schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107768",
"label": "benign",
"label_confidence": 0.593,
"severity": "high",
"timestamp": "2026-01-06T09:28:00Z",
"trace_id": "45d30f37-26ac-3f9d-cea5-1ee2285e1337"
} | {
"account_age_days": 1497,
"account_id": "ACCT-32DC8D9A3E83",
"baseline_risk_score": 0.161,
"kyc_tier": "tier_2",
"session_entropy": 0.87
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 564,
"timestamp": "2026-01-06T09:28:00Z",
"transaction_amount_usd": 12266.52
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.623,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 589.02,
"financial_exposure_usd": 616.72,
"recoverable_pct": 0.852
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105507",
"label": "fraudulent",
"label_confidence": 0.942,
"severity": "medium",
"timestamp": "2026-01-04T19:47:00Z",
"trace_id": "f103c70b-d176-7bca-ab74-c76407ea7c19"
} | {
"account_age_days": 1751,
"account_id": "ACCT-26DDB8316BED",
"baseline_risk_score": 0.1,
"kyc_tier": "tier_1",
"session_entropy": 0.181
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 338,
"timestamp": "2026-01-04T11:51:00Z",
"transaction_amount_usd": 17.91
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.902,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1113632.81,
"financial_exposure_usd": 1727367.41,
"recoverable_pct": 0.751
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104820",
"label": "fraudulent",
"label_confidence": 0.926,
"severity": "critical",
"timestamp": "2026-01-04T08:20:00Z",
"trace_id": "724c09aa-d395-7927-24ac-2c0a455cd67d"
} | {
"account_age_days": 684,
"account_id": "ACCT-0AEBAA3492D0",
"baseline_risk_score": 0.09,
"kyc_tier": "tier_1",
"session_entropy": 0.742
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 211,
"timestamp": "2026-01-04T06:36:00Z",
"transaction_amount_usd": 24.23
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.487,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1472464.21,
"financial_exposure_usd": 3290919.06,
"recoverable_pct": 0.5
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107379",
"label": "benign",
"label_confidence": 0.603,
"severity": "medium",
"timestamp": "2026-01-06T02:59:00Z",
"trace_id": "ae590b65-9e5f-5b0f-7b25-cd8edf414164"
} | {
"account_age_days": 1929,
"account_id": "ACCT-B5EE70521EDC",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.644
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 302,
"timestamp": "2026-01-05T15:00:00Z",
"transaction_amount_usd": 14.08
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.545,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2390.85,
"financial_exposure_usd": 2776.25,
"recoverable_pct": 0.559
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105734",
"label": "fraudulent",
"label_confidence": 0.786,
"severity": "high",
"timestamp": "2026-01-04T23:34:00Z",
"trace_id": "c663778c-ffa7-508a-5099-65f614e8f747"
} | {
"account_age_days": 12,
"account_id": "ACCT-C760FE084082",
"baseline_risk_score": 0.23,
"kyc_tier": "tier_3",
"session_entropy": 0.872
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 481,
"timestamp": "2026-01-04T23:34:00Z",
"transaction_amount_usd": 2919896.93
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.758,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1668115.32,
"financial_exposure_usd": 3402762.66,
"recoverable_pct": 0.59
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104206",
"label": "fraudulent",
"label_confidence": 0.766,
"severity": "high",
"timestamp": "2026-01-03T22:06:00Z",
"trace_id": "29639891-fd88-2b11-0972-8762df7cbeb2"
} | {
"account_age_days": 750,
"account_id": "ACCT-58FD60950799",
"baseline_risk_score": 0.295,
"kyc_tier": "tier_1",
"session_entropy": 0.647
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 997,
"timestamp": "2026-01-03T22:06:00Z",
"transaction_amount_usd": 2965936.49
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.577,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 678285.58,
"financial_exposure_usd": 1336387.28,
"recoverable_pct": 0.86
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105051",
"label": "fraudulent",
"label_confidence": 0.816,
"severity": "medium",
"timestamp": "2026-01-04T12:11:00Z",
"trace_id": "1a929786-66c9-548a-3502-ba25f8beb512"
} | {
"account_age_days": 1825,
"account_id": "ACCT-F7B6F0371064",
"baseline_risk_score": 0.169,
"kyc_tier": "tier_1",
"session_entropy": 0.109
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 540,
"timestamp": "2026-01-04T12:11:00Z",
"transaction_amount_usd": 991318.61
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.772,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 6017215.27,
"financial_exposure_usd": 9811813.43,
"recoverable_pct": 0.454
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102436",
"label": "fraudulent",
"label_confidence": 0.833,
"severity": "low",
"timestamp": "2026-01-02T16:36:00Z",
"trace_id": "954b6268-b2a0-cf23-c540-8757e232276e"
} | {
"account_age_days": 205,
"account_id": "ACCT-E92EB9715FE4",
"baseline_risk_score": 0.494,
"kyc_tier": "tier_2",
"session_entropy": 0.112
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 157,
"timestamp": "2026-01-02T13:30:00Z",
"transaction_amount_usd": 18.29
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.753,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 206262.1,
"financial_exposure_usd": 445630.51,
"recoverable_pct": 0.026
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101461",
"label": "fraudulent",
"label_confidence": 0.894,
"severity": "critical",
"timestamp": "2026-01-02T00:21:00Z",
"trace_id": "664899bf-9462-282d-81a7-9354616b4a04"
} | {
"account_age_days": 1055,
"account_id": "ACCT-334ADB3E9C5A",
"baseline_risk_score": 0.347,
"kyc_tier": "tier_1",
"session_entropy": 0.682
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 1086,
"timestamp": "2026-01-02T00:21:00Z",
"transaction_amount_usd": 82317.66
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.638,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 387631.58,
"financial_exposure_usd": 446944.86,
"recoverable_pct": 0.206
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105132",
"label": "fraudulent",
"label_confidence": 0.669,
"severity": "high",
"timestamp": "2026-01-04T13:32:00Z",
"trace_id": "0e8d0955-fff7-352c-cb26-10c8901c0bcc"
} | {
"account_age_days": 1067,
"account_id": "ACCT-F66369D72800",
"baseline_risk_score": 0.392,
"kyc_tier": "tier_3",
"session_entropy": 0.669
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 1095,
"timestamp": "2026-01-04T13:32:00Z",
"transaction_amount_usd": 2608015.3
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.508,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2566218.26,
"financial_exposure_usd": 3633970.68,
"recoverable_pct": 0.516
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102766",
"label": "fraudulent",
"label_confidence": 0.754,
"severity": "critical",
"timestamp": "2026-01-02T22:06:00Z",
"trace_id": "92e4c3a5-bdfc-ea08-4713-d02c57167eba"
} | {
"account_age_days": 992,
"account_id": "ACCT-53B30C23B09E",
"baseline_risk_score": 0.464,
"kyc_tier": "tier_3",
"session_entropy": 0.4
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 969,
"timestamp": "2026-01-02T22:06:00Z",
"transaction_amount_usd": 109384.41
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.779,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 263807.75,
"financial_exposure_usd": 400893.26,
"recoverable_pct": 0.259
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102525",
"label": "fraudulent",
"label_confidence": 0.968,
"severity": "high",
"timestamp": "2026-01-02T18:05:00Z",
"trace_id": "b70d4a5b-b3cb-6c13-eeff-c1c4a6fc26fb"
} | {
"account_age_days": 1827,
"account_id": "ACCT-33E76638D16F",
"baseline_risk_score": 0.621,
"kyc_tier": "tier_3",
"session_entropy": 0.276
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "HK",
"latency_ms": 816,
"timestamp": "2026-01-02T18:05:00Z",
"transaction_amount_usd": 108390.14
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.747,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 619698.05,
"financial_exposure_usd": 716683.31,
"recoverable_pct": 0.091
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106159",
"label": "fraudulent",
"label_confidence": 0.787,
"severity": "high",
"timestamp": "2026-01-05T06:39:00Z",
"trace_id": "88af483f-13e8-f9b3-fb58-097a041a6732"
} | {
"account_age_days": 1720,
"account_id": "ACCT-9B3601BC4674",
"baseline_risk_score": 0.1,
"kyc_tier": "tier_1",
"session_entropy": 0.62
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 161,
"timestamp": "2026-01-05T02:12:00Z",
"transaction_amount_usd": 19.22
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.715,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2404980.81,
"financial_exposure_usd": 3300707.31,
"recoverable_pct": 0.412
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109627",
"label": "benign",
"label_confidence": 0.644,
"severity": "low",
"timestamp": "2026-01-07T16:27:00Z",
"trace_id": "a792c4bf-6d06-757e-f0a7-a97a93ac347b"
} | {
"account_age_days": 1976,
"account_id": "ACCT-6BF9479FB0CD",
"baseline_risk_score": 0.111,
"kyc_tier": "tier_2",
"session_entropy": 0.168
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 1094,
"timestamp": "2026-01-07T16:27:00Z",
"transaction_amount_usd": 3962.65
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.605,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3966.56,
"financial_exposure_usd": 4145.17,
"recoverable_pct": 0.945
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103387",
"label": "fraudulent",
"label_confidence": 0.815,
"severity": "low",
"timestamp": "2026-01-03T08:27:00Z",
"trace_id": "fafeb084-e7f4-469a-7eda-2ea0de36e561"
} | {
"account_age_days": 1091,
"account_id": "ACCT-DF45D66C855B",
"baseline_risk_score": 0.39,
"kyc_tier": "tier_3",
"session_entropy": 0.152
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 343,
"timestamp": "2026-01-03T08:27:00Z",
"transaction_amount_usd": 428060.28
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.551,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 615112.58,
"financial_exposure_usd": 1286616.24,
"recoverable_pct": 0.495
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103816",
"label": "fraudulent",
"label_confidence": 0.841,
"severity": "high",
"timestamp": "2026-01-03T15:36:00Z",
"trace_id": "286e59d5-b18b-46f1-2b33-39e8f94fdfdb"
} | {
"account_age_days": 831,
"account_id": "ACCT-8464CA125B61",
"baseline_risk_score": 0.371,
"kyc_tier": "tier_3",
"session_entropy": 0.308
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 144,
"timestamp": "2026-01-03T14:37:00Z",
"transaction_amount_usd": 2.17
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.658,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 595224.7,
"financial_exposure_usd": 782479.01,
"recoverable_pct": 0.563
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109547",
"label": "benign",
"label_confidence": 0.589,
"severity": "medium",
"timestamp": "2026-01-07T15:07:00Z",
"trace_id": "19c0222c-9b61-15ea-a371-065d601d7f3b"
} | {
"account_age_days": 1432,
"account_id": "ACCT-95E98C472B4A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.406
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 554,
"timestamp": "2026-01-07T15:07:00Z",
"transaction_amount_usd": 11871.55
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.465,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1103.91,
"financial_exposure_usd": 1941.86,
"recoverable_pct": 0.489
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100607",
"label": "fraudulent",
"label_confidence": 0.936,
"severity": "low",
"timestamp": "2026-01-01T10:07:00Z",
"trace_id": "7e2696fd-5f91-6dda-5505-2b4978154b93"
} | {
"account_age_days": 829,
"account_id": "ACCT-B4347DD9BAF0",
"baseline_risk_score": 0.408,
"kyc_tier": "tier_1",
"session_entropy": 0.202
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "FR",
"latency_ms": 162,
"timestamp": "2026-01-01T10:07:00Z",
"transaction_amount_usd": 64775.05
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.644,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 779870.83,
"financial_exposure_usd": 908575.79,
"recoverable_pct": 0.276
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104689",
"label": "fraudulent",
"label_confidence": 0.854,
"severity": "critical",
"timestamp": "2026-01-04T06:09:00Z",
"trace_id": "48415203-c007-d522-8b3c-f2ee5f909f09"
} | {
"account_age_days": 1229,
"account_id": "ACCT-4894C1FA6D6B",
"baseline_risk_score": 0.223,
"kyc_tier": "tier_3",
"session_entropy": 0.616
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 942,
"timestamp": "2026-01-04T06:09:00Z",
"transaction_amount_usd": 2068025.78
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.465,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1062121.45,
"financial_exposure_usd": 2396900.22,
"recoverable_pct": 0.517
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106256",
"label": "fraudulent",
"label_confidence": 0.67,
"severity": "critical",
"timestamp": "2026-01-05T08:16:00Z",
"trace_id": "460a31d4-d39c-1aab-f60d-81333e6db156"
} | {
"account_age_days": 744,
"account_id": "ACCT-C43A5EA96D62",
"baseline_risk_score": 0.072,
"kyc_tier": "tier_1",
"session_entropy": 0.219
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 889,
"timestamp": "2026-01-05T08:16:00Z",
"transaction_amount_usd": 765181.28
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.709,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1206445.71,
"financial_exposure_usd": 2081731.78,
"recoverable_pct": 0.937
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100597",
"label": "fraudulent",
"label_confidence": 0.914,
"severity": "high",
"timestamp": "2026-01-01T09:57:00Z",
"trace_id": "e4de4cb0-225b-0556-d82a-c958d9a6a33c"
} | {
"account_age_days": 388,
"account_id": "ACCT-5885DA4EC0C0",
"baseline_risk_score": 0.429,
"kyc_tier": "tier_3",
"session_entropy": 0.648
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 146,
"timestamp": "2026-01-01T00:32:00Z",
"transaction_amount_usd": 24.33
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.435,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 262656.98,
"financial_exposure_usd": 498356.87,
"recoverable_pct": 0.192
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103866",
"label": "fraudulent",
"label_confidence": 0.695,
"severity": "critical",
"timestamp": "2026-01-03T16:26:00Z",
"trace_id": "733540fe-84f5-f9f4-34d9-678fe676f87d"
} | {
"account_age_days": 1651,
"account_id": "ACCT-5BBB6D9D5C75",
"baseline_risk_score": 0.175,
"kyc_tier": "tier_1",
"session_entropy": 0.831
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 159,
"timestamp": "2026-01-03T03:53:00Z",
"transaction_amount_usd": 19.92
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.414,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1242697.3,
"financial_exposure_usd": 2490573.06,
"recoverable_pct": 0.618
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104338",
"label": "fraudulent",
"label_confidence": 0.877,
"severity": "medium",
"timestamp": "2026-01-04T00:18:00Z",
"trace_id": "d102d570-52a9-7b35-5345-dd2cffa1eea3"
} | {
"account_age_days": 268,
"account_id": "ACCT-B1DAA690CB2A",
"baseline_risk_score": 0.161,
"kyc_tier": "tier_2",
"session_entropy": 0.441
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 902,
"timestamp": "2026-01-04T00:18:00Z",
"transaction_amount_usd": 1674240.09
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.566,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3081949.51,
"financial_exposure_usd": 5744566.33,
"recoverable_pct": 0.911
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108283",
"label": "benign",
"label_confidence": 0.525,
"severity": "high",
"timestamp": "2026-01-06T18:03:00Z",
"trace_id": "3e9b1851-c23f-5b1e-b96b-812621074d99"
} | {
"account_age_days": 473,
"account_id": "ACCT-22FF11D83357",
"baseline_risk_score": 0.126,
"kyc_tier": "tier_1",
"session_entropy": 0.427
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 377,
"timestamp": "2026-01-06T13:03:00Z",
"transaction_amount_usd": 18.17
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.612,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1313.11,
"financial_exposure_usd": 3245.04,
"recoverable_pct": 0.97
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104635",
"label": "fraudulent",
"label_confidence": 0.875,
"severity": "critical",
"timestamp": "2026-01-04T05:15:00Z",
"trace_id": "b5fa1367-b425-24f0-41b9-1b8fae010b6b"
} | {
"account_age_days": 1951,
"account_id": "ACCT-145B2164C40B",
"baseline_risk_score": 0.359,
"kyc_tier": "tier_1",
"session_entropy": 0.163
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 87,
"timestamp": "2026-01-03T18:36:00Z",
"transaction_amount_usd": 22.76
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.741,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1842708.03,
"financial_exposure_usd": 4295479.4,
"recoverable_pct": 0.707
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103615",
"label": "fraudulent",
"label_confidence": 0.629,
"severity": "high",
"timestamp": "2026-01-03T12:15:00Z",
"trace_id": "34e0a20b-2f1f-84b5-85b1-08ecdda53cca"
} | {
"account_age_days": 394,
"account_id": "ACCT-94018E991509",
"baseline_risk_score": 0.338,
"kyc_tier": "tier_1",
"session_entropy": 0.278
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 900,
"timestamp": "2026-01-03T12:15:00Z",
"transaction_amount_usd": 605014.11
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.924,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4641966.62,
"financial_exposure_usd": 5447386.19,
"recoverable_pct": 0.761
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107201",
"label": "benign",
"label_confidence": 0.469,
"severity": "high",
"timestamp": "2026-01-06T00:01:00Z",
"trace_id": "56e0c9bb-56c7-d132-7941-201832fffe74"
} | {
"account_age_days": 1596,
"account_id": "ACCT-623AA4B4868B",
"baseline_risk_score": 0.087,
"kyc_tier": "tier_1",
"session_entropy": 0.624
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 190,
"timestamp": "2026-01-05T21:31:00Z",
"transaction_amount_usd": 24.21
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.551,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 793.21,
"financial_exposure_usd": 1900.5,
"recoverable_pct": 0.831
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106052",
"label": "fraudulent",
"label_confidence": 0.643,
"severity": "low",
"timestamp": "2026-01-05T04:52:00Z",
"trace_id": "d58c5685-c712-f9b7-66cb-8a804c7d0e04"
} | {
"account_age_days": 53,
"account_id": "ACCT-881EEF8E2A38",
"baseline_risk_score": 0.211,
"kyc_tier": "tier_2",
"session_entropy": 0.734
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 1180,
"timestamp": "2026-01-05T04:52:00Z",
"transaction_amount_usd": 500330.45
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.735,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 6483619.84,
"financial_exposure_usd": 8298405.8,
"recoverable_pct": 0.764
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101089",
"label": "fraudulent",
"label_confidence": 0.812,
"severity": "critical",
"timestamp": "2026-01-01T18:09:00Z",
"trace_id": "546c95fb-22de-dc6e-78f0-950a0833438f"
} | {
"account_age_days": 1177,
"account_id": "ACCT-AF63D3F7F406",
"baseline_risk_score": 0.375,
"kyc_tier": "tier_3",
"session_entropy": 0.729
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "GB",
"latency_ms": 743,
"timestamp": "2026-01-01T18:09:00Z",
"transaction_amount_usd": 53379.96
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.647,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 367026.73,
"financial_exposure_usd": 492501.47,
"recoverable_pct": 0.788
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103057",
"label": "fraudulent",
"label_confidence": 0.943,
"severity": "high",
"timestamp": "2026-01-03T02:57:00Z",
"trace_id": "0063f23e-a62c-5111-6924-03075d2ce800"
} | {
"account_age_days": 123,
"account_id": "ACCT-299FC7DB7ED3",
"baseline_risk_score": 0.298,
"kyc_tier": "tier_1",
"session_entropy": 0.221
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 644,
"timestamp": "2026-01-03T02:57:00Z",
"transaction_amount_usd": 84045.61
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.699,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 335095.3,
"financial_exposure_usd": 475513.57,
"recoverable_pct": 0.563
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104509",
"label": "fraudulent",
"label_confidence": 0.832,
"severity": "high",
"timestamp": "2026-01-04T03:09:00Z",
"trace_id": "9600940c-6e75-5660-dc67-1c0e75c5f65d"
} | {
"account_age_days": 39,
"account_id": "ACCT-E17E464268DF",
"baseline_risk_score": 0.421,
"kyc_tier": "tier_3",
"session_entropy": 0.857
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 159,
"timestamp": "2026-01-04T03:09:00Z",
"transaction_amount_usd": 212787.82
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.463,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3577262.5,
"financial_exposure_usd": 6217126.83,
"recoverable_pct": 0.446
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102610",
"label": "fraudulent",
"label_confidence": 0.904,
"severity": "medium",
"timestamp": "2026-01-02T19:30:00Z",
"trace_id": "47ee55d3-5f2c-a879-640d-ee82476fd109"
} | {
"account_age_days": 1699,
"account_id": "ACCT-16B3CD66B1A3",
"baseline_risk_score": 0.546,
"kyc_tier": "tier_1",
"session_entropy": 0.934
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 550,
"timestamp": "2026-01-02T19:30:00Z",
"transaction_amount_usd": 89479.79
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.801,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 802780.11,
"financial_exposure_usd": 1113045.92,
"recoverable_pct": 0.433
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102255",
"label": "fraudulent",
"label_confidence": 0.959,
"severity": "critical",
"timestamp": "2026-01-02T13:35:00Z",
"trace_id": "568a0ed5-8f63-3556-ceac-3fd74702c6eb"
} | {
"account_age_days": 308,
"account_id": "ACCT-52852819EE10",
"baseline_risk_score": 0.365,
"kyc_tier": "tier_2",
"session_entropy": 0.153
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "MY",
"latency_ms": 1193,
"timestamp": "2026-01-02T13:35:00Z",
"transaction_amount_usd": 42363.89
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.833,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 996557.61,
"financial_exposure_usd": 1011108.37,
"recoverable_pct": 0.36
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107116",
"label": "benign",
"label_confidence": 0.645,
"severity": "low",
"timestamp": "2026-01-05T22:36:00Z",
"trace_id": "91d63468-011a-f9da-1ad8-e36e839b2c9a"
} | {
"account_age_days": 563,
"account_id": "ACCT-2EAEAAA0A698",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.419
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 1134,
"timestamp": "2026-01-05T22:36:00Z",
"transaction_amount_usd": 13278.66
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.66,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 3044.1,
"financial_exposure_usd": 4067.75,
"recoverable_pct": 0.972
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106228",
"label": "fraudulent",
"label_confidence": 0.746,
"severity": "medium",
"timestamp": "2026-01-05T07:48:00Z",
"trace_id": "d3de314e-de96-8108-2ee6-1e675de518b0"
} | {
"account_age_days": 1642,
"account_id": "ACCT-B92972E2F15C",
"baseline_risk_score": 0.305,
"kyc_tier": "tier_1",
"session_entropy": 0.918
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 286,
"timestamp": "2026-01-04T21:14:00Z",
"transaction_amount_usd": 14.88
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.859,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3969314.27,
"financial_exposure_usd": 7701481.65,
"recoverable_pct": 0.998
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107677",
"label": "benign",
"label_confidence": 0.523,
"severity": "high",
"timestamp": "2026-01-06T07:57:00Z",
"trace_id": "ab1d5f2c-af61-7c3b-aa19-be8478aa757c"
} | {
"account_age_days": 1953,
"account_id": "ACCT-7D54B6E56E60",
"baseline_risk_score": 0.187,
"kyc_tier": "tier_2",
"session_entropy": 0.42
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 880,
"timestamp": "2026-01-06T07:57:00Z",
"transaction_amount_usd": 5124.5
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.619,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3338.72,
"financial_exposure_usd": 3345.94,
"recoverable_pct": 0.598
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106163",
"label": "fraudulent",
"label_confidence": 0.88,
"severity": "high",
"timestamp": "2026-01-05T06:43:00Z",
"trace_id": "29e6a86b-9e3a-5e28-c0fd-c75809e449e1"
} | {
"account_age_days": 544,
"account_id": "ACCT-72F3FE371BD4",
"baseline_risk_score": 0.386,
"kyc_tier": "tier_1",
"session_entropy": 0.148
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 293,
"timestamp": "2026-01-05T06:43:00Z",
"transaction_amount_usd": 178218.78
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.45,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2631999.16,
"financial_exposure_usd": 2752474.33,
"recoverable_pct": 0.579
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104608",
"label": "fraudulent",
"label_confidence": 0.888,
"severity": "low",
"timestamp": "2026-01-04T04:48:00Z",
"trace_id": "fda265b9-089f-e23f-dae7-15f4ba39d0bc"
} | {
"account_age_days": 1821,
"account_id": "ACCT-1F7CD80AA243",
"baseline_risk_score": 0.147,
"kyc_tier": "tier_2",
"session_entropy": 0.885
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 108,
"timestamp": "2026-01-04T02:28:00Z",
"transaction_amount_usd": 22.82
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.353,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3367389.53,
"financial_exposure_usd": 5395903,
"recoverable_pct": 0.806
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101295",
"label": "fraudulent",
"label_confidence": 0.977,
"severity": "critical",
"timestamp": "2026-01-01T21:35:00Z",
"trace_id": "36c31718-22d2-e911-6a30-60e6d78e0c11"
} | {
"account_age_days": 1530,
"account_id": "ACCT-5CAFA699C515",
"baseline_risk_score": 0.363,
"kyc_tier": "tier_1",
"session_entropy": 0.179
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 106,
"timestamp": "2026-01-01T21:35:00Z",
"transaction_amount_usd": 54922.25
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.431,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 69236.69,
"financial_exposure_usd": 144115.02,
"recoverable_pct": 0.198
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100915",
"label": "fraudulent",
"label_confidence": 0.972,
"severity": "critical",
"timestamp": "2026-01-01T15:15:00Z",
"trace_id": "e2609f42-a3d7-81ac-fe37-7a37b52c4b2c"
} | {
"account_age_days": 1685,
"account_id": "ACCT-29E19DD1B499",
"baseline_risk_score": 0.438,
"kyc_tier": "tier_1",
"session_entropy": 0.505
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 826,
"timestamp": "2026-01-01T15:15:00Z",
"transaction_amount_usd": 90894.51
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.428,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 916522.37,
"financial_exposure_usd": 1353928.02,
"recoverable_pct": 0.663
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106248",
"label": "fraudulent",
"label_confidence": 0.703,
"severity": "medium",
"timestamp": "2026-01-05T08:08:00Z",
"trace_id": "4b89b8bf-d39a-e0ce-0caf-5c449189a3a4"
} | {
"account_age_days": 1544,
"account_id": "ACCT-42BB2AC1495F",
"baseline_risk_score": 0.21,
"kyc_tier": "tier_3",
"session_entropy": 0.627
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 528,
"timestamp": "2026-01-05T08:08:00Z",
"transaction_amount_usd": 2867451.93
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.734,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1634296.57,
"financial_exposure_usd": 2346944.19,
"recoverable_pct": 0.792
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107249",
"label": "benign",
"label_confidence": 0.54,
"severity": "medium",
"timestamp": "2026-01-06T00:49:00Z",
"trace_id": "28d83cc9-986a-5611-bfce-dbdb9dcf0838"
} | {
"account_age_days": 248,
"account_id": "ACCT-74DAE8A3CAA7",
"baseline_risk_score": 0.078,
"kyc_tier": "tier_2",
"session_entropy": 0.482
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 205,
"timestamp": "2026-01-05T21:13:00Z",
"transaction_amount_usd": 14.32
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.474,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1406.38,
"financial_exposure_usd": 2689.12,
"recoverable_pct": 0.473
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103794",
"label": "fraudulent",
"label_confidence": 0.744,
"severity": "high",
"timestamp": "2026-01-03T15:14:00Z",
"trace_id": "17c517af-0bc7-a4e4-00c9-eca3be448449"
} | {
"account_age_days": 154,
"account_id": "ACCT-34248F6717B8",
"baseline_risk_score": 0.388,
"kyc_tier": "tier_3",
"session_entropy": 0.261
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 333,
"timestamp": "2026-01-03T03:51:00Z",
"transaction_amount_usd": 9.6
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.925,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 9",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2231266.8,
"financial_exposure_usd": 4272902.9,
"recoverable_pct": 0.874
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104697",
"label": "fraudulent",
"label_confidence": 0.634,
"severity": "critical",
"timestamp": "2026-01-04T06:17:00Z",
"trace_id": "ea1f5cb9-23df-16e4-c46f-934c1e10ec7c"
} | {
"account_age_days": 1812,
"account_id": "ACCT-F485BD2527E1",
"baseline_risk_score": 0.257,
"kyc_tier": "tier_2",
"session_entropy": 0.496
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 363,
"timestamp": "2026-01-04T06:17:00Z",
"transaction_amount_usd": 1769304.51
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.357,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3552377.92,
"financial_exposure_usd": 6772701.73,
"recoverable_pct": 0.84
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106140",
"label": "fraudulent",
"label_confidence": 0.938,
"severity": "medium",
"timestamp": "2026-01-05T06:20:00Z",
"trace_id": "f67ab68e-9472-14af-f95f-8c2bd7f2a722"
} | {
"account_age_days": 1783,
"account_id": "ACCT-309F608B8521",
"baseline_risk_score": 0.21,
"kyc_tier": "tier_2",
"session_entropy": 0.82
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 314,
"timestamp": "2026-01-05T03:42:00Z",
"transaction_amount_usd": 16.79
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.59,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 4298651.09,
"financial_exposure_usd": 5122195.77,
"recoverable_pct": 0.769
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105730",
"label": "fraudulent",
"label_confidence": 0.819,
"severity": "medium",
"timestamp": "2026-01-04T23:30:00Z",
"trace_id": "0664238c-1165-df1a-f169-fb4d6d5fbe31"
} | {
"account_age_days": 1078,
"account_id": "ACCT-76D9F239FF68",
"baseline_risk_score": 0.126,
"kyc_tier": "tier_1",
"session_entropy": 0.786
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 396,
"timestamp": "2026-01-04T23:30:00Z",
"transaction_amount_usd": 1889301.04
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.487,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1389556.2,
"financial_exposure_usd": 2717060.63,
"recoverable_pct": 0.798
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103402",
"label": "fraudulent",
"label_confidence": 0.609,
"severity": "medium",
"timestamp": "2026-01-03T08:42:00Z",
"trace_id": "81378345-7c74-a009-7f34-3625e589af94"
} | {
"account_age_days": 917,
"account_id": "ACCT-1B761D3682CC",
"baseline_risk_score": 0.259,
"kyc_tier": "tier_1",
"session_entropy": 0.699
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 317,
"timestamp": "2026-01-02T20:50:00Z",
"transaction_amount_usd": 23.68
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.548,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 9",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3309661.78,
"financial_exposure_usd": 6688883.81,
"recoverable_pct": 0.741
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105138",
"label": "fraudulent",
"label_confidence": 0.711,
"severity": "low",
"timestamp": "2026-01-04T13:38:00Z",
"trace_id": "9f558d2d-c7ea-6672-3461-678123635164"
} | {
"account_age_days": 427,
"account_id": "ACCT-E109D10855B9",
"baseline_risk_score": 0.163,
"kyc_tier": "tier_1",
"session_entropy": 0.911
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 89,
"timestamp": "2026-01-04T08:34:00Z",
"transaction_amount_usd": 24.99
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.937,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4830866.86,
"financial_exposure_usd": 6652868.19,
"recoverable_pct": 0.473
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103840",
"label": "fraudulent",
"label_confidence": 0.847,
"severity": "medium",
"timestamp": "2026-01-03T16:00:00Z",
"trace_id": "fd528bf5-097c-c91a-d3a4-6743113d8a25"
} | {
"account_age_days": 1718,
"account_id": "ACCT-CA6637C5041F",
"baseline_risk_score": 0.19,
"kyc_tier": "tier_2",
"session_entropy": 0.357
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 360,
"timestamp": "2026-01-03T16:00:00Z",
"transaction_amount_usd": 1553270.32
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.688,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2790658.56,
"financial_exposure_usd": 3348041.63,
"recoverable_pct": 0.538
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106912",
"label": "benign",
"label_confidence": 0.641,
"severity": "medium",
"timestamp": "2026-01-05T19:12:00Z",
"trace_id": "657f2d31-a7e4-c61d-c670-f4842ab0041d"
} | {
"account_age_days": 870,
"account_id": "ACCT-DE64776D5C96",
"baseline_risk_score": 0.149,
"kyc_tier": "tier_1",
"session_entropy": 0.698
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 124,
"timestamp": "2026-01-05T19:12:00Z",
"transaction_amount_usd": 11696.73
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.537,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2095.57,
"financial_exposure_usd": 2278.21,
"recoverable_pct": 0.837
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101927",
"label": "fraudulent",
"label_confidence": 0.847,
"severity": "critical",
"timestamp": "2026-01-02T08:07:00Z",
"trace_id": "1ffde73a-1ca8-28af-6487-bd8c85abd5f8"
} | {
"account_age_days": 286,
"account_id": "ACCT-B0CADEE973CB",
"baseline_risk_score": 0.542,
"kyc_tier": "tier_1",
"session_entropy": 0.94
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 183,
"timestamp": "2026-01-02T01:56:00Z",
"transaction_amount_usd": 0.13
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.404,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 285030.97,
"financial_exposure_usd": 308008.47,
"recoverable_pct": 0.553
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100935",
"label": "fraudulent",
"label_confidence": 0.835,
"severity": "low",
"timestamp": "2026-01-01T15:35:00Z",
"trace_id": "580d806b-9671-e209-22d4-a73916fb37d8"
} | {
"account_age_days": 1956,
"account_id": "ACCT-0E850E6B4C19",
"baseline_risk_score": 0.564,
"kyc_tier": "tier_3",
"session_entropy": 0.149
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 235,
"timestamp": "2026-01-01T12:42:00Z",
"transaction_amount_usd": 16.41
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.832,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 641113.98,
"financial_exposure_usd": 970152.36,
"recoverable_pct": 0.469
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102960",
"label": "fraudulent",
"label_confidence": 0.829,
"severity": "critical",
"timestamp": "2026-01-03T01:20:00Z",
"trace_id": "b2a50fb0-2b09-3347-0c74-b24fedd6b9d1"
} | {
"account_age_days": 709,
"account_id": "ACCT-6FC5636E2D05",
"baseline_risk_score": 0.439,
"kyc_tier": "tier_3",
"session_entropy": 0.914
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "FR",
"latency_ms": 263,
"timestamp": "2026-01-03T01:20:00Z",
"transaction_amount_usd": 18065
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.914,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 296424.89,
"financial_exposure_usd": 560283.75,
"recoverable_pct": 0.153
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108490",
"label": "benign",
"label_confidence": 0.581,
"severity": "low",
"timestamp": "2026-01-06T21:30:00Z",
"trace_id": "36c5c876-2ae0-c077-ee22-bcde16c757c0"
} | {
"account_age_days": 1440,
"account_id": "ACCT-F3D82A7E39F6",
"baseline_risk_score": 0.123,
"kyc_tier": "tier_3",
"session_entropy": 0.17
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 1053,
"timestamp": "2026-01-06T21:30:00Z",
"transaction_amount_usd": 13178.39
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.585,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2849.81,
"financial_exposure_usd": 3999.43,
"recoverable_pct": 0.91
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101859",
"label": "fraudulent",
"label_confidence": 0.96,
"severity": "high",
"timestamp": "2026-01-02T06:59:00Z",
"trace_id": "4d055c39-500c-62d3-8040-b31db80411d3"
} | {
"account_age_days": 650,
"account_id": "ACCT-3A27E02AF6B8",
"baseline_risk_score": 0.549,
"kyc_tier": "tier_1",
"session_entropy": 0.428
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 327,
"timestamp": "2026-01-02T06:59:00Z",
"transaction_amount_usd": 111203.87
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.654,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 570192.69,
"financial_exposure_usd": 915141.29,
"recoverable_pct": 0.836
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106822",
"label": "benign",
"label_confidence": 0.624,
"severity": "medium",
"timestamp": "2026-01-05T17:42:00Z",
"trace_id": "93114807-a2bb-eefe-8a4e-d65a06fed46c"
} | {
"account_age_days": 254,
"account_id": "ACCT-D611C40F19F7",
"baseline_risk_score": 0.135,
"kyc_tier": "tier_1",
"session_entropy": 0.912
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 644,
"timestamp": "2026-01-05T17:42:00Z",
"transaction_amount_usd": 14946.38
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.661,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3338.59,
"financial_exposure_usd": 4384.59,
"recoverable_pct": 0.442
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108965",
"label": "benign",
"label_confidence": 0.701,
"severity": "medium",
"timestamp": "2026-01-07T05:25:00Z",
"trace_id": "788dfbce-e12b-cda2-39ee-cefd53277939"
} | {
"account_age_days": 86,
"account_id": "ACCT-30E519A27013",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.178
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 354,
"timestamp": "2026-01-06T16:49:00Z",
"transaction_amount_usd": 23.37
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.457,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3550.89,
"financial_exposure_usd": 3791.03,
"recoverable_pct": 0.423
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109506",
"label": "benign",
"label_confidence": 0.638,
"severity": "high",
"timestamp": "2026-01-07T14:26:00Z",
"trace_id": "0c1d190f-cfb5-2f6d-3259-a20b63b9f67e"
} | {
"account_age_days": 1434,
"account_id": "ACCT-7A6D90FEADC7",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.148
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 371,
"timestamp": "2026-01-07T14:26:00Z",
"transaction_amount_usd": 7184.31
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.678,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2022.23,
"financial_exposure_usd": 2109.09,
"recoverable_pct": 0.784
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105434",
"label": "fraudulent",
"label_confidence": 0.944,
"severity": "medium",
"timestamp": "2026-01-04T18:34:00Z",
"trace_id": "8c2adda9-22f5-f3ff-add0-35fb91bea4e4"
} | {
"account_age_days": 523,
"account_id": "ACCT-1B6305809989",
"baseline_risk_score": 0.307,
"kyc_tier": "tier_2",
"session_entropy": 0.542
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 200,
"timestamp": "2026-01-04T18:34:00Z",
"transaction_amount_usd": 479789.72
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.562,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1194503.05,
"financial_exposure_usd": 2120727.37,
"recoverable_pct": 0.683
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100314",
"label": "fraudulent",
"label_confidence": 0.955,
"severity": "critical",
"timestamp": "2026-01-01T05:14:00Z",
"trace_id": "4f3fbe07-9dba-68ea-b6ef-2c437b939d83"
} | {
"account_age_days": 405,
"account_id": "ACCT-11F0A92322B2",
"baseline_risk_score": 0.345,
"kyc_tier": "tier_2",
"session_entropy": 0.586
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 1033,
"timestamp": "2026-01-01T05:14:00Z",
"transaction_amount_usd": 110869.83
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.7,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING ... | {
"customer_funds_at_risk_usd": 284402.92,
"financial_exposure_usd": 471350.78,
"recoverable_pct": 0.404
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108058",
"label": "benign",
"label_confidence": 0.648,
"severity": "medium",
"timestamp": "2026-01-06T14:18:00Z",
"trace_id": "00ec5e2c-f67d-4c11-8db0-8c705fc3f275"
} | {
"account_age_days": 1454,
"account_id": "ACCT-9A368E20FB8A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.762
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 266,
"timestamp": "2026-01-06T11:58:00Z",
"transaction_amount_usd": 4.48
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.663,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2412.94,
"financial_exposure_usd": 2449.47,
"recoverable_pct": 0.906
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101189",
"label": "fraudulent",
"label_confidence": 0.789,
"severity": "low",
"timestamp": "2026-01-01T19:49:00Z",
"trace_id": "73016774-f8b2-95cd-2d47-c29defbff611"
} | {
"account_age_days": 1784,
"account_id": "ACCT-289CAC89B4E1",
"baseline_risk_score": 0.643,
"kyc_tier": "tier_2",
"session_entropy": 0.846
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 201,
"timestamp": "2026-01-01T09:05:00Z",
"transaction_amount_usd": 7.61
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.685,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 546821.95,
"financial_exposure_usd": 728144.47,
"recoverable_pct": 0.087
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107459",
"label": "benign",
"label_confidence": 0.595,
"severity": "medium",
"timestamp": "2026-01-06T04:19:00Z",
"trace_id": "da1aed93-c392-0347-a68e-27b356003fcb"
} | {
"account_age_days": 445,
"account_id": "ACCT-F0E6B81D7957",
"baseline_risk_score": 0.18,
"kyc_tier": "tier_1",
"session_entropy": 0.649
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 453,
"timestamp": "2026-01-06T04:19:00Z",
"transaction_amount_usd": 2426.48
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.651,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1600.36,
"financial_exposure_usd": 2238.19,
"recoverable_pct": 0.405
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107427",
"label": "benign",
"label_confidence": 0.544,
"severity": "high",
"timestamp": "2026-01-06T03:47:00Z",
"trace_id": "c3e04f7b-9a8f-4a15-9249-b186cda327d5"
} | {
"account_age_days": 941,
"account_id": "ACCT-CDBDD174535F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.707
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 253,
"timestamp": "2026-01-05T19:09:00Z",
"transaction_amount_usd": 19.66
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.638,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 4899.71,
"financial_exposure_usd": 5135.97,
"recoverable_pct": 0.837
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104898",
"label": "fraudulent",
"label_confidence": 0.654,
"severity": "medium",
"timestamp": "2026-01-04T09:38:00Z",
"trace_id": "b5b5911b-c1e8-b190-2047-6522da8d39d7"
} | {
"account_age_days": 622,
"account_id": "ACCT-B6BFF1F7463A",
"baseline_risk_score": 0.253,
"kyc_tier": "tier_2",
"session_entropy": 0.604
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 944,
"timestamp": "2026-01-04T09:38:00Z",
"transaction_amount_usd": 1443764.04
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.615,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2948315.91,
"financial_exposure_usd": 6164975.69,
"recoverable_pct": 0.691
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107643",
"label": "benign",
"label_confidence": 0.458,
"severity": "high",
"timestamp": "2026-01-06T07:23:00Z",
"trace_id": "f9a4ea04-fe92-c870-8970-a751e92a457d"
} | {
"account_age_days": 667,
"account_id": "ACCT-7D921CD8DC72",
"baseline_risk_score": 0.149,
"kyc_tier": "tier_2",
"session_entropy": 0.91
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 123,
"timestamp": "2026-01-06T07:23:00Z",
"transaction_amount_usd": 7993.53
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.736,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 112.9,
"financial_exposure_usd": 182.83,
"recoverable_pct": 0.684
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100238",
"label": "fraudulent",
"label_confidence": 0.762,
"severity": "critical",
"timestamp": "2026-01-01T03:58:00Z",
"trace_id": "39c29259-7310-453d-a962-a21a0fafba84"
} | {
"account_age_days": 1150,
"account_id": "ACCT-F316891D8896",
"baseline_risk_score": 0.301,
"kyc_tier": "tier_2",
"session_entropy": 0.829
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 301,
"timestamp": "2025-12-31T17:01:00Z",
"transaction_amount_usd": 5.1
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.896,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 378945.76,
"financial_exposure_usd": 877800.83,
"recoverable_pct": 0.153
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108874",
"label": "benign",
"label_confidence": 0.649,
"severity": "low",
"timestamp": "2026-01-07T03:54:00Z",
"trace_id": "78607b9c-7b9d-1155-db53-e763c3dfde1d"
} | {
"account_age_days": 1564,
"account_id": "ACCT-0B8D5DDD58F6",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.877
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 511,
"timestamp": "2026-01-07T03:54:00Z",
"transaction_amount_usd": 11151.83
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.614,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 994.76,
"financial_exposure_usd": 1718.74,
"recoverable_pct": 0.987
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100710",
"label": "fraudulent",
"label_confidence": 0.881,
"severity": "low",
"timestamp": "2026-01-01T11:50:00Z",
"trace_id": "ae4fe8b4-b2b9-7b7a-bdb5-f4e42e914282"
} | {
"account_age_days": 826,
"account_id": "ACCT-BD2D09F70CA2",
"baseline_risk_score": 0.509,
"kyc_tier": "tier_2",
"session_entropy": 0.366
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 365,
"timestamp": "2026-01-01T07:25:00Z",
"transaction_amount_usd": 21.85
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.371,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 503741.68,
"financial_exposure_usd": 769567.68,
"recoverable_pct": 0.227
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101450",
"label": "fraudulent",
"label_confidence": 0.843,
"severity": "critical",
"timestamp": "2026-01-02T00:10:00Z",
"trace_id": "7f89ea7a-2eb9-ace2-69dd-1c31544f7199"
} | {
"account_age_days": 1594,
"account_id": "ACCT-4DCBFACC3B0E",
"baseline_risk_score": 0.417,
"kyc_tier": "tier_2",
"session_entropy": 0.707
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 417,
"timestamp": "2026-01-02T00:10:00Z",
"transaction_amount_usd": 8956.24
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.385,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 517423.62,
"financial_exposure_usd": 636802.94,
"recoverable_pct": 0.267
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100566",
"label": "fraudulent",
"label_confidence": 0.762,
"severity": "high",
"timestamp": "2026-01-01T09:26:00Z",
"trace_id": "e391bb7f-7843-ddd8-51e3-942fbd634026"
} | {
"account_age_days": 410,
"account_id": "ACCT-A165E72A0411",
"baseline_risk_score": 0.596,
"kyc_tier": "tier_1",
"session_entropy": 0.614
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 326,
"timestamp": "2026-01-01T02:53:00Z",
"transaction_amount_usd": 5.04
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.633,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 345764.52,
"financial_exposure_usd": 412264.05,
"recoverable_pct": 0.582
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103204",
"label": "fraudulent",
"label_confidence": 0.789,
"severity": "high",
"timestamp": "2026-01-03T05:24:00Z",
"trace_id": "1e21ccde-ec48-79ac-064d-3c3641fd9c5e"
} | {
"account_age_days": 756,
"account_id": "ACCT-6FE74035BF6D",
"baseline_risk_score": 0.415,
"kyc_tier": "tier_3",
"session_entropy": 0.333
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 247,
"timestamp": "2026-01-03T05:24:00Z",
"transaction_amount_usd": 101605.31
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.427,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 226316.72,
"financial_exposure_usd": 457121.55,
"recoverable_pct": 0.238
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102733",
"label": "fraudulent",
"label_confidence": 0.765,
"severity": "medium",
"timestamp": "2026-01-02T21:33:00Z",
"trace_id": "19150828-f868-c506-aab3-38511b0ba56c"
} | {
"account_age_days": 246,
"account_id": "ACCT-4E64AE8042C6",
"baseline_risk_score": 0.62,
"kyc_tier": "tier_1",
"session_entropy": 0.922
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 285,
"timestamp": "2026-01-02T15:38:00Z",
"transaction_amount_usd": 8.07
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.544,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 693523.09,
"financial_exposure_usd": 1081656.66,
"recoverable_pct": 0.158
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109535",
"label": "benign",
"label_confidence": 0.494,
"severity": "low",
"timestamp": "2026-01-07T14:55:00Z",
"trace_id": "689bab35-34a6-39ba-5c1e-b7963973ecca"
} | {
"account_age_days": 699,
"account_id": "ACCT-DEBBA6DB98ED",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.122
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 382,
"timestamp": "2026-01-07T06:28:00Z",
"transaction_amount_usd": 1.56
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.622,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1693.48,
"financial_exposure_usd": 1862.43,
"recoverable_pct": 0.861
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105093",
"label": "fraudulent",
"label_confidence": 0.755,
"severity": "high",
"timestamp": "2026-01-04T12:53:00Z",
"trace_id": "bdc1692e-8cb5-8d97-3bff-7fb9660115b6"
} | {
"account_age_days": 1916,
"account_id": "ACCT-BB74B8B8B218",
"baseline_risk_score": 0.117,
"kyc_tier": "tier_3",
"session_entropy": 0.229
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 343,
"timestamp": "2026-01-04T04:06:00Z",
"transaction_amount_usd": 5.68
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.865,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2787810.31,
"financial_exposure_usd": 2895285.98,
"recoverable_pct": 0.922
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101773",
"label": "fraudulent",
"label_confidence": 0.954,
"severity": "medium",
"timestamp": "2026-01-02T05:33:00Z",
"trace_id": "20e7bd4d-8d3d-fb98-f7d8-19a925973a4c"
} | {
"account_age_days": 491,
"account_id": "ACCT-FAAAA5F61D4B",
"baseline_risk_score": 0.485,
"kyc_tier": "tier_1",
"session_entropy": 0.912
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 192,
"timestamp": "2026-01-02T05:33:00Z",
"transaction_amount_usd": 1916.34
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.882,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 426292.11,
"financial_exposure_usd": 780780.58,
"recoverable_pct": 0.661
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108925",
"label": "benign",
"label_confidence": 0.489,
"severity": "low",
"timestamp": "2026-01-07T04:45:00Z",
"trace_id": "b1bfb6e1-c523-e558-3e82-46543df4c9f1"
} | {
"account_age_days": 1462,
"account_id": "ACCT-D87BFC41E9B0",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.367
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 787,
"timestamp": "2026-01-07T04:45:00Z",
"transaction_amount_usd": 3434.14
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.476,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2005.65,
"financial_exposure_usd": 3487.23,
"recoverable_pct": 0.669
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107093",
"label": "benign",
"label_confidence": 0.644,
"severity": "high",
"timestamp": "2026-01-05T22:13:00Z",
"trace_id": "1d9e575f-9a95-7d63-7da6-a144ef41e1d4"
} | {
"account_age_days": 1451,
"account_id": "ACCT-FC2FACB49A30",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.678
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 1034,
"timestamp": "2026-01-05T22:13:00Z",
"transaction_amount_usd": 5361.46
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.543,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1490.06,
"financial_exposure_usd": 1846.47,
"recoverable_pct": 0.942
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100914",
"label": "fraudulent",
"label_confidence": 0.806,
"severity": "medium",
"timestamp": "2026-01-01T15:14:00Z",
"trace_id": "c8147819-825f-5cb7-8f83-a4dcc1d393af"
} | {
"account_age_days": 584,
"account_id": "ACCT-C9E66D52ACCB",
"baseline_risk_score": 0.373,
"kyc_tier": "tier_2",
"session_entropy": 0.354
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 945,
"timestamp": "2026-01-01T15:14:00Z",
"transaction_amount_usd": 93759.42
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.412,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 552128.14,
"financial_exposure_usd": 827807.16,
"recoverable_pct": 0.291
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103582",
"label": "fraudulent",
"label_confidence": 0.897,
"severity": "high",
"timestamp": "2026-01-03T11:42:00Z",
"trace_id": "988b103a-8548-91ba-ea54-0ff98e2601c9"
} | {
"account_age_days": 1881,
"account_id": "ACCT-DF39E6A1D5B8",
"baseline_risk_score": 0.189,
"kyc_tier": "tier_1",
"session_entropy": 0.615
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 1043,
"timestamp": "2026-01-03T11:42:00Z",
"transaction_amount_usd": 2095341.21
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.747,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3294306.24,
"financial_exposure_usd": 4691449.12,
"recoverable_pct": 0.675
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102712",
"label": "fraudulent",
"label_confidence": 0.955,
"severity": "medium",
"timestamp": "2026-01-02T21:12:00Z",
"trace_id": "ab64fa0c-d84f-2ce0-8912-e2aea023a2b9"
} | {
"account_age_days": 18,
"account_id": "ACCT-2D3D7D862F27",
"baseline_risk_score": 0.334,
"kyc_tier": "tier_1",
"session_entropy": 0.253
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 993,
"timestamp": "2026-01-02T21:12:00Z",
"transaction_amount_usd": 70485.02
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.758,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 844212.59,
"financial_exposure_usd": 987426.01,
"recoverable_pct": 0.124
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108060",
"label": "benign",
"label_confidence": 0.502,
"severity": "medium",
"timestamp": "2026-01-06T14:20:00Z",
"trace_id": "838d7685-d37d-466b-d220-aef89f27b7d4"
} | {
"account_age_days": 1761,
"account_id": "ACCT-72B515574BC6",
"baseline_risk_score": 0.087,
"kyc_tier": "tier_3",
"session_entropy": 0.839
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 126,
"timestamp": "2026-01-06T07:45:00Z",
"transaction_amount_usd": 15.18
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.707,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1368.82,
"financial_exposure_usd": 2742.74,
"recoverable_pct": 0.981
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109034",
"label": "benign",
"label_confidence": 0.6,
"severity": "low",
"timestamp": "2026-01-07T06:34:00Z",
"trace_id": "498f1a1a-d7c1-200c-a9ec-56a897674c6b"
} | {
"account_age_days": 1583,
"account_id": "ACCT-E8F6662E3403",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.305
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 637,
"timestamp": "2026-01-07T06:34:00Z",
"transaction_amount_usd": 7196.04
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.74,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 4907.03,
"financial_exposure_usd": 6417.89,
"recoverable_pct": 0.639
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100317",
"label": "fraudulent",
"label_confidence": 0.87,
"severity": "high",
"timestamp": "2026-01-01T05:17:00Z",
"trace_id": "675684ce-0ce3-dcce-0b2a-29944cffa037"
} | {
"account_age_days": 519,
"account_id": "ACCT-FFD04FA69170",
"baseline_risk_score": 0.251,
"kyc_tier": "tier_1",
"session_entropy": 0.176
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "SG",
"latency_ms": 341,
"timestamp": "2026-01-01T05:17:00Z",
"transaction_amount_usd": 91808.91
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.829,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 487386.3,
"financial_exposure_usd": 651771.53,
"recoverable_pct": 0.727
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102538",
"label": "fraudulent",
"label_confidence": 0.966,
"severity": "high",
"timestamp": "2026-01-02T18:18:00Z",
"trace_id": "359c7210-62d1-163f-db30-933c7a10bd38"
} | {
"account_age_days": 1449,
"account_id": "ACCT-C7F726394667",
"baseline_risk_score": 0.386,
"kyc_tier": "tier_3",
"session_entropy": 0.159
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "GB",
"latency_ms": 438,
"timestamp": "2026-01-02T18:18:00Z",
"transaction_amount_usd": 90640.26
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.683,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 239992.76,
"financial_exposure_usd": 412749.01,
"recoverable_pct": 0.383
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102719",
"label": "fraudulent",
"label_confidence": 0.972,
"severity": "critical",
"timestamp": "2026-01-02T21:19:00Z",
"trace_id": "72d60d21-7498-263b-1838-63169d996e0a"
} | {
"account_age_days": 954,
"account_id": "ACCT-B44D1741588C",
"baseline_risk_score": 0.431,
"kyc_tier": "tier_3",
"session_entropy": 0.493
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 957,
"timestamp": "2026-01-02T21:19:00Z",
"transaction_amount_usd": 63498.57
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.71,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 543190.97,
"financial_exposure_usd": 733164.21,
"recoverable_pct": 0.27
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102626",
"label": "fraudulent",
"label_confidence": 0.961,
"severity": "medium",
"timestamp": "2026-01-02T19:46:00Z",
"trace_id": "d2aba2c9-a909-483c-c5fb-c7ccac743edc"
} | {
"account_age_days": 228,
"account_id": "ACCT-A96B252AC516",
"baseline_risk_score": 0.487,
"kyc_tier": "tier_3",
"session_entropy": 0.499
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 247,
"timestamp": "2026-01-02T15:05:00Z",
"transaction_amount_usd": 11.93
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.925,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 307804.19,
"financial_exposure_usd": 341173.67,
"recoverable_pct": 0.391
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108405",
"label": "benign",
"label_confidence": 0.453,
"severity": "critical",
"timestamp": "2026-01-06T20:05:00Z",
"trace_id": "3f506d8c-0671-9d74-91f8-44bde618f3d9"
} | {
"account_age_days": 1247,
"account_id": "ACCT-73949C4271EA",
"baseline_risk_score": 0.177,
"kyc_tier": "tier_3",
"session_entropy": 0.671
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 224,
"timestamp": "2026-01-06T11:16:00Z",
"transaction_amount_usd": 14.84
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.605,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 5242.71,
"financial_exposure_usd": 6938.28,
"recoverable_pct": 0.514
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100837",
"label": "fraudulent",
"label_confidence": 0.823,
"severity": "medium",
"timestamp": "2026-01-01T13:57:00Z",
"trace_id": "cc85d56c-2ade-3fb2-9573-1c338f7a32e1"
} | {
"account_age_days": 768,
"account_id": "ACCT-418FBAB03D56",
"baseline_risk_score": 0.461,
"kyc_tier": "tier_3",
"session_entropy": 0.272
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NL",
"latency_ms": 789,
"timestamp": "2026-01-01T13:57:00Z",
"transaction_amount_usd": 106528.05
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.932,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 346162.7,
"financial_exposure_usd": 748263.12,
"recoverable_pct": 0.793
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102822",
"label": "fraudulent",
"label_confidence": 0.769,
"severity": "low",
"timestamp": "2026-01-02T23:02:00Z",
"trace_id": "d6b02ea6-46a3-0f5d-07a4-1412dcc9567a"
} | {
"account_age_days": 1990,
"account_id": "ACCT-C90AF10116AB",
"baseline_risk_score": 0.601,
"kyc_tier": "tier_1",
"session_entropy": 0.633
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "DE",
"latency_ms": 810,
"timestamp": "2026-01-02T23:02:00Z",
"transaction_amount_usd": 86742.31
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.594,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 332058.54,
"financial_exposure_usd": 472370.91,
"recoverable_pct": 0.193
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102556",
"label": "fraudulent",
"label_confidence": 0.819,
"severity": "high",
"timestamp": "2026-01-02T18:36:00Z",
"trace_id": "285ab9d7-5ccd-de73-d43c-1ff1a26e2d44"
} | {
"account_age_days": 1240,
"account_id": "ACCT-DCA150A176FD",
"baseline_risk_score": 0.47,
"kyc_tier": "tier_2",
"session_entropy": 0.357
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 334,
"timestamp": "2026-01-02T13:25:00Z",
"transaction_amount_usd": 18.06
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.386,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 475776.07,
"financial_exposure_usd": 558782.49,
"recoverable_pct": 0.436
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109942",
"label": "benign",
"label_confidence": 0.718,
"severity": "high",
"timestamp": "2026-01-07T21:42:00Z",
"trace_id": "82f08e09-c61b-867a-4949-cbe9a4c9a7b3"
} | {
"account_age_days": 188,
"account_id": "ACCT-95CA94031BF3",
"baseline_risk_score": 0.165,
"kyc_tier": "tier_1",
"session_entropy": 0.422
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 178,
"timestamp": "2026-01-07T12:42:00Z",
"transaction_amount_usd": 13.22
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.672,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3104.59,
"financial_exposure_usd": 3189.28,
"recoverable_pct": 0.729
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106786",
"label": "benign",
"label_confidence": 0.718,
"severity": "high",
"timestamp": "2026-01-05T17:06:00Z",
"trace_id": "e0e29f4a-d67f-a915-5760-b38c9834c62e"
} | {
"account_age_days": 1753,
"account_id": "ACCT-381BEC76FE9E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.627
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 665,
"timestamp": "2026-01-05T17:06:00Z",
"transaction_amount_usd": 526.01
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.538,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3153.88,
"financial_exposure_usd": 4070.7,
"recoverable_pct": 0.695
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109011",
"label": "benign",
"label_confidence": 0.497,
"severity": "medium",
"timestamp": "2026-01-07T06:11:00Z",
"trace_id": "b75b6edc-bc9b-d649-349e-9f8dccb82cc4"
} | {
"account_age_days": 168,
"account_id": "ACCT-259BA1D45CC8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.471
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 761,
"timestamp": "2026-01-07T06:11:00Z",
"transaction_amount_usd": 3133.22
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.626,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3425.7,
"financial_exposure_usd": 3538.82,
"recoverable_pct": 0.627
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107512",
"label": "benign",
"label_confidence": 0.572,
"severity": "medium",
"timestamp": "2026-01-06T05:12:00Z",
"trace_id": "05ab524a-0a97-1ca8-d67f-1825dd43327f"
} | {
"account_age_days": 476,
"account_id": "ACCT-D6156F25BBA3",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.237
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 394,
"timestamp": "2026-01-06T02:57:00Z",
"transaction_amount_usd": 17.05
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.595,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1415.21,
"financial_exposure_usd": 2778.72,
"recoverable_pct": 0.794
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106018",
"label": "fraudulent",
"label_confidence": 0.881,
"severity": "medium",
"timestamp": "2026-01-05T04:18:00Z",
"trace_id": "93ab4117-2b41-e4ab-1831-428334a3a341"
} | {
"account_age_days": 1977,
"account_id": "ACCT-FF965BE48BB7",
"baseline_risk_score": 0.15,
"kyc_tier": "tier_1",
"session_entropy": 0.487
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 572,
"timestamp": "2026-01-05T04:18:00Z",
"transaction_amount_usd": 2162883.93
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.898,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1516628.47,
"financial_exposure_usd": 2817703.89,
"recoverable_pct": 0.61
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100924",
"label": "fraudulent",
"label_confidence": 0.802,
"severity": "critical",
"timestamp": "2026-01-01T15:24:00Z",
"trace_id": "81f211d7-153d-b7db-0e63-aaa7a3771146"
} | {
"account_age_days": 1968,
"account_id": "ACCT-29E7D32CB3D7",
"baseline_risk_score": 0.291,
"kyc_tier": "tier_1",
"session_entropy": 0.242
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 855,
"timestamp": "2026-01-01T15:24:00Z",
"transaction_amount_usd": 25700.61
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.676,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 877165.83,
"financial_exposure_usd": 1081699.69,
"recoverable_pct": 0.118
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101254",
"label": "fraudulent",
"label_confidence": 0.775,
"severity": "medium",
"timestamp": "2026-01-01T20:54:00Z",
"trace_id": "9ee1c695-49ab-4042-4722-ff16a4c63f8a"
} | {
"account_age_days": 81,
"account_id": "ACCT-A6081C6A11B8",
"baseline_risk_score": 0.263,
"kyc_tier": "tier_1",
"session_entropy": 0.294
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 1103,
"timestamp": "2026-01-01T20:54:00Z",
"transaction_amount_usd": 17963.02
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.905,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 559720.43,
"financial_exposure_usd": 765559.4,
"recoverable_pct": 0.499
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107406",
"label": "benign",
"label_confidence": 0.664,
"severity": "low",
"timestamp": "2026-01-06T03:26:00Z",
"trace_id": "56ddc5d8-9637-72e3-524e-7241cee044e6"
} | {
"account_age_days": 1520,
"account_id": "ACCT-A77E47A43C76",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.836
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 191,
"timestamp": "2026-01-05T18:10:00Z",
"transaction_amount_usd": 17.96
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.761,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 709.19,
"financial_exposure_usd": 921.05,
"recoverable_pct": 0.461
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109519",
"label": "benign",
"label_confidence": 0.476,
"severity": "critical",
"timestamp": "2026-01-07T14:39:00Z",
"trace_id": "6d732e75-88ce-043f-7fc9-22698fdb06c2"
} | {
"account_age_days": 1981,
"account_id": "ACCT-FD57BCF99ED4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.6
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 187,
"timestamp": "2026-01-07T14:39:00Z",
"transaction_amount_usd": 10823.14
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.622,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2166.03,
"financial_exposure_usd": 3613.89,
"recoverable_pct": 0.466
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.