schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102987",
"label": "fraudulent",
"label_confidence": 0.771,
"severity": "critical",
"timestamp": "2026-01-03T01:47:00Z",
"trace_id": "11af4347-7507-c443-28df-7b763c45d720"
} | {
"account_age_days": 259,
"account_id": "ACCT-F9CA2A82EF14",
"baseline_risk_score": 0.504,
"kyc_tier": "tier_1",
"session_entropy": 0.784
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 260,
"timestamp": "2026-01-02T18:56:00Z",
"transaction_amount_usd": 17.03
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.759,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 699151.71,
"financial_exposure_usd": 832822.57,
"recoverable_pct": 0.209
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103929",
"label": "fraudulent",
"label_confidence": 0.937,
"severity": "high",
"timestamp": "2026-01-03T17:29:00Z",
"trace_id": "5c89f2ef-3aeb-172f-bd14-7547e3e99469"
} | {
"account_age_days": 394,
"account_id": "ACCT-0370AB7CEFF4",
"baseline_risk_score": 0.39,
"kyc_tier": "tier_2",
"session_entropy": 0.521
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 997,
"timestamp": "2026-01-03T17:29:00Z",
"transaction_amount_usd": 2261147.11
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.424,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4765466.9,
"financial_exposure_usd": 6174057.61,
"recoverable_pct": 0.955
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102144",
"label": "fraudulent",
"label_confidence": 0.939,
"severity": "critical",
"timestamp": "2026-01-02T11:44:00Z",
"trace_id": "31c6e414-9aa5-a6ad-e50f-b90ff1dd4ba8"
} | {
"account_age_days": 1373,
"account_id": "ACCT-F4D06969388D",
"baseline_risk_score": 0.593,
"kyc_tier": "tier_1",
"session_entropy": 0.466
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "MY",
"latency_ms": 294,
"timestamp": "2026-01-02T11:44:00Z",
"transaction_amount_usd": 83710.79
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.837,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 274459.87,
"financial_exposure_usd": 598934.41,
"recoverable_pct": 0.223
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104738",
"label": "fraudulent",
"label_confidence": 0.752,
"severity": "medium",
"timestamp": "2026-01-04T06:58:00Z",
"trace_id": "ebe6d700-988d-d6ec-72b5-5bbf65fe120f"
} | {
"account_age_days": 1416,
"account_id": "ACCT-1E7F244E2661",
"baseline_risk_score": 0.182,
"kyc_tier": "tier_3",
"session_entropy": 0.6
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 263,
"timestamp": "2026-01-04T06:58:00Z",
"transaction_amount_usd": 734602.95
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.747,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3171726.07,
"financial_exposure_usd": 3898217.86,
"recoverable_pct": 0.827
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106440",
"label": "fraudulent",
"label_confidence": 0.622,
"severity": "high",
"timestamp": "2026-01-05T11:20:00Z",
"trace_id": "b87cb388-806c-bfaf-94c8-c1c093dc4759"
} | {
"account_age_days": 761,
"account_id": "ACCT-0BE0A8F4FA5C",
"baseline_risk_score": 0.075,
"kyc_tier": "tier_2",
"session_entropy": 0.6
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 136,
"timestamp": "2026-01-05T03:45:00Z",
"transaction_amount_usd": 21.25
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.47,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 1175714.4,
"financial_exposure_usd": 1920592.68,
"recoverable_pct": 0.453
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105753",
"label": "fraudulent",
"label_confidence": 0.706,
"severity": "medium",
"timestamp": "2026-01-04T23:53:00Z",
"trace_id": "60865e9c-e0c3-ee12-d1e4-28baa1472046"
} | {
"account_age_days": 928,
"account_id": "ACCT-1E3BBCB9931F",
"baseline_risk_score": 0.253,
"kyc_tier": "tier_2",
"session_entropy": 0.666
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 302,
"timestamp": "2026-01-04T19:16:00Z",
"transaction_amount_usd": 11.97
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.774,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1026755.54,
"financial_exposure_usd": 1736196.48,
"recoverable_pct": 0.867
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108688",
"label": "benign",
"label_confidence": 0.674,
"severity": "high",
"timestamp": "2026-01-07T00:48:00Z",
"trace_id": "e511fa98-dcae-bf31-dd8d-cf46282f864a"
} | {
"account_age_days": 1490,
"account_id": "ACCT-A53507D51638",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.146
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 187,
"timestamp": "2026-01-06T19:05:00Z",
"transaction_amount_usd": 15.51
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.497,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 4211.32,
"financial_exposure_usd": 6560,
"recoverable_pct": 0.699
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101437",
"label": "fraudulent",
"label_confidence": 0.852,
"severity": "high",
"timestamp": "2026-01-01T23:57:00Z",
"trace_id": "24d27283-3edf-1daa-8f31-abf9d3b14689"
} | {
"account_age_days": 910,
"account_id": "ACCT-332DE2ABD3CE",
"baseline_risk_score": 0.528,
"kyc_tier": "tier_2",
"session_entropy": 0.332
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 397,
"timestamp": "2026-01-01T16:36:00Z",
"transaction_amount_usd": 10.22
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.363,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 687695.52,
"financial_exposure_usd": 742155.99,
"recoverable_pct": 0.765
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106626",
"label": "fraudulent",
"label_confidence": 0.71,
"severity": "critical",
"timestamp": "2026-01-05T14:26:00Z",
"trace_id": "16ccfa18-37a8-1a2a-e443-9f8f602abc22"
} | {
"account_age_days": 747,
"account_id": "ACCT-29E368CF9F69",
"baseline_risk_score": 0.409,
"kyc_tier": "tier_2",
"session_entropy": 0.709
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 102,
"timestamp": "2026-01-05T14:26:00Z",
"transaction_amount_usd": 2717389.95
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.894,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 804460.31,
"financial_exposure_usd": 1715814.27,
"recoverable_pct": 0.433
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102852",
"label": "fraudulent",
"label_confidence": 0.887,
"severity": "critical",
"timestamp": "2026-01-02T23:32:00Z",
"trace_id": "993aceee-5c86-bad5-7e46-c1e43cece45d"
} | {
"account_age_days": 529,
"account_id": "ACCT-8CC23CB9DB11",
"baseline_risk_score": 0.517,
"kyc_tier": "tier_3",
"session_entropy": 0.451
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 505,
"timestamp": "2026-01-02T23:32:00Z",
"transaction_amount_usd": 69903.45
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.831,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 464632.15,
"financial_exposure_usd": 678284.25,
"recoverable_pct": 0.037
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101721",
"label": "fraudulent",
"label_confidence": 0.975,
"severity": "high",
"timestamp": "2026-01-02T04:41:00Z",
"trace_id": "fa4296dc-0fbc-eb95-e008-c675920cb8f4"
} | {
"account_age_days": 282,
"account_id": "ACCT-E0E30DD97AC0",
"baseline_risk_score": 0.401,
"kyc_tier": "tier_2",
"session_entropy": 0.872
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 100,
"timestamp": "2026-01-01T21:55:00Z",
"transaction_amount_usd": 7.59
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.541,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 220533.39,
"financial_exposure_usd": 278792.92,
"recoverable_pct": 0.398
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101545",
"label": "fraudulent",
"label_confidence": 0.813,
"severity": "high",
"timestamp": "2026-01-02T01:45:00Z",
"trace_id": "c42d58bd-f9cb-c1a9-cb35-e974b4a46ee2"
} | {
"account_age_days": 1950,
"account_id": "ACCT-2DC3E3F5B5DD",
"baseline_risk_score": 0.357,
"kyc_tier": "tier_2",
"session_entropy": 0.925
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 551,
"timestamp": "2026-01-02T01:45:00Z",
"transaction_amount_usd": 45946.51
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.619,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 306145.6,
"financial_exposure_usd": 679043.8,
"recoverable_pct": 0.417
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101206",
"label": "fraudulent",
"label_confidence": 0.963,
"severity": "high",
"timestamp": "2026-01-01T20:06:00Z",
"trace_id": "44239bbf-1939-b74f-7bc0-1babf6da958a"
} | {
"account_age_days": 1685,
"account_id": "ACCT-9A900BAF6717",
"baseline_risk_score": 0.408,
"kyc_tier": "tier_1",
"session_entropy": 0.223
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 774,
"timestamp": "2026-01-01T20:06:00Z",
"transaction_amount_usd": 35912.46
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.421,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 235129.24,
"financial_exposure_usd": 320543.66,
"recoverable_pct": 0.572
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103346",
"label": "fraudulent",
"label_confidence": 0.635,
"severity": "high",
"timestamp": "2026-01-03T07:46:00Z",
"trace_id": "5b956318-e248-e1ee-60e5-b6552073802e"
} | {
"account_age_days": 754,
"account_id": "ACCT-5B6234061528",
"baseline_risk_score": 0.256,
"kyc_tier": "tier_1",
"session_entropy": 0.655
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 164,
"timestamp": "2026-01-03T07:46:00Z",
"transaction_amount_usd": 1636771.46
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.355,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2236390.9,
"financial_exposure_usd": 5512364.8,
"recoverable_pct": 0.858
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100376",
"label": "fraudulent",
"label_confidence": 0.892,
"severity": "medium",
"timestamp": "2026-01-01T06:16:00Z",
"trace_id": "8d73e3f8-54f9-9b39-d077-5ab451a5d268"
} | {
"account_age_days": 554,
"account_id": "ACCT-D9502B0D9CE5",
"baseline_risk_score": 0.539,
"kyc_tier": "tier_2",
"session_entropy": 0.438
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "LU",
"latency_ms": 122,
"timestamp": "2026-01-01T06:16:00Z",
"transaction_amount_usd": 109838.51
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.814,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 558310.16,
"financial_exposure_usd": 609636.18,
"recoverable_pct": 0.153
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103298",
"label": "fraudulent",
"label_confidence": 0.77,
"severity": "critical",
"timestamp": "2026-01-03T06:58:00Z",
"trace_id": "2ad9c32f-94fe-df36-0315-195a727bdfdd"
} | {
"account_age_days": 334,
"account_id": "ACCT-19B753107E59",
"baseline_risk_score": 0.611,
"kyc_tier": "tier_1",
"session_entropy": 0.843
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 127,
"timestamp": "2026-01-03T02:39:00Z",
"transaction_amount_usd": 12.87
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.735,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 773528.82,
"financial_exposure_usd": 855445.14,
"recoverable_pct": 0.156
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102109",
"label": "fraudulent",
"label_confidence": 0.961,
"severity": "medium",
"timestamp": "2026-01-02T11:09:00Z",
"trace_id": "e1ae4748-8070-ef5b-0714-8891a10b0cfd"
} | {
"account_age_days": 7,
"account_id": "ACCT-730A5A6E2E62",
"baseline_risk_score": 0.57,
"kyc_tier": "tier_3",
"session_entropy": 0.215
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 972,
"timestamp": "2026-01-02T11:09:00Z",
"transaction_amount_usd": 103029.13
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.384,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 386498.07,
"financial_exposure_usd": 953654.42,
"recoverable_pct": 0.461
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101037",
"label": "fraudulent",
"label_confidence": 0.964,
"severity": "medium",
"timestamp": "2026-01-01T17:17:00Z",
"trace_id": "d92042d1-f31c-1c24-40c0-9894a68a4282"
} | {
"account_age_days": 169,
"account_id": "ACCT-CC73FD168A6C",
"baseline_risk_score": 0.623,
"kyc_tier": "tier_2",
"session_entropy": 0.316
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 177,
"timestamp": "2026-01-01T09:40:00Z",
"transaction_amount_usd": 16.53
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.644,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 159961.87,
"financial_exposure_usd": 360762.56,
"recoverable_pct": 0.625
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101553",
"label": "fraudulent",
"label_confidence": 0.831,
"severity": "medium",
"timestamp": "2026-01-02T01:53:00Z",
"trace_id": "df810e29-0949-27d5-410f-73b3743c92eb"
} | {
"account_age_days": 1341,
"account_id": "ACCT-B3EE1A691155",
"baseline_risk_score": 0.454,
"kyc_tier": "tier_2",
"session_entropy": 0.632
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 588,
"timestamp": "2026-01-02T01:53:00Z",
"transaction_amount_usd": 31291.89
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.947,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 8361.34,
"financial_exposure_usd": 11585.64,
"recoverable_pct": 0.728
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102062",
"label": "fraudulent",
"label_confidence": 0.952,
"severity": "high",
"timestamp": "2026-01-02T10:22:00Z",
"trace_id": "15d0eb11-5200-f6c1-a3d8-0c1e0e36b22f"
} | {
"account_age_days": 656,
"account_id": "ACCT-F19B3DDDA4F3",
"baseline_risk_score": 0.583,
"kyc_tier": "tier_3",
"session_entropy": 0.658
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 82,
"timestamp": "2026-01-02T02:05:00Z",
"transaction_amount_usd": 20.68
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.518,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 9",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 220537.57,
"financial_exposure_usd": 282934.87,
"recoverable_pct": 0.602
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102036",
"label": "fraudulent",
"label_confidence": 0.949,
"severity": "medium",
"timestamp": "2026-01-02T09:56:00Z",
"trace_id": "61596810-2890-c547-e47a-bc55ac5ae280"
} | {
"account_age_days": 569,
"account_id": "ACCT-DD664C473564",
"baseline_risk_score": 0.306,
"kyc_tier": "tier_3",
"session_entropy": 0.121
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 91,
"timestamp": "2026-01-02T00:57:00Z",
"transaction_amount_usd": 16.6
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.61,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 213794.09,
"financial_exposure_usd": 467164.46,
"recoverable_pct": 0.585
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105152",
"label": "fraudulent",
"label_confidence": 0.793,
"severity": "medium",
"timestamp": "2026-01-04T13:52:00Z",
"trace_id": "6b346308-b037-6464-409c-087f30dfc04e"
} | {
"account_age_days": 773,
"account_id": "ACCT-52F160BB7514",
"baseline_risk_score": 0.435,
"kyc_tier": "tier_2",
"session_entropy": 0.398
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 343,
"timestamp": "2026-01-04T09:08:00Z",
"transaction_amount_usd": 21.22
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.645,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4320947.87,
"financial_exposure_usd": 5018593.51,
"recoverable_pct": 0.426
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104646",
"label": "fraudulent",
"label_confidence": 0.828,
"severity": "high",
"timestamp": "2026-01-04T05:26:00Z",
"trace_id": "6985a4ff-8003-0d4c-d0d4-170a479c68ec"
} | {
"account_age_days": 489,
"account_id": "ACCT-E6AF04B7DDB9",
"baseline_risk_score": 0.4,
"kyc_tier": "tier_2",
"session_entropy": 0.899
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 904,
"timestamp": "2026-01-04T05:26:00Z",
"transaction_amount_usd": 2576703.47
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.352,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4619507.59,
"financial_exposure_usd": 7029585.69,
"recoverable_pct": 0.812
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105583",
"label": "fraudulent",
"label_confidence": 0.918,
"severity": "critical",
"timestamp": "2026-01-04T21:03:00Z",
"trace_id": "76adfef0-574a-4667-a8cf-ea6f0a843faf"
} | {
"account_age_days": 1092,
"account_id": "ACCT-7CA9230A4E01",
"baseline_risk_score": 0.357,
"kyc_tier": "tier_3",
"session_entropy": 0.846
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 1050,
"timestamp": "2026-01-04T21:03:00Z",
"transaction_amount_usd": 2219012.82
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.898,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1699832.39,
"financial_exposure_usd": 1929418,
"recoverable_pct": 0.624
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102015",
"label": "fraudulent",
"label_confidence": 0.834,
"severity": "high",
"timestamp": "2026-01-02T09:35:00Z",
"trace_id": "ee2b2418-cb7b-4adc-2ffa-dccd16259f07"
} | {
"account_age_days": 1900,
"account_id": "ACCT-7FD7F67F4B5C",
"baseline_risk_score": 0.439,
"kyc_tier": "tier_3",
"session_entropy": 0.521
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 1037,
"timestamp": "2026-01-02T09:35:00Z",
"transaction_amount_usd": 101939.71
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.888,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 738211.51,
"financial_exposure_usd": 967725.54,
"recoverable_pct": 0.359
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103551",
"label": "fraudulent",
"label_confidence": 0.817,
"severity": "high",
"timestamp": "2026-01-03T11:11:00Z",
"trace_id": "45eb7fc6-1369-a619-9bac-c92673c18f0c"
} | {
"account_age_days": 814,
"account_id": "ACCT-23F872E6D88E",
"baseline_risk_score": 0.446,
"kyc_tier": "tier_3",
"session_entropy": 0.617
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 102,
"timestamp": "2026-01-03T11:11:00Z",
"transaction_amount_usd": 2399198.51
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.361,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2128315.2,
"financial_exposure_usd": 5109825.48,
"recoverable_pct": 0.949
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105131",
"label": "fraudulent",
"label_confidence": 0.748,
"severity": "critical",
"timestamp": "2026-01-04T13:31:00Z",
"trace_id": "a8d43d85-9ab2-8db7-9d62-7fb228ce8830"
} | {
"account_age_days": 1970,
"account_id": "ACCT-27BD9A9DFAD7",
"baseline_risk_score": 0.179,
"kyc_tier": "tier_2",
"session_entropy": 0.701
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 368,
"timestamp": "2026-01-04T07:32:00Z",
"transaction_amount_usd": 17.16
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.429,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 9",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4347478.38,
"financial_exposure_usd": 5121351.52,
"recoverable_pct": 0.761
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109919",
"label": "benign",
"label_confidence": 0.492,
"severity": "low",
"timestamp": "2026-01-07T21:19:00Z",
"trace_id": "4dce5f4b-9a19-a61c-1f10-93f1f039755b"
} | {
"account_age_days": 678,
"account_id": "ACCT-64BB723B6F44",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.249
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 273,
"timestamp": "2026-01-07T21:19:00Z",
"transaction_amount_usd": 11369.37
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.567,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1637,
"financial_exposure_usd": 2398.54,
"recoverable_pct": 0.683
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103538",
"label": "fraudulent",
"label_confidence": 0.609,
"severity": "medium",
"timestamp": "2026-01-03T10:58:00Z",
"trace_id": "f5e227e7-908d-0438-d9a5-1f841d142265"
} | {
"account_age_days": 846,
"account_id": "ACCT-DA3FDDD6185D",
"baseline_risk_score": 0.202,
"kyc_tier": "tier_3",
"session_entropy": 0.923
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 210,
"timestamp": "2026-01-03T10:58:00Z",
"transaction_amount_usd": 2866781.33
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.735,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4892143.59,
"financial_exposure_usd": 5174353.17,
"recoverable_pct": 0.876
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109905",
"label": "benign",
"label_confidence": 0.746,
"severity": "low",
"timestamp": "2026-01-07T21:05:00Z",
"trace_id": "4ce8c966-821f-644e-6e51-b2942d3132b5"
} | {
"account_age_days": 1803,
"account_id": "ACCT-E6E41AE21FCB",
"baseline_risk_score": 0.159,
"kyc_tier": "tier_1",
"session_entropy": 0.257
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 238,
"timestamp": "2026-01-07T13:29:00Z",
"transaction_amount_usd": 8.37
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.791,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3608.36,
"financial_exposure_usd": 5628.61,
"recoverable_pct": 0.77
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100241",
"label": "fraudulent",
"label_confidence": 0.836,
"severity": "medium",
"timestamp": "2026-01-01T04:01:00Z",
"trace_id": "8750be7b-d5bb-e3a4-40b8-7dc36444ea5b"
} | {
"account_age_days": 1618,
"account_id": "ACCT-0AD56E56DF9B",
"baseline_risk_score": 0.628,
"kyc_tier": "tier_1",
"session_entropy": 0.259
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "HK",
"latency_ms": 609,
"timestamp": "2026-01-01T04:01:00Z",
"transaction_amount_usd": 109870.57
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.554,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 213616.8,
"financial_exposure_usd": 370669.53,
"recoverable_pct": 0.815
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106976",
"label": "benign",
"label_confidence": 0.717,
"severity": "medium",
"timestamp": "2026-01-05T20:16:00Z",
"trace_id": "ecdf6172-e83b-ec05-76da-b5e356ac24bc"
} | {
"account_age_days": 337,
"account_id": "ACCT-38AF8E964749",
"baseline_risk_score": 0.07,
"kyc_tier": "tier_3",
"session_entropy": 0.81
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 878,
"timestamp": "2026-01-05T20:16:00Z",
"transaction_amount_usd": 3919.44
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.556,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3103.89,
"financial_exposure_usd": 3773.28,
"recoverable_pct": 0.445
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108856",
"label": "benign",
"label_confidence": 0.477,
"severity": "low",
"timestamp": "2026-01-07T03:36:00Z",
"trace_id": "9573ec8c-01ad-c1ae-1262-a94510c39916"
} | {
"account_age_days": 340,
"account_id": "ACCT-3C21BC306C34",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.214
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 364,
"timestamp": "2026-01-06T23:54:00Z",
"transaction_amount_usd": 11.69
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.785,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1054.54,
"financial_exposure_usd": 2604.34,
"recoverable_pct": 0.709
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107032",
"label": "benign",
"label_confidence": 0.569,
"severity": "low",
"timestamp": "2026-01-05T21:12:00Z",
"trace_id": "e259d1e4-75f4-70e8-f3d2-740873a50606"
} | {
"account_age_days": 471,
"account_id": "ACCT-BADC969719BC",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.45
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 323,
"timestamp": "2026-01-05T08:49:00Z",
"transaction_amount_usd": 6.16
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.459,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2747.54,
"financial_exposure_usd": 3754.03,
"recoverable_pct": 0.893
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100505",
"label": "fraudulent",
"label_confidence": 0.848,
"severity": "medium",
"timestamp": "2026-01-01T08:25:00Z",
"trace_id": "afae9a24-a42e-024f-c4be-a518c1e50b4e"
} | {
"account_age_days": 422,
"account_id": "ACCT-F732BC85092B",
"baseline_risk_score": 0.262,
"kyc_tier": "tier_3",
"session_entropy": 0.487
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 1161,
"timestamp": "2026-01-01T08:25:00Z",
"transaction_amount_usd": 22694.67
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.615,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 546911.3,
"financial_exposure_usd": 773156.99,
"recoverable_pct": 0.167
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104235",
"label": "fraudulent",
"label_confidence": 0.806,
"severity": "high",
"timestamp": "2026-01-03T22:35:00Z",
"trace_id": "44f4812e-d202-3f80-6344-12b182f3a4b7"
} | {
"account_age_days": 1351,
"account_id": "ACCT-EB71D3B90B3F",
"baseline_risk_score": 0.169,
"kyc_tier": "tier_3",
"session_entropy": 0.223
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 586,
"timestamp": "2026-01-03T22:35:00Z",
"transaction_amount_usd": 1921562.22
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.671,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3397391.55,
"financial_exposure_usd": 5160460.98,
"recoverable_pct": 0.988
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102883",
"label": "fraudulent",
"label_confidence": 0.805,
"severity": "high",
"timestamp": "2026-01-03T00:03:00Z",
"trace_id": "e8f201dc-02fc-66ec-1c0d-b8d10e99dc37"
} | {
"account_age_days": 1702,
"account_id": "ACCT-AE0EFE9089D0",
"baseline_risk_score": 0.264,
"kyc_tier": "tier_3",
"session_entropy": 0.329
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 956,
"timestamp": "2026-01-03T00:03:00Z",
"transaction_amount_usd": 90703.08
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.762,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 138667.07,
"financial_exposure_usd": 227866.87,
"recoverable_pct": 0.557
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101639",
"label": "fraudulent",
"label_confidence": 0.885,
"severity": "critical",
"timestamp": "2026-01-02T03:19:00Z",
"trace_id": "5cc9c11b-5252-2ad9-c063-c05f10b1b67b"
} | {
"account_age_days": 980,
"account_id": "ACCT-177B90EBE8DA",
"baseline_risk_score": 0.48,
"kyc_tier": "tier_1",
"session_entropy": 0.941
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 958,
"timestamp": "2026-01-02T03:19:00Z",
"transaction_amount_usd": 16538.96
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.855,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 672347.83,
"financial_exposure_usd": 697905.35,
"recoverable_pct": 0.504
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103808",
"label": "fraudulent",
"label_confidence": 0.76,
"severity": "critical",
"timestamp": "2026-01-03T15:28:00Z",
"trace_id": "4a013f9b-75b9-76f5-bc61-08e6266a5526"
} | {
"account_age_days": 1963,
"account_id": "ACCT-41B1FB9FEE7F",
"baseline_risk_score": 0.202,
"kyc_tier": "tier_2",
"session_entropy": 0.408
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 400,
"timestamp": "2026-01-03T15:28:00Z",
"transaction_amount_usd": 1016761.2
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.841,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3531207.81,
"financial_exposure_usd": 3993527.78,
"recoverable_pct": 0.713
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106811",
"label": "benign",
"label_confidence": 0.518,
"severity": "low",
"timestamp": "2026-01-05T17:31:00Z",
"trace_id": "2c8f7413-5dc3-c0e6-4e4d-2283e6d5dbde"
} | {
"account_age_days": 1648,
"account_id": "ACCT-A6DC4856ACAB",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.787
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 409,
"timestamp": "2026-01-05T17:31:00Z",
"transaction_amount_usd": 10247.11
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.545,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 7640.66,
"financial_exposure_usd": 8321.05,
"recoverable_pct": 0.935
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103919",
"label": "fraudulent",
"label_confidence": 0.613,
"severity": "high",
"timestamp": "2026-01-03T17:19:00Z",
"trace_id": "07cb002f-1399-04e9-ced2-6887c1aecdb5"
} | {
"account_age_days": 205,
"account_id": "ACCT-5199732BBEBA",
"baseline_risk_score": 0.074,
"kyc_tier": "tier_2",
"session_entropy": 0.174
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 451,
"timestamp": "2026-01-03T17:19:00Z",
"transaction_amount_usd": 1037333.97
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.743,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1319592.52,
"financial_exposure_usd": 3143764.84,
"recoverable_pct": 0.625
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100740",
"label": "fraudulent",
"label_confidence": 0.805,
"severity": "critical",
"timestamp": "2026-01-01T12:20:00Z",
"trace_id": "662cdf39-9c05-8fbd-ae67-52dd8cddcdba"
} | {
"account_age_days": 816,
"account_id": "ACCT-FAF8FBD12FD5",
"baseline_risk_score": 0.583,
"kyc_tier": "tier_3",
"session_entropy": 0.74
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 294,
"timestamp": "2026-01-01T02:05:00Z",
"transaction_amount_usd": 23.16
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.813,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 399033.13,
"financial_exposure_usd": 983407.85,
"recoverable_pct": 0.457
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101026",
"label": "fraudulent",
"label_confidence": 0.935,
"severity": "high",
"timestamp": "2026-01-01T17:06:00Z",
"trace_id": "8b13dd5e-80ab-90b8-3f02-380d2e349d8d"
} | {
"account_age_days": 1057,
"account_id": "ACCT-3D7D7B2F6602",
"baseline_risk_score": 0.489,
"kyc_tier": "tier_3",
"session_entropy": 0.668
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 162,
"timestamp": "2026-01-01T11:03:00Z",
"transaction_amount_usd": 23.22
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.462,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 294681.8,
"financial_exposure_usd": 327859.38,
"recoverable_pct": 0.804
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102411",
"label": "fraudulent",
"label_confidence": 0.79,
"severity": "medium",
"timestamp": "2026-01-02T16:11:00Z",
"trace_id": "8e256311-1bfa-97fe-7edb-3277258db8c9"
} | {
"account_age_days": 908,
"account_id": "ACCT-41B0B480C90E",
"baseline_risk_score": 0.598,
"kyc_tier": "tier_2",
"session_entropy": 0.167
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NL",
"latency_ms": 180,
"timestamp": "2026-01-02T16:11:00Z",
"transaction_amount_usd": 87658.33
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.591,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 490604.49,
"financial_exposure_usd": 856984.86,
"recoverable_pct": 0.842
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101865",
"label": "fraudulent",
"label_confidence": 0.968,
"severity": "high",
"timestamp": "2026-01-02T07:05:00Z",
"trace_id": "0aaa5503-438f-cd71-505d-3daf1b67600d"
} | {
"account_age_days": 680,
"account_id": "ACCT-A23B5C43304A",
"baseline_risk_score": 0.344,
"kyc_tier": "tier_3",
"session_entropy": 0.315
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "DE",
"latency_ms": 319,
"timestamp": "2026-01-02T07:05:00Z",
"transaction_amount_usd": 102046.49
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.84,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 157594.49,
"financial_exposure_usd": 198149.3,
"recoverable_pct": 0.1
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101515",
"label": "fraudulent",
"label_confidence": 0.922,
"severity": "high",
"timestamp": "2026-01-02T01:15:00Z",
"trace_id": "381c7140-ef34-6a20-a794-799cba7273c8"
} | {
"account_age_days": 899,
"account_id": "ACCT-98D21075A579",
"baseline_risk_score": 0.364,
"kyc_tier": "tier_2",
"session_entropy": 0.316
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 506,
"timestamp": "2026-01-02T01:15:00Z",
"transaction_amount_usd": 22167.29
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.875,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 490808.68,
"financial_exposure_usd": 507392,
"recoverable_pct": 0.701
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106795",
"label": "benign",
"label_confidence": 0.543,
"severity": "high",
"timestamp": "2026-01-05T17:15:00Z",
"trace_id": "70fca89a-dd21-466d-555e-790a27cf4410"
} | {
"account_age_days": 1073,
"account_id": "ACCT-A405E83BDFA9",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.851
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 370,
"timestamp": "2026-01-05T07:21:00Z",
"transaction_amount_usd": 21.95
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.508,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3206.67,
"financial_exposure_usd": 3743.54,
"recoverable_pct": 0.58
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100879",
"label": "fraudulent",
"label_confidence": 0.872,
"severity": "high",
"timestamp": "2026-01-01T14:39:00Z",
"trace_id": "36994369-57c5-bb61-5ca8-55942b8bb736"
} | {
"account_age_days": 1368,
"account_id": "ACCT-6778170AF4F2",
"baseline_risk_score": 0.272,
"kyc_tier": "tier_3",
"session_entropy": 0.528
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 162,
"timestamp": "2026-01-01T04:23:00Z",
"transaction_amount_usd": 3.9
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.574,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 318166.43,
"financial_exposure_usd": 644981.52,
"recoverable_pct": 0.299
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101167",
"label": "fraudulent",
"label_confidence": 0.775,
"severity": "high",
"timestamp": "2026-01-01T19:27:00Z",
"trace_id": "eda28a9b-49e5-6432-5b87-fd8a9b0fd5ba"
} | {
"account_age_days": 171,
"account_id": "ACCT-2C66427748DE",
"baseline_risk_score": 0.42,
"kyc_tier": "tier_3",
"session_entropy": 0.409
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 859,
"timestamp": "2026-01-01T19:27:00Z",
"transaction_amount_usd": 56988.45
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.724,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 826712.87,
"financial_exposure_usd": 1033497.49,
"recoverable_pct": 0.321
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104764",
"label": "fraudulent",
"label_confidence": 0.76,
"severity": "medium",
"timestamp": "2026-01-04T07:24:00Z",
"trace_id": "0a2988c0-cb56-6b39-4a47-b24de8f27161"
} | {
"account_age_days": 540,
"account_id": "ACCT-508C595AA09D",
"baseline_risk_score": 0.382,
"kyc_tier": "tier_2",
"session_entropy": 0.76
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 671,
"timestamp": "2026-01-04T07:24:00Z",
"transaction_amount_usd": 2753787.82
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.371,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3175542.05,
"financial_exposure_usd": 3960838.8,
"recoverable_pct": 0.995
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109929",
"label": "benign",
"label_confidence": 0.681,
"severity": "high",
"timestamp": "2026-01-07T21:29:00Z",
"trace_id": "073abe70-df9c-b9ff-89d9-61d3210185c8"
} | {
"account_age_days": 168,
"account_id": "ACCT-929741A5243F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.354
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 180,
"timestamp": "2026-01-07T21:29:00Z",
"transaction_amount_usd": 12860.29
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.516,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 136.46,
"financial_exposure_usd": 198.76,
"recoverable_pct": 0.997
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103987",
"label": "fraudulent",
"label_confidence": 0.949,
"severity": "medium",
"timestamp": "2026-01-03T18:27:00Z",
"trace_id": "9378150c-b313-7551-5f05-7dd46d59c1bb"
} | {
"account_age_days": 1493,
"account_id": "ACCT-E61D3CC49590",
"baseline_risk_score": 0.152,
"kyc_tier": "tier_3",
"session_entropy": 0.315
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 468,
"timestamp": "2026-01-03T18:27:00Z",
"transaction_amount_usd": 315044.79
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.94,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 5300210.17,
"financial_exposure_usd": 8038278.39,
"recoverable_pct": 0.777
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102951",
"label": "fraudulent",
"label_confidence": 0.919,
"severity": "low",
"timestamp": "2026-01-03T01:11:00Z",
"trace_id": "6b1c3365-f5f9-5a8a-158b-fdcda1a7d44c"
} | {
"account_age_days": 36,
"account_id": "ACCT-2C7B885E14D2",
"baseline_risk_score": 0.6,
"kyc_tier": "tier_3",
"session_entropy": 0.391
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 129,
"timestamp": "2026-01-02T12:34:00Z",
"transaction_amount_usd": 4.53
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.46,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 863895.5,
"financial_exposure_usd": 881461.63,
"recoverable_pct": 0.784
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100056",
"label": "fraudulent",
"label_confidence": 0.933,
"severity": "critical",
"timestamp": "2026-01-01T00:56:00Z",
"trace_id": "352b6ec8-e90d-21cb-7f11-1a368c52d271"
} | {
"account_age_days": 1933,
"account_id": "ACCT-B9F6143BB238",
"baseline_risk_score": 0.51,
"kyc_tier": "tier_1",
"session_entropy": 0.15
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 306,
"timestamp": "2026-01-01T00:56:00Z",
"transaction_amount_usd": 40007.13
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.6,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id H... | {
"customer_funds_at_risk_usd": 1535388.16,
"financial_exposure_usd": 1742069.22,
"recoverable_pct": 0.577
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105184",
"label": "fraudulent",
"label_confidence": 0.791,
"severity": "medium",
"timestamp": "2026-01-04T14:24:00Z",
"trace_id": "4490ddd4-6c3c-7aed-533c-d4347fee6612"
} | {
"account_age_days": 1055,
"account_id": "ACCT-2F3EBDB339DD",
"baseline_risk_score": 0.088,
"kyc_tier": "tier_2",
"session_entropy": 0.247
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 157,
"timestamp": "2026-01-04T09:13:00Z",
"transaction_amount_usd": 11.79
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.54,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 4549176.94,
"financial_exposure_usd": 6694186.27,
"recoverable_pct": 0.42
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105842",
"label": "fraudulent",
"label_confidence": 0.763,
"severity": "medium",
"timestamp": "2026-01-05T01:22:00Z",
"trace_id": "aec86be1-751f-5c0b-3c45-91dd79f55a4a"
} | {
"account_age_days": 1947,
"account_id": "ACCT-194287DBC1D4",
"baseline_risk_score": 0.29,
"kyc_tier": "tier_3",
"session_entropy": 0.223
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 1141,
"timestamp": "2026-01-05T01:22:00Z",
"transaction_amount_usd": 1404835.43
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.44,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 2516571.94,
"financial_exposure_usd": 6244698.99,
"recoverable_pct": 0.74
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104468",
"label": "fraudulent",
"label_confidence": 0.808,
"severity": "high",
"timestamp": "2026-01-04T02:28:00Z",
"trace_id": "6d838141-a30d-7e40-d054-9bac356e854d"
} | {
"account_age_days": 1656,
"account_id": "ACCT-819AF3B06C1F",
"baseline_risk_score": 0.409,
"kyc_tier": "tier_3",
"session_entropy": 0.751
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 1078,
"timestamp": "2026-01-04T02:28:00Z",
"transaction_amount_usd": 1457919.3
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.582,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1454313.23,
"financial_exposure_usd": 3502344.03,
"recoverable_pct": 0.474
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105518",
"label": "fraudulent",
"label_confidence": 0.633,
"severity": "critical",
"timestamp": "2026-01-04T19:58:00Z",
"trace_id": "f9ebe6f7-13b8-e262-450c-741c2c1b826e"
} | {
"account_age_days": 522,
"account_id": "ACCT-421216CAE6C8",
"baseline_risk_score": 0.426,
"kyc_tier": "tier_1",
"session_entropy": 0.619
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 243,
"timestamp": "2026-01-04T19:58:00Z",
"transaction_amount_usd": 2748666.11
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.806,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1617364.63,
"financial_exposure_usd": 2234485.46,
"recoverable_pct": 0.718
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101939",
"label": "fraudulent",
"label_confidence": 0.767,
"severity": "high",
"timestamp": "2026-01-02T08:19:00Z",
"trace_id": "214e1915-48ee-a711-ff73-d55a72854de2"
} | {
"account_age_days": 1251,
"account_id": "ACCT-B655A9E2BD79",
"baseline_risk_score": 0.345,
"kyc_tier": "tier_3",
"session_entropy": 0.357
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 356,
"timestamp": "2026-01-01T19:35:00Z",
"transaction_amount_usd": 8.7
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.526,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 521220.7,
"financial_exposure_usd": 688158.34,
"recoverable_pct": 0.285
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104731",
"label": "fraudulent",
"label_confidence": 0.757,
"severity": "critical",
"timestamp": "2026-01-04T06:51:00Z",
"trace_id": "23abf03e-59e3-0dba-a509-298f4c5b51a4"
} | {
"account_age_days": 611,
"account_id": "ACCT-0889521C2BDF",
"baseline_risk_score": 0.151,
"kyc_tier": "tier_1",
"session_entropy": 0.758
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 568,
"timestamp": "2026-01-04T06:51:00Z",
"transaction_amount_usd": 1936410.41
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.929,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3866783.61,
"financial_exposure_usd": 5126146.38,
"recoverable_pct": 0.914
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104093",
"label": "fraudulent",
"label_confidence": 0.739,
"severity": "medium",
"timestamp": "2026-01-03T20:13:00Z",
"trace_id": "29c3a4a9-29df-0a29-a785-0e2b2b0656bd"
} | {
"account_age_days": 821,
"account_id": "ACCT-E410627EFEBF",
"baseline_risk_score": 0.107,
"kyc_tier": "tier_3",
"session_entropy": 0.534
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 200,
"timestamp": "2026-01-03T10:27:00Z",
"transaction_amount_usd": 19.04
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.779,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4093809.19,
"financial_exposure_usd": 6880179.38,
"recoverable_pct": 0.989
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106957",
"label": "benign",
"label_confidence": 0.568,
"severity": "high",
"timestamp": "2026-01-05T19:57:00Z",
"trace_id": "a1bf4365-4e9d-477e-5d95-702b06ed5a17"
} | {
"account_age_days": 576,
"account_id": "ACCT-01F313222A61",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.321
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 389,
"timestamp": "2026-01-05T14:02:00Z",
"transaction_amount_usd": 16.89
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.688,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2356.33,
"financial_exposure_usd": 4123.42,
"recoverable_pct": 0.962
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101956",
"label": "fraudulent",
"label_confidence": 0.978,
"severity": "low",
"timestamp": "2026-01-02T08:36:00Z",
"trace_id": "8f00c549-937b-dad6-d4b3-6fc65d1dd80b"
} | {
"account_age_days": 368,
"account_id": "ACCT-7F8011B64D91",
"baseline_risk_score": 0.383,
"kyc_tier": "tier_1",
"session_entropy": 0.55
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 1176,
"timestamp": "2026-01-02T08:36:00Z",
"transaction_amount_usd": 111733.05
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.649,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 520358.74,
"financial_exposure_usd": 683226.82,
"recoverable_pct": 0.022
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106250",
"label": "fraudulent",
"label_confidence": 0.94,
"severity": "high",
"timestamp": "2026-01-05T08:10:00Z",
"trace_id": "4a4b53f1-4ef5-322c-d239-e25964e08ceb"
} | {
"account_age_days": 1368,
"account_id": "ACCT-62E500037863",
"baseline_risk_score": 0.333,
"kyc_tier": "tier_1",
"session_entropy": 0.703
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 556,
"timestamp": "2026-01-05T08:10:00Z",
"transaction_amount_usd": 2892421.75
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.395,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2228916.27,
"financial_exposure_usd": 2972137.34,
"recoverable_pct": 0.823
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101323",
"label": "fraudulent",
"label_confidence": 0.901,
"severity": "medium",
"timestamp": "2026-01-01T22:03:00Z",
"trace_id": "348a925b-23e5-a5a4-c7d3-a418a2731dbc"
} | {
"account_age_days": 1464,
"account_id": "ACCT-D850034E6F96",
"baseline_risk_score": 0.594,
"kyc_tier": "tier_2",
"session_entropy": 0.894
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 762,
"timestamp": "2026-01-01T22:03:00Z",
"transaction_amount_usd": 91846.56
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.817,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 29141.75,
"financial_exposure_usd": 52828.29,
"recoverable_pct": 0.809
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108138",
"label": "benign",
"label_confidence": 0.499,
"severity": "medium",
"timestamp": "2026-01-06T15:38:00Z",
"trace_id": "b598bd2c-2567-d6bb-01d5-c441a8917f22"
} | {
"account_age_days": 1243,
"account_id": "ACCT-E6AD4ACD8794",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.948
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 148,
"timestamp": "2026-01-06T07:27:00Z",
"transaction_amount_usd": 6.43
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.633,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2126.72,
"financial_exposure_usd": 3319.53,
"recoverable_pct": 0.759
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105818",
"label": "fraudulent",
"label_confidence": 0.756,
"severity": "high",
"timestamp": "2026-01-05T00:58:00Z",
"trace_id": "da722ff8-49c4-3164-5b87-8fd8854d1d6c"
} | {
"account_age_days": 1880,
"account_id": "ACCT-EB06092F179F",
"baseline_risk_score": 0.434,
"kyc_tier": "tier_3",
"session_entropy": 0.761
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 1019,
"timestamp": "2026-01-05T00:58:00Z",
"transaction_amount_usd": 2516217.54
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.74,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 3196912.4,
"financial_exposure_usd": 5274446.21,
"recoverable_pct": 0.451
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109249",
"label": "benign",
"label_confidence": 0.731,
"severity": "low",
"timestamp": "2026-01-07T10:09:00Z",
"trace_id": "439eb26f-2186-bfdc-4c64-fe9ae77904d7"
} | {
"account_age_days": 1378,
"account_id": "ACCT-53DCB2CE60F0",
"baseline_risk_score": 0.077,
"kyc_tier": "tier_1",
"session_entropy": 0.325
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 948,
"timestamp": "2026-01-07T10:09:00Z",
"transaction_amount_usd": 10813.46
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.679,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3233.39,
"financial_exposure_usd": 5678.83,
"recoverable_pct": 0.924
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105953",
"label": "fraudulent",
"label_confidence": 0.698,
"severity": "medium",
"timestamp": "2026-01-05T03:13:00Z",
"trace_id": "6961732a-25d5-3597-ebe1-de1d605914e7"
} | {
"account_age_days": 1150,
"account_id": "ACCT-8DA4AE8CA2C6",
"baseline_risk_score": 0.132,
"kyc_tier": "tier_1",
"session_entropy": 0.859
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 919,
"timestamp": "2026-01-05T03:13:00Z",
"transaction_amount_usd": 937728.49
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.6,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3351223.05,
"financial_exposure_usd": 6389457.91,
"recoverable_pct": 0.543
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102773",
"label": "fraudulent",
"label_confidence": 0.766,
"severity": "medium",
"timestamp": "2026-01-02T22:13:00Z",
"trace_id": "a19e454d-1b80-e894-826f-b4ccc417b130"
} | {
"account_age_days": 788,
"account_id": "ACCT-5CA32298CF63",
"baseline_risk_score": 0.631,
"kyc_tier": "tier_1",
"session_entropy": 0.919
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 1137,
"timestamp": "2026-01-02T22:13:00Z",
"transaction_amount_usd": 107033.32
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.868,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 459194.08,
"financial_exposure_usd": 568137.45,
"recoverable_pct": 0.177
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107855",
"label": "benign",
"label_confidence": 0.676,
"severity": "critical",
"timestamp": "2026-01-06T10:55:00Z",
"trace_id": "d6881fd1-7f94-7af0-7bef-cb08904898be"
} | {
"account_age_days": 1440,
"account_id": "ACCT-717F1072250F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.63
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 292,
"timestamp": "2026-01-06T09:31:00Z",
"transaction_amount_usd": 4.23
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.574,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1903.11,
"financial_exposure_usd": 2651.76,
"recoverable_pct": 0.652
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102769",
"label": "fraudulent",
"label_confidence": 0.881,
"severity": "low",
"timestamp": "2026-01-02T22:09:00Z",
"trace_id": "d58ea520-09f1-f566-a701-bf08c264bde7"
} | {
"account_age_days": 826,
"account_id": "ACCT-DEABACA96204",
"baseline_risk_score": 0.53,
"kyc_tier": "tier_3",
"session_entropy": 0.779
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 244,
"timestamp": "2026-01-02T20:14:00Z",
"transaction_amount_usd": 10.45
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.647,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 523900.87,
"financial_exposure_usd": 938168.01,
"recoverable_pct": 0.267
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100320",
"label": "fraudulent",
"label_confidence": 0.94,
"severity": "critical",
"timestamp": "2026-01-01T05:20:00Z",
"trace_id": "496ff6e3-0495-061f-9080-810858904829"
} | {
"account_age_days": 17,
"account_id": "ACCT-168E8BF69F3D",
"baseline_risk_score": 0.37,
"kyc_tier": "tier_2",
"session_entropy": 0.383
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CA",
"latency_ms": 434,
"timestamp": "2026-01-01T05:20:00Z",
"transaction_amount_usd": 48011.14
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.782,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 802161.41,
"financial_exposure_usd": 819851.07,
"recoverable_pct": 0.263
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108016",
"label": "benign",
"label_confidence": 0.637,
"severity": "low",
"timestamp": "2026-01-06T13:36:00Z",
"trace_id": "29aa17a8-f157-8100-1787-91153ff87864"
} | {
"account_age_days": 1546,
"account_id": "ACCT-DE82D49AE760",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.622
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 1176,
"timestamp": "2026-01-06T13:36:00Z",
"transaction_amount_usd": 630.71
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.469,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2333.59,
"financial_exposure_usd": 5725.85,
"recoverable_pct": 0.536
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102265",
"label": "fraudulent",
"label_confidence": 0.91,
"severity": "critical",
"timestamp": "2026-01-02T13:45:00Z",
"trace_id": "d9bffae2-d0a7-fe50-cea6-8cc8d6067c47"
} | {
"account_age_days": 514,
"account_id": "ACCT-860EC4FCC8DD",
"baseline_risk_score": 0.517,
"kyc_tier": "tier_1",
"session_entropy": 0.442
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 668,
"timestamp": "2026-01-02T13:45:00Z",
"transaction_amount_usd": 17949.44
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.837,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 445549.91,
"financial_exposure_usd": 688164.95,
"recoverable_pct": 0.455
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106699",
"label": "benign",
"label_confidence": 0.726,
"severity": "low",
"timestamp": "2026-01-05T15:39:00Z",
"trace_id": "d4a54960-ae72-ce51-5037-b2cac036de2c"
} | {
"account_age_days": 969,
"account_id": "ACCT-B4ECACEA94FA",
"baseline_risk_score": 0.113,
"kyc_tier": "tier_2",
"session_entropy": 0.501
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 159,
"timestamp": "2026-01-05T10:29:00Z",
"transaction_amount_usd": 3.74
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.772,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 393,
"financial_exposure_usd": 647.16,
"recoverable_pct": 0.415
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108098",
"label": "benign",
"label_confidence": 0.682,
"severity": "high",
"timestamp": "2026-01-06T14:58:00Z",
"trace_id": "512dbd6f-dd36-2ede-3643-94ff37c9f6ee"
} | {
"account_age_days": 1388,
"account_id": "ACCT-11D0322A889F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.223
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 254,
"timestamp": "2026-01-06T14:58:00Z",
"transaction_amount_usd": 10937.37
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.456,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 5272.41,
"financial_exposure_usd": 7478.85,
"recoverable_pct": 0.938
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109991",
"label": "benign",
"label_confidence": 0.592,
"severity": "medium",
"timestamp": "2026-01-07T22:31:00Z",
"trace_id": "ba0a6ff1-1a7f-c3af-4961-98c73ce58d17"
} | {
"account_age_days": 1035,
"account_id": "ACCT-DF8C10C4FE43",
"baseline_risk_score": 0.163,
"kyc_tier": "tier_2",
"session_entropy": 0.822
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 832,
"timestamp": "2026-01-07T22:31:00Z",
"transaction_amount_usd": 11314.67
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.584,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2616.45,
"financial_exposure_usd": 3291.36,
"recoverable_pct": 0.738
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102681",
"label": "fraudulent",
"label_confidence": 0.765,
"severity": "high",
"timestamp": "2026-01-02T20:41:00Z",
"trace_id": "b07dc00b-dd28-b721-d218-fa595de00edc"
} | {
"account_age_days": 984,
"account_id": "ACCT-C5DD1A8B0317",
"baseline_risk_score": 0.376,
"kyc_tier": "tier_2",
"session_entropy": 0.62
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 604,
"timestamp": "2026-01-02T20:41:00Z",
"transaction_amount_usd": 14770.85
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.719,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 450762.42,
"financial_exposure_usd": 1036522.18,
"recoverable_pct": 0.312
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105381",
"label": "fraudulent",
"label_confidence": 0.675,
"severity": "medium",
"timestamp": "2026-01-04T17:41:00Z",
"trace_id": "f678bfe4-031c-81ed-5221-b87aa9860a8b"
} | {
"account_age_days": 1224,
"account_id": "ACCT-8610C40DA8BA",
"baseline_risk_score": 0.066,
"kyc_tier": "tier_3",
"session_entropy": 0.785
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 374,
"timestamp": "2026-01-04T13:27:00Z",
"transaction_amount_usd": 1.52
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.935,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2277121.54,
"financial_exposure_usd": 5366219.64,
"recoverable_pct": 0.996
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100741",
"label": "fraudulent",
"label_confidence": 0.85,
"severity": "critical",
"timestamp": "2026-01-01T12:21:00Z",
"trace_id": "15c45f58-161f-bab8-df50-a8c95b76a06d"
} | {
"account_age_days": 1360,
"account_id": "ACCT-8F43A70295D6",
"baseline_risk_score": 0.601,
"kyc_tier": "tier_2",
"session_entropy": 0.284
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 440,
"timestamp": "2026-01-01T12:21:00Z",
"transaction_amount_usd": 109413.82
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.658,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 348139.42,
"financial_exposure_usd": 509614.57,
"recoverable_pct": 0.185
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102481",
"label": "fraudulent",
"label_confidence": 0.808,
"severity": "medium",
"timestamp": "2026-01-02T17:21:00Z",
"trace_id": "c11a0ac7-f99c-16a1-6d31-f6a04da0f5b3"
} | {
"account_age_days": 481,
"account_id": "ACCT-DB5AE84E0256",
"baseline_risk_score": 0.367,
"kyc_tier": "tier_2",
"session_entropy": 0.385
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 871,
"timestamp": "2026-01-02T17:21:00Z",
"transaction_amount_usd": 44763.25
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.405,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 481041.66,
"financial_exposure_usd": 530848.82,
"recoverable_pct": 0.305
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105635",
"label": "fraudulent",
"label_confidence": 0.614,
"severity": "medium",
"timestamp": "2026-01-04T21:55:00Z",
"trace_id": "a78afb64-1f35-f17e-9276-967169c64a03"
} | {
"account_age_days": 1026,
"account_id": "ACCT-088409C47296",
"baseline_risk_score": 0.19,
"kyc_tier": "tier_3",
"session_entropy": 0.837
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 628,
"timestamp": "2026-01-04T21:55:00Z",
"transaction_amount_usd": 2448188.21
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.768,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2796162.86,
"financial_exposure_usd": 4469083.91,
"recoverable_pct": 0.942
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103783",
"label": "fraudulent",
"label_confidence": 0.658,
"severity": "medium",
"timestamp": "2026-01-03T15:03:00Z",
"trace_id": "53827401-c8bc-49ba-4be1-d3c017019e4b"
} | {
"account_age_days": 1079,
"account_id": "ACCT-CF689EC209E1",
"baseline_risk_score": 0.105,
"kyc_tier": "tier_3",
"session_entropy": 0.935
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 368,
"timestamp": "2026-01-03T15:03:00Z",
"transaction_amount_usd": 1963945.48
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.415,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4635378.62,
"financial_exposure_usd": 5064706.85,
"recoverable_pct": 0.809
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109536",
"label": "benign",
"label_confidence": 0.689,
"severity": "low",
"timestamp": "2026-01-07T14:56:00Z",
"trace_id": "9bb366e6-5203-bfa5-480c-404d93453d87"
} | {
"account_age_days": 96,
"account_id": "ACCT-AE9F3B2347C5",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.934
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 1168,
"timestamp": "2026-01-07T14:56:00Z",
"transaction_amount_usd": 4658.63
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.737,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1514.03,
"financial_exposure_usd": 2106.62,
"recoverable_pct": 0.484
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108226",
"label": "benign",
"label_confidence": 0.636,
"severity": "medium",
"timestamp": "2026-01-06T17:06:00Z",
"trace_id": "6c7aab2e-971c-e5e9-ae47-27ec62ce56ea"
} | {
"account_age_days": 823,
"account_id": "ACCT-4BFFDCA80C60",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.198
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 122,
"timestamp": "2026-01-06T17:06:00Z",
"transaction_amount_usd": 13975.45
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.649,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1849.71,
"financial_exposure_usd": 3884.98,
"recoverable_pct": 0.969
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107352",
"label": "benign",
"label_confidence": 0.467,
"severity": "medium",
"timestamp": "2026-01-06T02:32:00Z",
"trace_id": "e1a76d50-9199-acfe-c471-526ea6575b70"
} | {
"account_age_days": 1701,
"account_id": "ACCT-8A3A0C93CFE7",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.491
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 266,
"timestamp": "2026-01-05T18:51:00Z",
"transaction_amount_usd": 2.16
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.639,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 634.27,
"financial_exposure_usd": 870.4,
"recoverable_pct": 0.92
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109737",
"label": "benign",
"label_confidence": 0.545,
"severity": "high",
"timestamp": "2026-01-07T18:17:00Z",
"trace_id": "7147d968-2312-4e14-590a-b3622027e37e"
} | {
"account_age_days": 1271,
"account_id": "ACCT-8D387DE11053",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.611
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 256,
"timestamp": "2026-01-07T13:33:00Z",
"transaction_amount_usd": 13.32
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.535,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1523.54,
"financial_exposure_usd": 1969.41,
"recoverable_pct": 0.475
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103601",
"label": "fraudulent",
"label_confidence": 0.94,
"severity": "critical",
"timestamp": "2026-01-03T12:01:00Z",
"trace_id": "e560543b-c0ef-41d6-7c32-ea4c943a3766"
} | {
"account_age_days": 1385,
"account_id": "ACCT-F127560226A1",
"baseline_risk_score": 0.228,
"kyc_tier": "tier_1",
"session_entropy": 0.448
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 682,
"timestamp": "2026-01-03T12:01:00Z",
"transaction_amount_usd": 1217871.23
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.764,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 643808.76,
"financial_exposure_usd": 827918.58,
"recoverable_pct": 0.766
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105058",
"label": "fraudulent",
"label_confidence": 0.782,
"severity": "high",
"timestamp": "2026-01-04T12:18:00Z",
"trace_id": "2691f87a-ada4-1f33-07c8-39c106f72ce8"
} | {
"account_age_days": 128,
"account_id": "ACCT-5FDB302B5FB9",
"baseline_risk_score": 0.271,
"kyc_tier": "tier_1",
"session_entropy": 0.252
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 205,
"timestamp": "2026-01-04T09:10:00Z",
"transaction_amount_usd": 16.33
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.805,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1338559.17,
"financial_exposure_usd": 1764120.52,
"recoverable_pct": 0.913
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108975",
"label": "benign",
"label_confidence": 0.695,
"severity": "high",
"timestamp": "2026-01-07T05:35:00Z",
"trace_id": "d63ea0c2-23c0-2478-70c6-0079eacd0098"
} | {
"account_age_days": 616,
"account_id": "ACCT-1B3376F25F1B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.156
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 148,
"timestamp": "2026-01-07T05:35:00Z",
"transaction_amount_usd": 8541.01
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.546,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1176.04,
"financial_exposure_usd": 2488.62,
"recoverable_pct": 0.792
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102012",
"label": "fraudulent",
"label_confidence": 0.884,
"severity": "high",
"timestamp": "2026-01-02T09:32:00Z",
"trace_id": "eb017b02-c4a6-358a-5c22-bc7d492f0d9c"
} | {
"account_age_days": 1898,
"account_id": "ACCT-CFD46CC87CAD",
"baseline_risk_score": 0.499,
"kyc_tier": "tier_1",
"session_entropy": 0.86
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 134,
"timestamp": "2026-01-02T09:32:00Z",
"transaction_amount_usd": 107565.81
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.353,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 1149508.69,
"financial_exposure_usd": 1166363.56,
"recoverable_pct": 0.618
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105486",
"label": "fraudulent",
"label_confidence": 0.85,
"severity": "medium",
"timestamp": "2026-01-04T19:26:00Z",
"trace_id": "7d4016f8-fc29-ce3b-22fa-f8e8430a1650"
} | {
"account_age_days": 314,
"account_id": "ACCT-75C41E293AC1",
"baseline_risk_score": 0.448,
"kyc_tier": "tier_2",
"session_entropy": 0.268
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 852,
"timestamp": "2026-01-04T19:26:00Z",
"transaction_amount_usd": 584682.27
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.44,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 630470.95,
"financial_exposure_usd": 689735.15,
"recoverable_pct": 0.951
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103645",
"label": "fraudulent",
"label_confidence": 0.601,
"severity": "critical",
"timestamp": "2026-01-03T12:45:00Z",
"trace_id": "1fe17e2c-8f5c-785d-453d-d494a9d8f706"
} | {
"account_age_days": 1002,
"account_id": "ACCT-3E6361711BCC",
"baseline_risk_score": 0.169,
"kyc_tier": "tier_3",
"session_entropy": 0.776
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 956,
"timestamp": "2026-01-03T12:45:00Z",
"transaction_amount_usd": 2137812
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.584,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5341696.13,
"financial_exposure_usd": 6301762.61,
"recoverable_pct": 0.746
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105649",
"label": "fraudulent",
"label_confidence": 0.859,
"severity": "high",
"timestamp": "2026-01-04T22:09:00Z",
"trace_id": "2cd17daf-8651-5841-5a31-7ae94310d505"
} | {
"account_age_days": 1136,
"account_id": "ACCT-CAA1B265405D",
"baseline_risk_score": 0.077,
"kyc_tier": "tier_1",
"session_entropy": 0.505
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 712,
"timestamp": "2026-01-04T22:09:00Z",
"transaction_amount_usd": 2802902.68
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.448,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2034623.73,
"financial_exposure_usd": 4775514.6,
"recoverable_pct": 0.607
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101141",
"label": "fraudulent",
"label_confidence": 0.835,
"severity": "low",
"timestamp": "2026-01-01T19:01:00Z",
"trace_id": "9bf7adb8-e91c-fa50-e768-2c1c41e6fdf0"
} | {
"account_age_days": 552,
"account_id": "ACCT-91F0B199ADB4",
"baseline_risk_score": 0.354,
"kyc_tier": "tier_3",
"session_entropy": 0.693
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "DE",
"latency_ms": 912,
"timestamp": "2026-01-01T19:01:00Z",
"transaction_amount_usd": 16554.18
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.772,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 231818.63,
"financial_exposure_usd": 262968.12,
"recoverable_pct": 0.687
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104357",
"label": "fraudulent",
"label_confidence": 0.776,
"severity": "low",
"timestamp": "2026-01-04T00:37:00Z",
"trace_id": "f4d9c96f-4d9f-9c61-2c32-f20c92632100"
} | {
"account_age_days": 54,
"account_id": "ACCT-068944108A23",
"baseline_risk_score": 0.24,
"kyc_tier": "tier_1",
"session_entropy": 0.859
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 914,
"timestamp": "2026-01-04T00:37:00Z",
"transaction_amount_usd": 1644350.2
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.373,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3756025.99,
"financial_exposure_usd": 8450154.97,
"recoverable_pct": 0.714
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103206",
"label": "fraudulent",
"label_confidence": 0.763,
"severity": "high",
"timestamp": "2026-01-03T05:26:00Z",
"trace_id": "b9b05fb4-8215-12f7-8c51-26bc92a9e240"
} | {
"account_age_days": 795,
"account_id": "ACCT-AE7CF025D8BE",
"baseline_risk_score": 0.494,
"kyc_tier": "tier_1",
"session_entropy": 0.127
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 1156,
"timestamp": "2026-01-03T05:26:00Z",
"transaction_amount_usd": 24789.78
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.856,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 195039.94,
"financial_exposure_usd": 333789.85,
"recoverable_pct": 0.264
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109973",
"label": "benign",
"label_confidence": 0.451,
"severity": "medium",
"timestamp": "2026-01-07T22:13:00Z",
"trace_id": "70c64ac3-4cb4-e57e-20c3-85c923582a02"
} | {
"account_age_days": 211,
"account_id": "ACCT-2EBE9911DA19",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.754
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 271,
"timestamp": "2026-01-07T15:28:00Z",
"transaction_amount_usd": 17.16
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.568,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1176.63,
"financial_exposure_usd": 1970.71,
"recoverable_pct": 0.488
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108691",
"label": "benign",
"label_confidence": 0.672,
"severity": "medium",
"timestamp": "2026-01-07T00:51:00Z",
"trace_id": "545d3e71-5ad1-821c-6ab2-18bc322fbac2"
} | {
"account_age_days": 1244,
"account_id": "ACCT-D484A323C51C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.571
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 1109,
"timestamp": "2026-01-07T00:51:00Z",
"transaction_amount_usd": 10357.99
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.715,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 569.98,
"financial_exposure_usd": 750.55,
"recoverable_pct": 0.814
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.