_pct": 0.827 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106440", "label": "fraudulent", "label_confidence": 0.622, "severity": "high", "timestamp": "2026-01-05T11:20:00Z", "trace_id": "b87cb388-806c-bfaf-94c8-c1c093dc4759" }
{ "account_age_days": 761, "account_id": "ACCT-0BE0A8F4FA5C", "baseline_risk_score": 0.075, "kyc_tier": "tier_2", "session_entropy": 0.6 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "RU", "latency_ms": 136, "timestamp": "2026-01-05T03:45:00Z", "transaction_amount_usd": 21.25 }, { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.47, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post...
{ "customer_funds_at_risk_usd": 1175714.4, "financial_exposure_usd": 1920592.68, "recoverable_pct": 0.453 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105753", "label": "fraudulent", "label_confidence": 0.706, "severity": "medium", "timestamp": "2026-01-04T23:53:00Z", "trace_id": "60865e9c-e0c3-ee12-d1e4-28baa1472046" }
{ "account_age_days": 928, "account_id": "ACCT-1E3BBCB9931F", "baseline_risk_score": 0.253, "kyc_tier": "tier_2", "session_entropy": 0.666 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "NG", "latency_ms": 302, "timestamp": "2026-01-04T19:16:00Z", "transaction_amount_usd": 11.97 }, { "asset": "USDC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTE...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.774, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 1026755.54, "financial_exposure_usd": 1736196.48, "recoverable_pct": 0.867 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108688", "label": "benign", "label_confidence": 0.674, "severity": "high", "timestamp": "2026-01-07T00:48:00Z", "trace_id": "e511fa98-dcae-bf31-dd8d-cf46282f864a" }
{ "account_age_days": 1490, "account_id": "ACCT-A53507D51638", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.146 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "JP", "latency_ms": 187, "timestamp": "2026-01-06T19:05:00Z", "transaction_amount_usd": 15.51 }, { "asset": "JPY", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.497, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 4211.32, "financial_exposure_usd": 6560, "recoverable_pct": 0.699 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101437", "label": "fraudulent", "label_confidence": 0.852, "severity": "high", "timestamp": "2026-01-01T23:57:00Z", "trace_id": "24d27283-3edf-1daa-8f31-abf9d3b14689" }
{ "account_age_days": 910, "account_id": "ACCT-332DE2ABD3CE", "baseline_risk_score": 0.528, "kyc_tier": "tier_2", "session_entropy": 0.332 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "PK", "latency_ms": 397, "timestamp": "2026-01-01T16:36:00Z", "transaction_amount_usd": 10.22 }, { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.363, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 8", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 687695.52, "financial_exposure_usd": 742155.99, "recoverable_pct": 0.765 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106626", "label": "fraudulent", "label_confidence": 0.71, "severity": "critical", "timestamp": "2026-01-05T14:26:00Z", "trace_id": "16ccfa18-37a8-1a2a-e443-9f8f602abc22" }
{ "account_age_days": 747, "account_id": "ACCT-29E368CF9F69", "baseline_risk_score": 0.409, "kyc_tier": "tier_2", "session_entropy": 0.709 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "NG", "latency_ms": 102, "timestamp": "2026-01-05T14:26:00Z", "transaction_amount_usd": 2717389.95 }, { "asset": "USDT", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.894, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 804460.31, "financial_exposure_usd": 1715814.27, "recoverable_pct": 0.433 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102852", "label": "fraudulent", "label_confidence": 0.887, "severity": "critical", "timestamp": "2026-01-02T23:32:00Z", "trace_id": "993aceee-5c86-bad5-7e46-c1e43cece45d" }
{ "account_age_days": 529, "account_id": "ACCT-8CC23CB9DB11", "baseline_risk_score": 0.517, "kyc_tier": "tier_3", "session_entropy": 0.451 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "KY", "latency_ms": 505, "timestamp": "2026-01-02T23:32:00Z", "transaction_amount_usd": 69903.45 }, { "asset": "USDT", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.831, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 464632.15, "financial_exposure_usd": 678284.25, "recoverable_pct": 0.037 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101721", "label": "fraudulent", "label_confidence": 0.975, "severity": "high", "timestamp": "2026-01-02T04:41:00Z", "trace_id": "fa4296dc-0fbc-eb95-e008-c675920cb8f4" }
{ "account_age_days": 282, "account_id": "ACCT-E0E30DD97AC0", "baseline_risk_score": 0.401, "kyc_tier": "tier_2", "session_entropy": 0.872 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "KY", "latency_ms": 100, "timestamp": "2026-01-01T21:55:00Z", "transaction_amount_usd": 7.59 }, { "asset": "EUR", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "ge...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.541, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 220533.39, "financial_exposure_usd": 278792.92, "recoverable_pct": 0.398 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101545", "label": "fraudulent", "label_confidence": 0.813, "severity": "high", "timestamp": "2026-01-02T01:45:00Z", "trace_id": "c42d58bd-f9cb-c1a9-cb35-e974b4a46ee2" }
{ "account_age_days": 1950, "account_id": "ACCT-2DC3E3F5B5DD", "baseline_risk_score": 0.357, "kyc_tier": "tier_2", "session_entropy": 0.925 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CN", "latency_ms": 551, "timestamp": "2026-01-02T01:45:00Z", "transaction_amount_usd": 45946.51 }, { "asset": "GBP", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.619, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 306145.6, "financial_exposure_usd": 679043.8, "recoverable_pct": 0.417 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101206", "label": "fraudulent", "label_confidence": 0.963, "severity": "high", "timestamp": "2026-01-01T20:06:00Z", "trace_id": "44239bbf-1939-b74f-7bc0-1babf6da958a" }
{ "account_age_days": 1685, "account_id": "ACCT-9A900BAF6717", "baseline_risk_score": 0.408, "kyc_tier": "tier_1", "session_entropy": 0.223 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "AE", "latency_ms": 774, "timestamp": "2026-01-01T20:06:00Z", "transaction_amount_usd": 35912.46 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.421, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 235129.24, "financial_exposure_usd": 320543.66, "recoverable_pct": 0.572 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103346", "label": "fraudulent", "label_confidence": 0.635, "severity": "high", "timestamp": "2026-01-03T07:46:00Z", "trace_id": "5b956318-e248-e1ee-60e5-b6552073802e" }
{ "account_age_days": 754, "account_id": "ACCT-5B6234061528", "baseline_risk_score": 0.256, "kyc_tier": "tier_1", "session_entropy": 0.655 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "AE", "latency_ms": 164, "timestamp": "2026-01-03T07:46:00Z", "transaction_amount_usd": 1636771.46 }, { "asset": "USD", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.355, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 2236390.9, "financial_exposure_usd": 5512364.8, "recoverable_pct": 0.858 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100376", "label": "fraudulent", "label_confidence": 0.892, "severity": "medium", "timestamp": "2026-01-01T06:16:00Z", "trace_id": "8d73e3f8-54f9-9b39-d077-5ab451a5d268" }
{ "account_age_days": 554, "account_id": "ACCT-D9502B0D9CE5", "baseline_risk_score": 0.539, "kyc_tier": "tier_2", "session_entropy": 0.438 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "LU", "latency_ms": 122, "timestamp": "2026-01-01T06:16:00Z", "transaction_amount_usd": 109838.51 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.814, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 558310.16, "financial_exposure_usd": 609636.18, "recoverable_pct": 0.153 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103298", "label": "fraudulent", "label_confidence": 0.77, "severity": "critical", "timestamp": "2026-01-03T06:58:00Z", "trace_id": "2ad9c32f-94fe-df36-0315-195a727bdfdd" }
{ "account_age_days": 334, "account_id": "ACCT-19B753107E59", "baseline_risk_score": 0.611, "kyc_tier": "tier_1", "session_entropy": 0.843 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "GB", "latency_ms": 127, "timestamp": "2026-01-03T02:39:00Z", "transaction_amount_usd": 12.87 }, { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.735, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 773528.82, "financial_exposure_usd": 855445.14, "recoverable_pct": 0.156 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102109", "label": "fraudulent", "label_confidence": 0.961, "severity": "medium", "timestamp": "2026-01-02T11:09:00Z", "trace_id": "e1ae4748-8070-ef5b-0714-8891a10b0cfd" }
{ "account_age_days": 7, "account_id": "ACCT-730A5A6E2E62", "baseline_risk_score": 0.57, "kyc_tier": "tier_3", "session_entropy": 0.215 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "NG", "latency_ms": 972, "timestamp": "2026-01-02T11:09:00Z", "transaction_amount_usd": 103029.13 }, { "asset": "USDC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE",...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.384, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 386498.07, "financial_exposure_usd": 953654.42, "recoverable_pct": 0.461 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101037", "label": "fraudulent", "label_confidence": 0.964, "severity": "medium", "timestamp": "2026-01-01T17:17:00Z", "trace_id": "d92042d1-f31c-1c24-40c0-9894a68a4282" }
{ "account_age_days": 169, "account_id": "ACCT-CC73FD168A6C", "baseline_risk_score": 0.623, "kyc_tier": "tier_2", "session_entropy": 0.316 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "CN", "latency_ms": 177, "timestamp": "2026-01-01T09:40:00Z", "transaction_amount_usd": 16.53 }, { "asset": "JPY", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.644, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 159961.87, "financial_exposure_usd": 360762.56, "recoverable_pct": 0.625 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101553", "label": "fraudulent", "label_confidence": 0.831, "severity": "medium", "timestamp": "2026-01-02T01:53:00Z", "trace_id": "df810e29-0949-27d5-410f-73b3743c92eb" }
{ "account_age_days": 1341, "account_id": "ACCT-B3EE1A691155", "baseline_risk_score": 0.454, "kyc_tier": "tier_2", "session_entropy": 0.632 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "NG", "latency_ms": 588, "timestamp": "2026-01-02T01:53:00Z", "transaction_amount_usd": 31291.89 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.947, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 1, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 8361.34, "financial_exposure_usd": 11585.64, "recoverable_pct": 0.728 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102062", "label": "fraudulent", "label_confidence": 0.952, "severity": "high", "timestamp": "2026-01-02T10:22:00Z", "trace_id": "15d0eb11-5200-f6c1-a3d8-0c1e0e36b22f" }
{ "account_age_days": 656, "account_id": "ACCT-F19B3DDDA4F3", "baseline_risk_score": 0.583, "kyc_tier": "tier_3", "session_entropy": 0.658 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "CN", "latency_ms": 82, "timestamp": "2026-01-02T02:05:00Z", "transaction_amount_usd": 20.68 }, { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "ge...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.518, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 9", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 220537.57, "financial_exposure_usd": 282934.87, "recoverable_pct": 0.602 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102036", "label": "fraudulent", "label_confidence": 0.949, "severity": "medium", "timestamp": "2026-01-02T09:56:00Z", "trace_id": "61596810-2890-c547-e47a-bc55ac5ae280" }
{ "account_age_days": 569, "account_id": "ACCT-DD664C473564", "baseline_risk_score": 0.306, "kyc_tier": "tier_3", "session_entropy": 0.121 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "DE", "latency_ms": 91, "timestamp": "2026-01-02T00:57:00Z", "transaction_amount_usd": 16.6 }, { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.61, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV...
{ "customer_funds_at_risk_usd": 213794.09, "financial_exposure_usd": 467164.46, "recoverable_pct": 0.585 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105152", "label": "fraudulent", "label_confidence": 0.793, "severity": "medium", "timestamp": "2026-01-04T13:52:00Z", "trace_id": "6b346308-b037-6464-409c-087f30dfc04e" }
{ "account_age_days": 773, "account_id": "ACCT-52F160BB7514", "baseline_risk_score": 0.435, "kyc_tier": "tier_2", "session_entropy": 0.398 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "RU", "latency_ms": 343, "timestamp": "2026-01-04T09:08:00Z", "transaction_amount_usd": 21.22 }, { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.645, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 4320947.87, "financial_exposure_usd": 5018593.51, "recoverable_pct": 0.426 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104646", "label": "fraudulent", "label_confidence": 0.828, "severity": "high", "timestamp": "2026-01-04T05:26:00Z", "trace_id": "6985a4ff-8003-0d4c-d0d4-170a479c68ec" }
{ "account_age_days": 489, "account_id": "ACCT-E6AF04B7DDB9", "baseline_risk_score": 0.4, "kyc_tier": "tier_2", "session_entropy": 0.899 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "FR", "latency_ms": 904, "timestamp": "2026-01-04T05:26:00Z", "transaction_amount_usd": 2576703.47 }, { "asset": "USD", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.352, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 4619507.59, "financial_exposure_usd": 7029585.69, "recoverable_pct": 0.812 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105583", "label": "fraudulent", "label_confidence": 0.918, "severity": "critical", "timestamp": "2026-01-04T21:03:00Z", "trace_id": "76adfef0-574a-4667-a8cf-ea6f0a843faf" }
{ "account_age_days": 1092, "account_id": "ACCT-7CA9230A4E01", "baseline_risk_score": 0.357, "kyc_tier": "tier_3", "session_entropy": 0.846 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "MY", "latency_ms": 1050, "timestamp": "2026-01-04T21:03:00Z", "transaction_amount_usd": 2219012.82 }, { "asset": "SOL", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.898, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 1699832.39, "financial_exposure_usd": 1929418, "recoverable_pct": 0.624 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102015", "label": "fraudulent", "label_confidence": 0.834, "severity": "high", "timestamp": "2026-01-02T09:35:00Z", "trace_id": "ee2b2418-cb7b-4adc-2ffa-dccd16259f07" }
{ "account_age_days": 1900, "account_id": "ACCT-7FD7F67F4B5C", "baseline_risk_score": 0.439, "kyc_tier": "tier_3", "session_entropy": 0.521 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "PK", "latency_ms": 1037, "timestamp": "2026-01-02T09:35:00Z", "transaction_amount_usd": 101939.71 }, { "asset": "USD", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.888, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 738211.51, "financial_exposure_usd": 967725.54, "recoverable_pct": 0.359 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103551", "label": "fraudulent", "label_confidence": 0.817, "severity": "high", "timestamp": "2026-01-03T11:11:00Z", "trace_id": "45eb7fc6-1369-a619-9bac-c92673c18f0c" }
{ "account_age_days": 814, "account_id": "ACCT-23F872E6D88E", "baseline_risk_score": 0.446, "kyc_tier": "tier_3", "session_entropy": 0.617 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "HK", "latency_ms": 102, "timestamp": "2026-01-03T11:11:00Z", "transaction_amount_usd": 2399198.51 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.361, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 2128315.2, "financial_exposure_usd": 5109825.48, "recoverable_pct": 0.949 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105131", "label": "fraudulent", "label_confidence": 0.748, "severity": "critical", "timestamp": "2026-01-04T13:31:00Z", "trace_id": "a8d43d85-9ab2-8db7-9d62-7fb228ce8830" }
{ "account_age_days": 1970, "account_id": "ACCT-27BD9A9DFAD7", "baseline_risk_score": 0.179, "kyc_tier": "tier_2", "session_entropy": 0.701 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "CN", "latency_ms": 368, "timestamp": "2026-01-04T07:32:00Z", "transaction_amount_usd": 17.16 }, { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.429, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 9", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 4347478.38, "financial_exposure_usd": 5121351.52, "recoverable_pct": 0.761 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109919", "label": "benign", "label_confidence": 0.492, "severity": "low", "timestamp": "2026-01-07T21:19:00Z", "trace_id": "4dce5f4b-9a19-a61c-1f10-93f1f039755b" }
{ "account_age_days": 678, "account_id": "ACCT-64BB723B6F44", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.249 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "JP", "latency_ms": 273, "timestamp": "2026-01-07T21:19:00Z", "transaction_amount_usd": 11369.37 }, { "asset": "ETH", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.567, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 1637, "financial_exposure_usd": 2398.54, "recoverable_pct": 0.683 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103538", "label": "fraudulent", "label_confidence": 0.609, "severity": "medium", "timestamp": "2026-01-03T10:58:00Z", "trace_id": "f5e227e7-908d-0438-d9a5-1f841d142265" }
{ "account_age_days": 846, "account_id": "ACCT-DA3FDDD6185D", "baseline_risk_score": 0.202, "kyc_tier": "tier_3", "session_entropy": 0.923 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "PK", "latency_ms": 210, "timestamp": "2026-01-03T10:58:00Z", "transaction_amount_usd": 2866781.33 }, { "asset": "USD", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.735, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 4892143.59, "financial_exposure_usd": 5174353.17, "recoverable_pct": 0.876 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109905", "label": "benign", "label_confidence": 0.746, "severity": "low", "timestamp": "2026-01-07T21:05:00Z", "trace_id": "4ce8c966-821f-644e-6e51-b2942d3132b5" }
{ "account_age_days": 1803, "account_id": "ACCT-E6E41AE21FCB", "baseline_risk_score": 0.159, "kyc_tier": "tier_1", "session_entropy": 0.257 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "GB", "latency_ms": 238, "timestamp": "2026-01-07T13:29:00Z", "transaction_amount_usd": 8.37 }, { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.791, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 3608.36, "financial_exposure_usd": 5628.61, "recoverable_pct": 0.77 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100241", "label": "fraudulent", "label_confidence": 0.836, "severity": "medium", "timestamp": "2026-01-01T04:01:00Z", "trace_id": "8750be7b-d5bb-e3a4-40b8-7dc36444ea5b" }
{ "account_age_days": 1618, "account_id": "ACCT-0AD56E56DF9B", "baseline_risk_score": 0.628, "kyc_tier": "tier_1", "session_entropy": 0.259 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "HK", "latency_ms": 609, "timestamp": "2026-01-01T04:01:00Z", "transaction_amount_usd": 109870.57 }, { "asset": "USDC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.554, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 213616.8, "financial_exposure_usd": 370669.53, "recoverable_pct": 0.815 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106976", "label": "benign", "label_confidence": 0.717, "severity": "medium", "timestamp": "2026-01-05T20:16:00Z", "trace_id": "ecdf6172-e83b-ec05-76da-b5e356ac24bc" }
{ "account_age_days": 337, "account_id": "ACCT-38AF8E964749", "baseline_risk_score": 0.07, "kyc_tier": "tier_3", "session_entropy": 0.81 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "TH", "latency_ms": 878, "timestamp": "2026-01-05T20:16:00Z", "transaction_amount_usd": 3919.44 }, { "asset": "JPY", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.556, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 3103.89, "financial_exposure_usd": 3773.28, "recoverable_pct": 0.445 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108856", "label": "benign", "label_confidence": 0.477, "severity": "low", "timestamp": "2026-01-07T03:36:00Z", "trace_id": "9573ec8c-01ad-c1ae-1262-a94510c39916" }
{ "account_age_days": 340, "account_id": "ACCT-3C21BC306C34", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.214 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "NL", "latency_ms": 364, "timestamp": "2026-01-06T23:54:00Z", "transaction_amount_usd": 11.69 }, { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.785, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 1054.54, "financial_exposure_usd": 2604.34, "recoverable_pct": 0.709 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107032", "label": "benign", "label_confidence": 0.569, "severity": "low", "timestamp": "2026-01-05T21:12:00Z", "trace_id": "e259d1e4-75f4-70e8-f3d2-740873a50606" }
{ "account_age_days": 471, "account_id": "ACCT-BADC969719BC", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.45 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "HK", "latency_ms": 323, "timestamp": "2026-01-05T08:49:00Z", "transaction_amount_usd": 6.16 }, { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.459, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 2747.54, "financial_exposure_usd": 3754.03, "recoverable_pct": 0.893 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100505", "label": "fraudulent", "label_confidence": 0.848, "severity": "medium", "timestamp": "2026-01-01T08:25:00Z", "trace_id": "afae9a24-a42e-024f-c4be-a518c1e50b4e" }
{ "account_age_days": 422, "account_id": "ACCT-F732BC85092B", "baseline_risk_score": 0.262, "kyc_tier": "tier_3", "session_entropy": 0.487 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "KY", "latency_ms": 1161, "timestamp": "2026-01-01T08:25:00Z", "transaction_amount_usd": 22694.67 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.615, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 546911.3, "financial_exposure_usd": 773156.99, "recoverable_pct": 0.167 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104235", "label": "fraudulent", "label_confidence": 0.806, "severity": "high", "timestamp": "2026-01-03T22:35:00Z", "trace_id": "44f4812e-d202-3f80-6344-12b182f3a4b7" }
{ "account_age_days": 1351, "account_id": "ACCT-EB71D3B90B3F", "baseline_risk_score": 0.169, "kyc_tier": "tier_3", "session_entropy": 0.223 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "KY", "latency_ms": 586, "timestamp": "2026-01-03T22:35:00Z", "transaction_amount_usd": 1921562.22 }, { "asset": "JPY", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.671, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 3397391.55, "financial_exposure_usd": 5160460.98, "recoverable_pct": 0.988 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102883", "label": "fraudulent", "label_confidence": 0.805, "severity": "high", "timestamp": "2026-01-03T00:03:00Z", "trace_id": "e8f201dc-02fc-66ec-1c0d-b8d10e99dc37" }
{ "account_age_days": 1702, "account_id": "ACCT-AE0EFE9089D0", "baseline_risk_score": 0.264, "kyc_tier": "tier_3", "session_entropy": 0.329 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "KY", "latency_ms": 956, "timestamp": "2026-01-03T00:03:00Z", "transaction_amount_usd": 90703.08 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.762, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 138667.07, "financial_exposure_usd": 227866.87, "recoverable_pct": 0.557 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101639", "label": "fraudulent", "label_confidence": 0.885, "severity": "critical", "timestamp": "2026-01-02T03:19:00Z", "trace_id": "5cc9c11b-5252-2ad9-c063-c05f10b1b67b" }
{ "account_age_days": 980, "account_id": "ACCT-177B90EBE8DA", "baseline_risk_score": 0.48, "kyc_tier": "tier_1", "session_entropy": 0.941 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "NG", "latency_ms": 958, "timestamp": "2026-01-02T03:19:00Z", "transaction_amount_usd": 16538.96 }, { "asset": "USDC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.855, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 672347.83, "financial_exposure_usd": 697905.35, "recoverable_pct": 0.504 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103808", "label": "fraudulent", "label_confidence": 0.76, "severity": "critical", "timestamp": "2026-01-03T15:28:00Z", "trace_id": "4a013f9b-75b9-76f5-bc61-08e6266a5526" }
{ "account_age_days": 1963, "account_id": "ACCT-41B1FB9FEE7F", "baseline_risk_score": 0.202, "kyc_tier": "tier_2", "session_entropy": 0.408 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "JP", "latency_ms": 400, "timestamp": "2026-01-03T15:28:00Z", "transaction_amount_usd": 1016761.2 }, { "asset": "USD", "burst_indicator": false, "event_name": "ORDER_BOOK_...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.841, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 3531207.81, "financial_exposure_usd": 3993527.78, "recoverable_pct": 0.713 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106811", "label": "benign", "label_confidence": 0.518, "severity": "low", "timestamp": "2026-01-05T17:31:00Z", "trace_id": "2c8f7413-5dc3-c0e6-4e4d-2283e6d5dbde" }
{ "account_age_days": 1648, "account_id": "ACCT-A6DC4856ACAB", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.787 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "FR", "latency_ms": 409, "timestamp": "2026-01-05T17:31:00Z", "transaction_amount_usd": 10247.11 }, { "asset": "USDC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.545, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 7640.66, "financial_exposure_usd": 8321.05, "recoverable_pct": 0.935 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103919", "label": "fraudulent", "label_confidence": 0.613, "severity": "high", "timestamp": "2026-01-03T17:19:00Z", "trace_id": "07cb002f-1399-04e9-ced2-6887c1aecdb5" }
{ "account_age_days": 205, "account_id": "ACCT-5199732BBEBA", "baseline_risk_score": 0.074, "kyc_tier": "tier_2", "session_entropy": 0.174 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "US", "latency_ms": 451, "timestamp": "2026-01-03T17:19:00Z", "transaction_amount_usd": 1037333.97 }, { "asset": "EUR", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.743, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 1319592.52, "financial_exposure_usd": 3143764.84, "recoverable_pct": 0.625 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100740", "label": "fraudulent", "label_confidence": 0.805, "severity": "critical", "timestamp": "2026-01-01T12:20:00Z", "trace_id": "662cdf39-9c05-8fbd-ae67-52dd8cddcdba" }
{ "account_age_days": 816, "account_id": "ACCT-FAF8FBD12FD5", "baseline_risk_score": 0.583, "kyc_tier": "tier_3", "session_entropy": 0.74 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "NL", "latency_ms": 294, "timestamp": "2026-01-01T02:05:00Z", "transaction_amount_usd": 23.16 }, { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.813, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 4", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 399033.13, "financial_exposure_usd": 983407.85, "recoverable_pct": 0.457 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101026", "label": "fraudulent", "label_confidence": 0.935, "severity": "high", "timestamp": "2026-01-01T17:06:00Z", "trace_id": "8b13dd5e-80ab-90b8-3f02-380d2e349d8d" }
{ "account_age_days": 1057, "account_id": "ACCT-3D7D7B2F6602", "baseline_risk_score": 0.489, "kyc_tier": "tier_3", "session_entropy": 0.668 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "NG", "latency_ms": 162, "timestamp": "2026-01-01T11:03:00Z", "transaction_amount_usd": 23.22 }, { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.462, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 294681.8, "financial_exposure_usd": 327859.38, "recoverable_pct": 0.804 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102411", "label": "fraudulent", "label_confidence": 0.79, "severity": "medium", "timestamp": "2026-01-02T16:11:00Z", "trace_id": "8e256311-1bfa-97fe-7edb-3277258db8c9" }
{ "account_age_days": 908, "account_id": "ACCT-41B0B480C90E", "baseline_risk_score": 0.598, "kyc_tier": "tier_2", "session_entropy": 0.167 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "NL", "latency_ms": 180, "timestamp": "2026-01-02T16:11:00Z", "transaction_amount_usd": 87658.33 }, { "asset": "EUR", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.591, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 490604.49, "financial_exposure_usd": 856984.86, "recoverable_pct": 0.842 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101865", "label": "fraudulent", "label_confidence": 0.968, "severity": "high", "timestamp": "2026-01-02T07:05:00Z", "trace_id": "0aaa5503-438f-cd71-505d-3daf1b67600d" }
{ "account_age_days": 680, "account_id": "ACCT-A23B5C43304A", "baseline_risk_score": 0.344, "kyc_tier": "tier_3", "session_entropy": 0.315 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "DE", "latency_ms": 319, "timestamp": "2026-01-02T07:05:00Z", "transaction_amount_usd": 102046.49 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.84, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ...
{ "customer_funds_at_risk_usd": 157594.49, "financial_exposure_usd": 198149.3, "recoverable_pct": 0.1 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101515", "label": "fraudulent", "label_confidence": 0.922, "severity": "high", "timestamp": "2026-01-02T01:15:00Z", "trace_id": "381c7140-ef34-6a20-a794-799cba7273c8" }
{ "account_age_days": 899, "account_id": "ACCT-98D21075A579", "baseline_risk_score": 0.364, "kyc_tier": "tier_2", "session_entropy": 0.316 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "RU", "latency_ms": 506, "timestamp": "2026-01-02T01:15:00Z", "transaction_amount_usd": 22167.29 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.875, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 490808.68, "financial_exposure_usd": 507392, "recoverable_pct": 0.701 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106795", "label": "benign", "label_confidence": 0.543, "severity": "high", "timestamp": "2026-01-05T17:15:00Z", "trace_id": "70fca89a-dd21-466d-555e-790a27cf4410" }
{ "account_age_days": 1073, "account_id": "ACCT-A405E83BDFA9", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.851 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "MY", "latency_ms": 370, "timestamp": "2026-01-05T07:21:00Z", "transaction_amount_usd": 21.95 }, { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.508, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 3206.67, "financial_exposure_usd": 3743.54, "recoverable_pct": 0.58 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100879", "label": "fraudulent", "label_confidence": 0.872, "severity": "high", "timestamp": "2026-01-01T14:39:00Z", "trace_id": "36994369-57c5-bb61-5ca8-55942b8bb736" }
{ "account_age_days": 1368, "account_id": "ACCT-6778170AF4F2", "baseline_risk_score": 0.272, "kyc_tier": "tier_3", "session_entropy": 0.528 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "CN", "latency_ms": 162, "timestamp": "2026-01-01T04:23:00Z", "transaction_amount_usd": 3.9 }, { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "ge...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.574, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 8", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 318166.43, "financial_exposure_usd": 644981.52, "recoverable_pct": 0.299 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101167", "label": "fraudulent", "label_confidence": 0.775, "severity": "high", "timestamp": "2026-01-01T19:27:00Z", "trace_id": "eda28a9b-49e5-6432-5b87-fd8a9b0fd5ba" }
{ "account_age_days": 171, "account_id": "ACCT-2C66427748DE", "baseline_risk_score": 0.42, "kyc_tier": "tier_3", "session_entropy": 0.409 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "NG", "latency_ms": 859, "timestamp": "2026-01-01T19:27:00Z", "transaction_amount_usd": 56988.45 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.724, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 4", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 826712.87, "financial_exposure_usd": 1033497.49, "recoverable_pct": 0.321 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104764", "label": "fraudulent", "label_confidence": 0.76, "severity": "medium", "timestamp": "2026-01-04T07:24:00Z", "trace_id": "0a2988c0-cb56-6b39-4a47-b24de8f27161" }
{ "account_age_days": 540, "account_id": "ACCT-508C595AA09D", "baseline_risk_score": 0.382, "kyc_tier": "tier_2", "session_entropy": 0.76 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "LU", "latency_ms": 671, "timestamp": "2026-01-04T07:24:00Z", "transaction_amount_usd": 2753787.82 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.371, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 3175542.05, "financial_exposure_usd": 3960838.8, "recoverable_pct": 0.995 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109929", "label": "benign", "label_confidence": 0.681, "severity": "high", "timestamp": "2026-01-07T21:29:00Z", "trace_id": "073abe70-df9c-b9ff-89d9-61d3210185c8" }
{ "account_age_days": 168, "account_id": "ACCT-929741A5243F", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.354 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "VN", "latency_ms": 180, "timestamp": "2026-01-07T21:29:00Z", "transaction_amount_usd": 12860.29 }, { "asset": "USD", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.516, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 136.46, "financial_exposure_usd": 198.76, "recoverable_pct": 0.997 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103987", "label": "fraudulent", "label_confidence": 0.949, "severity": "medium", "timestamp": "2026-01-03T18:27:00Z", "trace_id": "9378150c-b313-7551-5f05-7dd46d59c1bb" }
{ "account_age_days": 1493, "account_id": "ACCT-E61D3CC49590", "baseline_risk_score": 0.152, "kyc_tier": "tier_3", "session_entropy": 0.315 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "US", "latency_ms": 468, "timestamp": "2026-01-03T18:27:00Z", "transaction_amount_usd": 315044.79 }, { "asset": "JPY", "burst_indicator": false, "event_name": "ORDER_BOOK_...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.94, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p...
{ "customer_funds_at_risk_usd": 5300210.17, "financial_exposure_usd": 8038278.39, "recoverable_pct": 0.777 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102951", "label": "fraudulent", "label_confidence": 0.919, "severity": "low", "timestamp": "2026-01-03T01:11:00Z", "trace_id": "6b1c3365-f5f9-5a8a-158b-fdcda1a7d44c" }
{ "account_age_days": 36, "account_id": "ACCT-2C7B885E14D2", "baseline_risk_score": 0.6, "kyc_tier": "tier_3", "session_entropy": 0.391 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "PK", "latency_ms": 129, "timestamp": "2026-01-02T12:34:00Z", "transaction_amount_usd": 4.53 }, { "asset": "GBP", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "g...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.46, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 863895.5, "financial_exposure_usd": 881461.63, "recoverable_pct": 0.784 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100056", "label": "fraudulent", "label_confidence": 0.933, "severity": "critical", "timestamp": "2026-01-01T00:56:00Z", "trace_id": "352b6ec8-e90d-21cb-7f11-1a368c52d271" }
{ "account_age_days": 1933, "account_id": "ACCT-B9F6143BB238", "baseline_risk_score": 0.51, "kyc_tier": "tier_1", "session_entropy": 0.15 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "KY", "latency_ms": 306, "timestamp": "2026-01-01T00:56:00Z", "transaction_amount_usd": 40007.13 }, { "asset": "USD", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.6, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id H...
{ "customer_funds_at_risk_usd": 1535388.16, "financial_exposure_usd": 1742069.22, "recoverable_pct": 0.577 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105184", "label": "fraudulent", "label_confidence": 0.791, "severity": "medium", "timestamp": "2026-01-04T14:24:00Z", "trace_id": "4490ddd4-6c3c-7aed-533c-d4347fee6612" }
{ "account_age_days": 1055, "account_id": "ACCT-2F3EBDB339DD", "baseline_risk_score": 0.088, "kyc_tier": "tier_2", "session_entropy": 0.247 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "LU", "latency_ms": 157, "timestamp": "2026-01-04T09:13:00Z", "transaction_amount_usd": 11.79 }, { "asset": "ETH", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.54, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post...
{ "customer_funds_at_risk_usd": 4549176.94, "financial_exposure_usd": 6694186.27, "recoverable_pct": 0.42 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105842", "label": "fraudulent", "label_confidence": 0.763, "severity": "medium", "timestamp": "2026-01-05T01:22:00Z", "trace_id": "aec86be1-751f-5c0b-3c45-91dd79f55a4a" }
{ "account_age_days": 1947, "account_id": "ACCT-194287DBC1D4", "baseline_risk_score": 0.29, "kyc_tier": "tier_3", "session_entropy": 0.223 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "CN", "latency_ms": 1141, "timestamp": "2026-01-05T01:22:00Z", "transaction_amount_usd": 1404835.43 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.44, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN...
{ "customer_funds_at_risk_usd": 2516571.94, "financial_exposure_usd": 6244698.99, "recoverable_pct": 0.74 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104468", "label": "fraudulent", "label_confidence": 0.808, "severity": "high", "timestamp": "2026-01-04T02:28:00Z", "trace_id": "6d838141-a30d-7e40-d054-9bac356e854d" }
{ "account_age_days": 1656, "account_id": "ACCT-819AF3B06C1F", "baseline_risk_score": 0.409, "kyc_tier": "tier_3", "session_entropy": 0.751 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "HK", "latency_ms": 1078, "timestamp": "2026-01-04T02:28:00Z", "transaction_amount_usd": 1457919.3 }, { "asset": "USD", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.582, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 1454313.23, "financial_exposure_usd": 3502344.03, "recoverable_pct": 0.474 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105518", "label": "fraudulent", "label_confidence": 0.633, "severity": "critical", "timestamp": "2026-01-04T19:58:00Z", "trace_id": "f9ebe6f7-13b8-e262-450c-741c2c1b826e" }
{ "account_age_days": 522, "account_id": "ACCT-421216CAE6C8", "baseline_risk_score": 0.426, "kyc_tier": "tier_1", "session_entropy": 0.619 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "US", "latency_ms": 243, "timestamp": "2026-01-04T19:58:00Z", "transaction_amount_usd": 2748666.11 }, { "asset": "USD", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.806, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 1617364.63, "financial_exposure_usd": 2234485.46, "recoverable_pct": 0.718 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101939", "label": "fraudulent", "label_confidence": 0.767, "severity": "high", "timestamp": "2026-01-02T08:19:00Z", "trace_id": "214e1915-48ee-a711-ff73-d55a72854de2" }
{ "account_age_days": 1251, "account_id": "ACCT-B655A9E2BD79", "baseline_risk_score": 0.345, "kyc_tier": "tier_3", "session_entropy": 0.357 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "NG", "latency_ms": 356, "timestamp": "2026-01-01T19:35:00Z", "transaction_amount_usd": 8.7 }, { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "ge...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.526, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 521220.7, "financial_exposure_usd": 688158.34, "recoverable_pct": 0.285 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104731", "label": "fraudulent", "label_confidence": 0.757, "severity": "critical", "timestamp": "2026-01-04T06:51:00Z", "trace_id": "23abf03e-59e3-0dba-a509-298f4c5b51a4" }
{ "account_age_days": 611, "account_id": "ACCT-0889521C2BDF", "baseline_risk_score": 0.151, "kyc_tier": "tier_1", "session_entropy": 0.758 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "KY", "latency_ms": 568, "timestamp": "2026-01-04T06:51:00Z", "transaction_amount_usd": 1936410.41 }, { "asset": "USDT", "burst_indicator": false, "event_name": "ORDER_BO...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.929, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 3866783.61, "financial_exposure_usd": 5126146.38, "recoverable_pct": 0.914 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104093", "label": "fraudulent", "label_confidence": 0.739, "severity": "medium", "timestamp": "2026-01-03T20:13:00Z", "trace_id": "29c3a4a9-29df-0a29-a785-0e2b2b0656bd" }
{ "account_age_days": 821, "account_id": "ACCT-E410627EFEBF", "baseline_risk_score": 0.107, "kyc_tier": "tier_3", "session_entropy": 0.534 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "RU", "latency_ms": 200, "timestamp": "2026-01-03T10:27:00Z", "transaction_amount_usd": 19.04 }, { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.779, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 4093809.19, "financial_exposure_usd": 6880179.38, "recoverable_pct": 0.989 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106957", "label": "benign", "label_confidence": 0.568, "severity": "high", "timestamp": "2026-01-05T19:57:00Z", "trace_id": "a1bf4365-4e9d-477e-5d95-702b06ed5a17" }
{ "account_age_days": 576, "account_id": "ACCT-01F313222A61", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.321 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "FR", "latency_ms": 389, "timestamp": "2026-01-05T14:02:00Z", "transaction_amount_usd": 16.89 }, { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.688, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 2356.33, "financial_exposure_usd": 4123.42, "recoverable_pct": 0.962 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101956", "label": "fraudulent", "label_confidence": 0.978, "severity": "low", "timestamp": "2026-01-02T08:36:00Z", "trace_id": "8f00c549-937b-dad6-d4b3-6fc65d1dd80b" }
{ "account_age_days": 368, "account_id": "ACCT-7F8011B64D91", "baseline_risk_score": 0.383, "kyc_tier": "tier_1", "session_entropy": 0.55 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "KY", "latency_ms": 1176, "timestamp": "2026-01-02T08:36:00Z", "transaction_amount_usd": 111733.05 }, { "asset": "EUR", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.649, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 520358.74, "financial_exposure_usd": 683226.82, "recoverable_pct": 0.022 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106250", "label": "fraudulent", "label_confidence": 0.94, "severity": "high", "timestamp": "2026-01-05T08:10:00Z", "trace_id": "4a4b53f1-4ef5-322c-d239-e25964e08ceb" }
{ "account_age_days": 1368, "account_id": "ACCT-62E500037863", "baseline_risk_score": 0.333, "kyc_tier": "tier_1", "session_entropy": 0.703 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "JP", "latency_ms": 556, "timestamp": "2026-01-05T08:10:00Z", "transaction_amount_usd": 2892421.75 }, { "asset": "ETH", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.395, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 2228916.27, "financial_exposure_usd": 2972137.34, "recoverable_pct": 0.823 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101323", "label": "fraudulent", "label_confidence": 0.901, "severity": "medium", "timestamp": "2026-01-01T22:03:00Z", "trace_id": "348a925b-23e5-a5a4-c7d3-a418a2731dbc" }
{ "account_age_days": 1464, "account_id": "ACCT-D850034E6F96", "baseline_risk_score": 0.594, "kyc_tier": "tier_2", "session_entropy": 0.894 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "RU", "latency_ms": 762, "timestamp": "2026-01-01T22:03:00Z", "transaction_amount_usd": 91846.56 }, { "asset": "USDC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.817, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 29141.75, "financial_exposure_usd": 52828.29, "recoverable_pct": 0.809 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108138", "label": "benign", "label_confidence": 0.499, "severity": "medium", "timestamp": "2026-01-06T15:38:00Z", "trace_id": "b598bd2c-2567-d6bb-01d5-c441a8917f22" }
{ "account_age_days": 1243, "account_id": "ACCT-E6AD4ACD8794", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.948 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "HK", "latency_ms": 148, "timestamp": "2026-01-06T07:27:00Z", "transaction_amount_usd": 6.43 }, { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.633, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 2126.72, "financial_exposure_usd": 3319.53, "recoverable_pct": 0.759 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105818", "label": "fraudulent", "label_confidence": 0.756, "severity": "high", "timestamp": "2026-01-05T00:58:00Z", "trace_id": "da722ff8-49c4-3164-5b87-8fd8854d1d6c" }
{ "account_age_days": 1880, "account_id": "ACCT-EB06092F179F", "baseline_risk_score": 0.434, "kyc_tier": "tier_3", "session_entropy": 0.761 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "RU", "latency_ms": 1019, "timestamp": "2026-01-05T00:58:00Z", "transaction_amount_usd": 2516217.54 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.74, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p...
{ "customer_funds_at_risk_usd": 3196912.4, "financial_exposure_usd": 5274446.21, "recoverable_pct": 0.451 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109249", "label": "benign", "label_confidence": 0.731, "severity": "low", "timestamp": "2026-01-07T10:09:00Z", "trace_id": "439eb26f-2186-bfdc-4c64-fe9ae77904d7" }
{ "account_age_days": 1378, "account_id": "ACCT-53DCB2CE60F0", "baseline_risk_score": 0.077, "kyc_tier": "tier_1", "session_entropy": 0.325 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "VN", "latency_ms": 948, "timestamp": "2026-01-07T10:09:00Z", "transaction_amount_usd": 10813.46 }, { "asset": "JPY", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.679, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 3233.39, "financial_exposure_usd": 5678.83, "recoverable_pct": 0.924 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105953", "label": "fraudulent", "label_confidence": 0.698, "severity": "medium", "timestamp": "2026-01-05T03:13:00Z", "trace_id": "6961732a-25d5-3597-ebe1-de1d605914e7" }
{ "account_age_days": 1150, "account_id": "ACCT-8DA4AE8CA2C6", "baseline_risk_score": 0.132, "kyc_tier": "tier_1", "session_entropy": 0.859 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "DE", "latency_ms": 919, "timestamp": "2026-01-05T03:13:00Z", "transaction_amount_usd": 937728.49 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOOK_...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.6, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 3351223.05, "financial_exposure_usd": 6389457.91, "recoverable_pct": 0.543 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102773", "label": "fraudulent", "label_confidence": 0.766, "severity": "medium", "timestamp": "2026-01-02T22:13:00Z", "trace_id": "a19e454d-1b80-e894-826f-b4ccc417b130" }
{ "account_age_days": 788, "account_id": "ACCT-5CA32298CF63", "baseline_risk_score": 0.631, "kyc_tier": "tier_1", "session_entropy": 0.919 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "PK", "latency_ms": 1137, "timestamp": "2026-01-02T22:13:00Z", "transaction_amount_usd": 107033.32 }, { "asset": "GBP", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.868, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 4", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 459194.08, "financial_exposure_usd": 568137.45, "recoverable_pct": 0.177 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107855", "label": "benign", "label_confidence": 0.676, "severity": "critical", "timestamp": "2026-01-06T10:55:00Z", "trace_id": "d6881fd1-7f94-7af0-7bef-cb08904898be" }
{ "account_age_days": 1440, "account_id": "ACCT-717F1072250F", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.63 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "LU", "latency_ms": 292, "timestamp": "2026-01-06T09:31:00Z", "transaction_amount_usd": 4.23 }, { "asset": "SOL", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "ge...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.574, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 1903.11, "financial_exposure_usd": 2651.76, "recoverable_pct": 0.652 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102769", "label": "fraudulent", "label_confidence": 0.881, "severity": "low", "timestamp": "2026-01-02T22:09:00Z", "trace_id": "d58ea520-09f1-f566-a701-bf08c264bde7" }
{ "account_age_days": 826, "account_id": "ACCT-DEABACA96204", "baseline_risk_score": 0.53, "kyc_tier": "tier_3", "session_entropy": 0.779 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "PK", "latency_ms": 244, "timestamp": "2026-01-02T20:14:00Z", "transaction_amount_usd": 10.45 }, { "asset": "JPY", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.647, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 523900.87, "financial_exposure_usd": 938168.01, "recoverable_pct": 0.267 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100320", "label": "fraudulent", "label_confidence": 0.94, "severity": "critical", "timestamp": "2026-01-01T05:20:00Z", "trace_id": "496ff6e3-0495-061f-9080-810858904829" }
{ "account_age_days": 17, "account_id": "ACCT-168E8BF69F3D", "baseline_risk_score": 0.37, "kyc_tier": "tier_2", "session_entropy": 0.383 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CA", "latency_ms": 434, "timestamp": "2026-01-01T05:20:00Z", "transaction_amount_usd": 48011.14 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.782, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 802161.41, "financial_exposure_usd": 819851.07, "recoverable_pct": 0.263 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108016", "label": "benign", "label_confidence": 0.637, "severity": "low", "timestamp": "2026-01-06T13:36:00Z", "trace_id": "29aa17a8-f157-8100-1787-91153ff87864" }
{ "account_age_days": 1546, "account_id": "ACCT-DE82D49AE760", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.622 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "FR", "latency_ms": 1176, "timestamp": "2026-01-06T13:36:00Z", "transaction_amount_usd": 630.71 }, { "asset": "EUR", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.469, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 2333.59, "financial_exposure_usd": 5725.85, "recoverable_pct": 0.536 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102265", "label": "fraudulent", "label_confidence": 0.91, "severity": "critical", "timestamp": "2026-01-02T13:45:00Z", "trace_id": "d9bffae2-d0a7-fe50-cea6-8cc8d6067c47" }
{ "account_age_days": 514, "account_id": "ACCT-860EC4FCC8DD", "baseline_risk_score": 0.517, "kyc_tier": "tier_1", "session_entropy": 0.442 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CN", "latency_ms": 668, "timestamp": "2026-01-02T13:45:00Z", "transaction_amount_usd": 17949.44 }, { "asset": "USDC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.837, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 445549.91, "financial_exposure_usd": 688164.95, "recoverable_pct": 0.455 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106699", "label": "benign", "label_confidence": 0.726, "severity": "low", "timestamp": "2026-01-05T15:39:00Z", "trace_id": "d4a54960-ae72-ce51-5037-b2cac036de2c" }
{ "account_age_days": 969, "account_id": "ACCT-B4ECACEA94FA", "baseline_risk_score": 0.113, "kyc_tier": "tier_2", "session_entropy": 0.501 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "KY", "latency_ms": 159, "timestamp": "2026-01-05T10:29:00Z", "transaction_amount_usd": 3.74 }, { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.772, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 393, "financial_exposure_usd": 647.16, "recoverable_pct": 0.415 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108098", "label": "benign", "label_confidence": 0.682, "severity": "high", "timestamp": "2026-01-06T14:58:00Z", "trace_id": "512dbd6f-dd36-2ede-3643-94ff37c9f6ee" }
{ "account_age_days": 1388, "account_id": "ACCT-11D0322A889F", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.223 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "IT", "latency_ms": 254, "timestamp": "2026-01-06T14:58:00Z", "transaction_amount_usd": 10937.37 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.456, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 5272.41, "financial_exposure_usd": 7478.85, "recoverable_pct": 0.938 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109991", "label": "benign", "label_confidence": 0.592, "severity": "medium", "timestamp": "2026-01-07T22:31:00Z", "trace_id": "ba0a6ff1-1a7f-c3af-4961-98c73ce58d17" }
{ "account_age_days": 1035, "account_id": "ACCT-DF8C10C4FE43", "baseline_risk_score": 0.163, "kyc_tier": "tier_2", "session_entropy": 0.822 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "TH", "latency_ms": 832, "timestamp": "2026-01-07T22:31:00Z", "transaction_amount_usd": 11314.67 }, { "asset": "USDC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.584, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 2616.45, "financial_exposure_usd": 3291.36, "recoverable_pct": 0.738 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102681", "label": "fraudulent", "label_confidence": 0.765, "severity": "high", "timestamp": "2026-01-02T20:41:00Z", "trace_id": "b07dc00b-dd28-b721-d218-fa595de00edc" }
{ "account_age_days": 984, "account_id": "ACCT-C5DD1A8B0317", "baseline_risk_score": 0.376, "kyc_tier": "tier_2", "session_entropy": 0.62 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "VE", "latency_ms": 604, "timestamp": "2026-01-02T20:41:00Z", "transaction_amount_usd": 14770.85 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.719, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 450762.42, "financial_exposure_usd": 1036522.18, "recoverable_pct": 0.312 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105381", "label": "fraudulent", "label_confidence": 0.675, "severity": "medium", "timestamp": "2026-01-04T17:41:00Z", "trace_id": "f678bfe4-031c-81ed-5221-b87aa9860a8b" }
{ "account_age_days": 1224, "account_id": "ACCT-8610C40DA8BA", "baseline_risk_score": 0.066, "kyc_tier": "tier_3", "session_entropy": 0.785 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "AE", "latency_ms": 374, "timestamp": "2026-01-04T13:27:00Z", "transaction_amount_usd": 1.52 }, { "asset": "USDC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.935, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 2277121.54, "financial_exposure_usd": 5366219.64, "recoverable_pct": 0.996 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100741", "label": "fraudulent", "label_confidence": 0.85, "severity": "critical", "timestamp": "2026-01-01T12:21:00Z", "trace_id": "15c45f58-161f-bab8-df50-a8c95b76a06d" }
{ "account_age_days": 1360, "account_id": "ACCT-8F43A70295D6", "baseline_risk_score": 0.601, "kyc_tier": "tier_2", "session_entropy": 0.284 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "PK", "latency_ms": 440, "timestamp": "2026-01-01T12:21:00Z", "transaction_amount_usd": 109413.82 }, { "asset": "USD", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.658, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 4", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 348139.42, "financial_exposure_usd": 509614.57, "recoverable_pct": 0.185 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102481", "label": "fraudulent", "label_confidence": 0.808, "severity": "medium", "timestamp": "2026-01-02T17:21:00Z", "trace_id": "c11a0ac7-f99c-16a1-6d31-f6a04da0f5b3" }
{ "account_age_days": 481, "account_id": "ACCT-DB5AE84E0256", "baseline_risk_score": 0.367, "kyc_tier": "tier_2", "session_entropy": 0.385 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CN", "latency_ms": 871, "timestamp": "2026-01-02T17:21:00Z", "transaction_amount_usd": 44763.25 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.405, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 481041.66, "financial_exposure_usd": 530848.82, "recoverable_pct": 0.305 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105635", "label": "fraudulent", "label_confidence": 0.614, "severity": "medium", "timestamp": "2026-01-04T21:55:00Z", "trace_id": "a78afb64-1f35-f17e-9276-967169c64a03" }
{ "account_age_days": 1026, "account_id": "ACCT-088409C47296", "baseline_risk_score": 0.19, "kyc_tier": "tier_3", "session_entropy": 0.837 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "JP", "latency_ms": 628, "timestamp": "2026-01-04T21:55:00Z", "transaction_amount_usd": 2448188.21 }, { "asset": "USDC", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.768, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 2796162.86, "financial_exposure_usd": 4469083.91, "recoverable_pct": 0.942 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103783", "label": "fraudulent", "label_confidence": 0.658, "severity": "medium", "timestamp": "2026-01-03T15:03:00Z", "trace_id": "53827401-c8bc-49ba-4be1-d3c017019e4b" }
{ "account_age_days": 1079, "account_id": "ACCT-CF689EC209E1", "baseline_risk_score": 0.105, "kyc_tier": "tier_3", "session_entropy": 0.935 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "AE", "latency_ms": 368, "timestamp": "2026-01-03T15:03:00Z", "transaction_amount_usd": 1963945.48 }, { "asset": "ETH", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.415, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 4635378.62, "financial_exposure_usd": 5064706.85, "recoverable_pct": 0.809 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109536", "label": "benign", "label_confidence": 0.689, "severity": "low", "timestamp": "2026-01-07T14:56:00Z", "trace_id": "9bb366e6-5203-bfa5-480c-404d93453d87" }
{ "account_age_days": 96, "account_id": "ACCT-AE9F3B2347C5", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.934 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "JP", "latency_ms": 1168, "timestamp": "2026-01-07T14:56:00Z", "transaction_amount_usd": 4658.63 }, { "asset": "USDC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.737, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 1514.03, "financial_exposure_usd": 2106.62, "recoverable_pct": 0.484 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108226", "label": "benign", "label_confidence": 0.636, "severity": "medium", "timestamp": "2026-01-06T17:06:00Z", "trace_id": "6c7aab2e-971c-e5e9-ae47-27ec62ce56ea" }
{ "account_age_days": 823, "account_id": "ACCT-4BFFDCA80C60", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.198 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "VN", "latency_ms": 122, "timestamp": "2026-01-06T17:06:00Z", "transaction_amount_usd": 13975.45 }, { "asset": "GBP", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.649, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 1849.71, "financial_exposure_usd": 3884.98, "recoverable_pct": 0.969 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107352", "label": "benign", "label_confidence": 0.467, "severity": "medium", "timestamp": "2026-01-06T02:32:00Z", "trace_id": "e1a76d50-9199-acfe-c471-526ea6575b70" }
{ "account_age_days": 1701, "account_id": "ACCT-8A3A0C93CFE7", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.491 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "DE", "latency_ms": 266, "timestamp": "2026-01-05T18:51:00Z", "transaction_amount_usd": 2.16 }, { "asset": "GBP", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.639, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 634.27, "financial_exposure_usd": 870.4, "recoverable_pct": 0.92 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109737", "label": "benign", "label_confidence": 0.545, "severity": "high", "timestamp": "2026-01-07T18:17:00Z", "trace_id": "7147d968-2312-4e14-590a-b3622027e37e" }
{ "account_age_days": 1271, "account_id": "ACCT-8D387DE11053", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.611 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "JP", "latency_ms": 256, "timestamp": "2026-01-07T13:33:00Z", "transaction_amount_usd": 13.32 }, { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.535, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 1523.54, "financial_exposure_usd": 1969.41, "recoverable_pct": 0.475 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103601", "label": "fraudulent", "label_confidence": 0.94, "severity": "critical", "timestamp": "2026-01-03T12:01:00Z", "trace_id": "e560543b-c0ef-41d6-7c32-ea4c943a3766" }
{ "account_age_days": 1385, "account_id": "ACCT-F127560226A1", "baseline_risk_score": 0.228, "kyc_tier": "tier_1", "session_entropy": 0.448 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "LU", "latency_ms": 682, "timestamp": "2026-01-03T12:01:00Z", "transaction_amount_usd": 1217871.23 }, { "asset": "EUR", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.764, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 643808.76, "financial_exposure_usd": 827918.58, "recoverable_pct": 0.766 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105058", "label": "fraudulent", "label_confidence": 0.782, "severity": "high", "timestamp": "2026-01-04T12:18:00Z", "trace_id": "2691f87a-ada4-1f33-07c8-39c106f72ce8" }
{ "account_age_days": 128, "account_id": "ACCT-5FDB302B5FB9", "baseline_risk_score": 0.271, "kyc_tier": "tier_1", "session_entropy": 0.252 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "PK", "latency_ms": 205, "timestamp": "2026-01-04T09:10:00Z", "transaction_amount_usd": 16.33 }, { "asset": "JPY", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.805, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 1338559.17, "financial_exposure_usd": 1764120.52, "recoverable_pct": 0.913 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108975", "label": "benign", "label_confidence": 0.695, "severity": "high", "timestamp": "2026-01-07T05:35:00Z", "trace_id": "d63ea0c2-23c0-2478-70c6-0079eacd0098" }
{ "account_age_days": 616, "account_id": "ACCT-1B3376F25F1B", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.156 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "VN", "latency_ms": 148, "timestamp": "2026-01-07T05:35:00Z", "transaction_amount_usd": 8541.01 }, { "asset": "USDC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.546, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 1176.04, "financial_exposure_usd": 2488.62, "recoverable_pct": 0.792 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102012", "label": "fraudulent", "label_confidence": 0.884, "severity": "high", "timestamp": "2026-01-02T09:32:00Z", "trace_id": "eb017b02-c4a6-358a-5c22-bc7d492f0d9c" }
{ "account_age_days": 1898, "account_id": "ACCT-CFD46CC87CAD", "baseline_risk_score": 0.499, "kyc_tier": "tier_1", "session_entropy": 0.86 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "AE", "latency_ms": 134, "timestamp": "2026-01-02T09:32:00Z", "transaction_amount_usd": 107565.81 }, { "asset": "JPY", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.353, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 1149508.69, "financial_exposure_usd": 1166363.56, "recoverable_pct": 0.618 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105486", "label": "fraudulent", "label_confidence": 0.85, "severity": "medium", "timestamp": "2026-01-04T19:26:00Z", "trace_id": "7d4016f8-fc29-ce3b-22fa-f8e8430a1650" }
{ "account_age_days": 314, "account_id": "ACCT-75C41E293AC1", "baseline_risk_score": 0.448, "kyc_tier": "tier_2", "session_entropy": 0.268 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "LU", "latency_ms": 852, "timestamp": "2026-01-04T19:26:00Z", "transaction_amount_usd": 584682.27 }, { "asset": "ETH", "burst_indicator": false, "event_name": "ORDER_BOOK_...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.44, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN...
{ "customer_funds_at_risk_usd": 630470.95, "financial_exposure_usd": 689735.15, "recoverable_pct": 0.951 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103645", "label": "fraudulent", "label_confidence": 0.601, "severity": "critical", "timestamp": "2026-01-03T12:45:00Z", "trace_id": "1fe17e2c-8f5c-785d-453d-d494a9d8f706" }
{ "account_age_days": 1002, "account_id": "ACCT-3E6361711BCC", "baseline_risk_score": 0.169, "kyc_tier": "tier_3", "session_entropy": 0.776 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "LU", "latency_ms": 956, "timestamp": "2026-01-03T12:45:00Z", "transaction_amount_usd": 2137812 }, { "asset": "USDC", "burst_indicator": false, "event_name": "ORDER_BOOK_...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.584, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 5341696.13, "financial_exposure_usd": 6301762.61, "recoverable_pct": 0.746 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105649", "label": "fraudulent", "label_confidence": 0.859, "severity": "high", "timestamp": "2026-01-04T22:09:00Z", "trace_id": "2cd17daf-8651-5841-5a31-7ae94310d505" }
{ "account_age_days": 1136, "account_id": "ACCT-CAA1B265405D", "baseline_risk_score": 0.077, "kyc_tier": "tier_1", "session_entropy": 0.505 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "PK", "latency_ms": 712, "timestamp": "2026-01-04T22:09:00Z", "transaction_amount_usd": 2802902.68 }, { "asset": "USDT", "burst_indicator": false, "event_name": "ORDER_BO...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.448, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 2034623.73, "financial_exposure_usd": 4775514.6, "recoverable_pct": 0.607 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101141", "label": "fraudulent", "label_confidence": 0.835, "severity": "low", "timestamp": "2026-01-01T19:01:00Z", "trace_id": "9bf7adb8-e91c-fa50-e768-2c1c41e6fdf0" }
{ "account_age_days": 552, "account_id": "ACCT-91F0B199ADB4", "baseline_risk_score": 0.354, "kyc_tier": "tier_3", "session_entropy": 0.693 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "DE", "latency_ms": 912, "timestamp": "2026-01-01T19:01:00Z", "transaction_amount_usd": 16554.18 }, { "asset": "USDC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.772, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 231818.63, "financial_exposure_usd": 262968.12, "recoverable_pct": 0.687 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104357", "label": "fraudulent", "label_confidence": 0.776, "severity": "low", "timestamp": "2026-01-04T00:37:00Z", "trace_id": "f4d9c96f-4d9f-9c61-2c32-f20c92632100" }
{ "account_age_days": 54, "account_id": "ACCT-068944108A23", "baseline_risk_score": 0.24, "kyc_tier": "tier_1", "session_entropy": 0.859 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "LU", "latency_ms": 914, "timestamp": "2026-01-04T00:37:00Z", "transaction_amount_usd": 1644350.2 }, { "asset": "USDT", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.373, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 3756025.99, "financial_exposure_usd": 8450154.97, "recoverable_pct": 0.714 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103206", "label": "fraudulent", "label_confidence": 0.763, "severity": "high", "timestamp": "2026-01-03T05:26:00Z", "trace_id": "b9b05fb4-8215-12f7-8c51-26bc92a9e240" }
{ "account_age_days": 795, "account_id": "ACCT-AE7CF025D8BE", "baseline_risk_score": 0.494, "kyc_tier": "tier_1", "session_entropy": 0.127 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "PK", "latency_ms": 1156, "timestamp": "2026-01-03T05:26:00Z", "transaction_amount_usd": 24789.78 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.856, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 195039.94, "financial_exposure_usd": 333789.85, "recoverable_pct": 0.264 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109973", "label": "benign", "label_confidence": 0.451, "severity": "medium", "timestamp": "2026-01-07T22:13:00Z", "trace_id": "70c64ac3-4cb4-e57e-20c3-85c923582a02" }
{ "account_age_days": 211, "account_id": "ACCT-2EBE9911DA19", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.754 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "FR", "latency_ms": 271, "timestamp": "2026-01-07T15:28:00Z", "transaction_amount_usd": 17.16 }, { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.568, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 1176.63, "financial_exposure_usd": 1970.71, "recoverable_pct": 0.488 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108691", "label": "benign", "label_confidence": 0.672, "severity": "medium", "timestamp": "2026-01-07T00:51:00Z", "trace_id": "545d3e71-5ad1-821c-6ab2-18bc322fbac2" }
{ "account_age_days": 1244, "account_id": "ACCT-D484A323C51C", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.571 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "PT", "latency_ms": 1109, "timestamp": "2026-01-07T00:51:00Z", "transaction_amount_usd": 10357.99 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.715, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 569.98, "financial_exposure_usd": 750.55, "recoverable_pct": 0.814 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }