schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104118",
"label": "fraudulent",
"label_confidence": 0.735,
"severity": "medium",
"timestamp": "2026-01-03T20:38:00Z",
"trace_id": "17d4d07f-bd41-c612-9cd4-068ca9f6df7f"
} | {
"account_age_days": 746,
"account_id": "ACCT-B6371BB9911A",
"baseline_risk_score": 0.37,
"kyc_tier": "tier_1",
"session_entropy": 0.925
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 208,
"timestamp": "2026-01-03T20:38:00Z",
"transaction_amount_usd": 1280693.05
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.416,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2045995.42,
"financial_exposure_usd": 2111934.49,
"recoverable_pct": 0.539
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107736",
"label": "benign",
"label_confidence": 0.543,
"severity": "low",
"timestamp": "2026-01-06T08:56:00Z",
"trace_id": "7334d5ba-ec06-8b46-15b8-73ddb834ec62"
} | {
"account_age_days": 587,
"account_id": "ACCT-05B4F03B473C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.384
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 311,
"timestamp": "2026-01-06T04:25:00Z",
"transaction_amount_usd": 15.34
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.644,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1680.45,
"financial_exposure_usd": 2157.54,
"recoverable_pct": 0.679
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108158",
"label": "benign",
"label_confidence": 0.662,
"severity": "low",
"timestamp": "2026-01-06T15:58:00Z",
"trace_id": "83387125-671e-afbe-837a-e23886d3c9ae"
} | {
"account_age_days": 1567,
"account_id": "ACCT-26E185A55596",
"baseline_risk_score": 0.16,
"kyc_tier": "tier_1",
"session_entropy": 0.717
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 663,
"timestamp": "2026-01-06T15:58:00Z",
"transaction_amount_usd": 2620.29
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.64,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3221.13,
"financial_exposure_usd": 5088.16,
"recoverable_pct": 0.837
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107227",
"label": "benign",
"label_confidence": 0.692,
"severity": "medium",
"timestamp": "2026-01-06T00:27:00Z",
"trace_id": "16cc9282-131b-299c-9ad5-f7854b3726b7"
} | {
"account_age_days": 1288,
"account_id": "ACCT-8F45C04FA179",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.677
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 657,
"timestamp": "2026-01-06T00:27:00Z",
"transaction_amount_usd": 11382.64
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.622,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 291.33,
"financial_exposure_usd": 373.54,
"recoverable_pct": 0.55
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100759",
"label": "fraudulent",
"label_confidence": 0.798,
"severity": "high",
"timestamp": "2026-01-01T12:39:00Z",
"trace_id": "c2299827-e0d7-d7ff-771e-a95dab4e5cfe"
} | {
"account_age_days": 1722,
"account_id": "ACCT-E3C43CA8FCA9",
"baseline_risk_score": 0.52,
"kyc_tier": "tier_2",
"session_entropy": 0.871
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 328,
"timestamp": "2026-01-01T10:38:00Z",
"transaction_amount_usd": 6
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_c... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.694,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 692959.3,
"financial_exposure_usd": 840637.75,
"recoverable_pct": 0.543
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100937",
"label": "fraudulent",
"label_confidence": 0.754,
"severity": "medium",
"timestamp": "2026-01-01T15:37:00Z",
"trace_id": "83960ce5-7f53-e535-93ef-c78e4109ede3"
} | {
"account_age_days": 698,
"account_id": "ACCT-6D933D78DE30",
"baseline_risk_score": 0.392,
"kyc_tier": "tier_3",
"session_entropy": 0.272
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 413,
"timestamp": "2026-01-01T15:37:00Z",
"transaction_amount_usd": 89417.46
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.549,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 427139.1,
"financial_exposure_usd": 1057147.94,
"recoverable_pct": 0.273
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108858",
"label": "benign",
"label_confidence": 0.561,
"severity": "high",
"timestamp": "2026-01-07T03:38:00Z",
"trace_id": "b069b6e3-e104-8e77-9c22-4804d7e09f01"
} | {
"account_age_days": 1638,
"account_id": "ACCT-E0191E9A4B45",
"baseline_risk_score": 0.18,
"kyc_tier": "tier_2",
"session_entropy": 0.427
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 143,
"timestamp": "2026-01-06T17:44:00Z",
"transaction_amount_usd": 11.98
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.605,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 909.11,
"financial_exposure_usd": 1245.15,
"recoverable_pct": 0.822
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103829",
"label": "fraudulent",
"label_confidence": 0.674,
"severity": "medium",
"timestamp": "2026-01-03T15:49:00Z",
"trace_id": "f5d817c7-7cb4-c1ac-d630-94e351b29f71"
} | {
"account_age_days": 167,
"account_id": "ACCT-67CFF741016C",
"baseline_risk_score": 0.106,
"kyc_tier": "tier_1",
"session_entropy": 0.77
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 730,
"timestamp": "2026-01-03T15:49:00Z",
"transaction_amount_usd": 380265.13
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.473,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2427206.89,
"financial_exposure_usd": 2804146.92,
"recoverable_pct": 0.806
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106730",
"label": "benign",
"label_confidence": 0.521,
"severity": "medium",
"timestamp": "2026-01-05T16:10:00Z",
"trace_id": "343db98d-0d07-cd81-9709-f3644d7cd75f"
} | {
"account_age_days": 840,
"account_id": "ACCT-1C8071928B36",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.778
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 233,
"timestamp": "2026-01-05T16:10:00Z",
"transaction_amount_usd": 12323.21
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.469,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3980.78,
"financial_exposure_usd": 5291.57,
"recoverable_pct": 0.449
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108892",
"label": "benign",
"label_confidence": 0.595,
"severity": "medium",
"timestamp": "2026-01-07T04:12:00Z",
"trace_id": "22cec27d-1ad9-d12f-92c5-5f47733fd10a"
} | {
"account_age_days": 39,
"account_id": "ACCT-1C80330B0BCC",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.256
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 988,
"timestamp": "2026-01-07T04:12:00Z",
"transaction_amount_usd": 7190.09
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.686,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3984.28,
"financial_exposure_usd": 5267.99,
"recoverable_pct": 0.678
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106202",
"label": "fraudulent",
"label_confidence": 0.931,
"severity": "medium",
"timestamp": "2026-01-05T07:22:00Z",
"trace_id": "3776ddc2-c83f-35a8-94d9-c49072687b98"
} | {
"account_age_days": 1166,
"account_id": "ACCT-7EBB3BE923FB",
"baseline_risk_score": 0.098,
"kyc_tier": "tier_2",
"session_entropy": 0.384
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 1185,
"timestamp": "2026-01-05T07:22:00Z",
"transaction_amount_usd": 1356070.36
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.937,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 5735862.14,
"financial_exposure_usd": 8025332.37,
"recoverable_pct": 0.849
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100772",
"label": "fraudulent",
"label_confidence": 0.846,
"severity": "high",
"timestamp": "2026-01-01T12:52:00Z",
"trace_id": "c6dfaf7d-c872-08ef-eff1-d1302561aee6"
} | {
"account_age_days": 1241,
"account_id": "ACCT-ABBC7C047BF9",
"baseline_risk_score": 0.544,
"kyc_tier": "tier_3",
"session_entropy": 0.413
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 1174,
"timestamp": "2026-01-01T12:52:00Z",
"transaction_amount_usd": 92217.5
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.749,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 730606.84,
"financial_exposure_usd": 807509.75,
"recoverable_pct": 0.523
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109949",
"label": "benign",
"label_confidence": 0.581,
"severity": "medium",
"timestamp": "2026-01-07T21:49:00Z",
"trace_id": "e0c1eff5-715c-8d26-0a1d-e0c9633665f3"
} | {
"account_age_days": 1634,
"account_id": "ACCT-75AB8E807352",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.18
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 177,
"timestamp": "2026-01-07T21:49:00Z",
"transaction_amount_usd": 1237.64
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.516,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1747.72,
"financial_exposure_usd": 2509.08,
"recoverable_pct": 0.855
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102777",
"label": "fraudulent",
"label_confidence": 0.83,
"severity": "medium",
"timestamp": "2026-01-02T22:17:00Z",
"trace_id": "57a2dd1f-a138-6c01-7419-844cf865aeae"
} | {
"account_age_days": 443,
"account_id": "ACCT-EA6BAAD2417E",
"baseline_risk_score": 0.564,
"kyc_tier": "tier_1",
"session_entropy": 0.279
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "HK",
"latency_ms": 708,
"timestamp": "2026-01-02T22:17:00Z",
"transaction_amount_usd": 77208.29
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.909,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 424432.75,
"financial_exposure_usd": 998205.33,
"recoverable_pct": 0.198
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100645",
"label": "fraudulent",
"label_confidence": 0.84,
"severity": "high",
"timestamp": "2026-01-01T10:45:00Z",
"trace_id": "17b3da76-bfa8-0526-5bde-0066064679bc"
} | {
"account_age_days": 1985,
"account_id": "ACCT-6E40FEEB308F",
"baseline_risk_score": 0.607,
"kyc_tier": "tier_2",
"session_entropy": 0.353
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 101,
"timestamp": "2026-01-01T05:24:00Z",
"transaction_amount_usd": 0.08
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.757,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 170694.46,
"financial_exposure_usd": 378964.92,
"recoverable_pct": 0.26
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102536",
"label": "fraudulent",
"label_confidence": 0.821,
"severity": "medium",
"timestamp": "2026-01-02T18:16:00Z",
"trace_id": "832dcac6-1b1e-787a-9502-4e018e6cf33d"
} | {
"account_age_days": 645,
"account_id": "ACCT-33B70589292C",
"baseline_risk_score": 0.426,
"kyc_tier": "tier_2",
"session_entropy": 0.779
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "US",
"latency_ms": 137,
"timestamp": "2026-01-02T18:16:00Z",
"transaction_amount_usd": 106238.69
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.823,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 754934.9,
"financial_exposure_usd": 1004667.19,
"recoverable_pct": 0.537
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106058",
"label": "fraudulent",
"label_confidence": 0.689,
"severity": "high",
"timestamp": "2026-01-05T04:58:00Z",
"trace_id": "9412a88e-ad8b-2efc-5f0e-db71cca6f03b"
} | {
"account_age_days": 1498,
"account_id": "ACCT-947D02AE5C94",
"baseline_risk_score": 0.086,
"kyc_tier": "tier_2",
"session_entropy": 0.575
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 285,
"timestamp": "2026-01-04T20:50:00Z",
"transaction_amount_usd": 4.22
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.635,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4289801.8,
"financial_exposure_usd": 4441081.57,
"recoverable_pct": 0.644
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102849",
"label": "fraudulent",
"label_confidence": 0.855,
"severity": "critical",
"timestamp": "2026-01-02T23:29:00Z",
"trace_id": "aa1511ff-8c50-0c55-e2d1-07dd02b4effe"
} | {
"account_age_days": 85,
"account_id": "ACCT-4AF49D475728",
"baseline_risk_score": 0.626,
"kyc_tier": "tier_2",
"session_entropy": 0.508
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "LU",
"latency_ms": 711,
"timestamp": "2026-01-02T23:29:00Z",
"transaction_amount_usd": 52456.98
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.491,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 228615.49,
"financial_exposure_usd": 516145.79,
"recoverable_pct": 0.161
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103912",
"label": "fraudulent",
"label_confidence": 0.763,
"severity": "high",
"timestamp": "2026-01-03T17:12:00Z",
"trace_id": "d2902d9e-6b2a-169d-4f97-a98300e86156"
} | {
"account_age_days": 1824,
"account_id": "ACCT-616D8A2D03FA",
"baseline_risk_score": 0.24,
"kyc_tier": "tier_2",
"session_entropy": 0.734
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 598,
"timestamp": "2026-01-03T17:12:00Z",
"transaction_amount_usd": 228031.41
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.933,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3730115.19,
"financial_exposure_usd": 4779093.05,
"recoverable_pct": 0.668
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108201",
"label": "benign",
"label_confidence": 0.665,
"severity": "medium",
"timestamp": "2026-01-06T16:41:00Z",
"trace_id": "ed38e244-4c60-4330-1380-ed25ad24dd29"
} | {
"account_age_days": 820,
"account_id": "ACCT-7A2CCF14C042",
"baseline_risk_score": 0.072,
"kyc_tier": "tier_2",
"session_entropy": 0.908
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 816,
"timestamp": "2026-01-06T16:41:00Z",
"transaction_amount_usd": 921.81
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.686,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 164.53,
"financial_exposure_usd": 242.18,
"recoverable_pct": 0.612
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108967",
"label": "benign",
"label_confidence": 0.577,
"severity": "high",
"timestamp": "2026-01-07T05:27:00Z",
"trace_id": "02e94f8d-cef1-2c84-d695-195432551b18"
} | {
"account_age_days": 1261,
"account_id": "ACCT-BC4937FE2783",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.725
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 559,
"timestamp": "2026-01-07T05:27:00Z",
"transaction_amount_usd": 1963.53
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.761,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 647.21,
"financial_exposure_usd": 1419.5,
"recoverable_pct": 0.552
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109316",
"label": "benign",
"label_confidence": 0.524,
"severity": "medium",
"timestamp": "2026-01-07T11:16:00Z",
"trace_id": "2c5f8f42-0145-d82c-4dd6-2eef6fa6dc76"
} | {
"account_age_days": 1464,
"account_id": "ACCT-8B868BA132B3",
"baseline_risk_score": 0.194,
"kyc_tier": "tier_2",
"session_entropy": 0.831
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 114,
"timestamp": "2026-01-07T11:16:00Z",
"transaction_amount_usd": 697.44
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.51,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 3313.56,
"financial_exposure_usd": 8059.85,
"recoverable_pct": 0.658
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102524",
"label": "fraudulent",
"label_confidence": 0.969,
"severity": "medium",
"timestamp": "2026-01-02T18:04:00Z",
"trace_id": "c9abc218-1f09-ea28-49c9-c5f8e4d6a677"
} | {
"account_age_days": 1097,
"account_id": "ACCT-CEAC7310D335",
"baseline_risk_score": 0.328,
"kyc_tier": "tier_3",
"session_entropy": 0.335
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 867,
"timestamp": "2026-01-02T18:04:00Z",
"transaction_amount_usd": 94556.39
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.412,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 603772.74,
"financial_exposure_usd": 649447.1,
"recoverable_pct": 0.781
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104986",
"label": "fraudulent",
"label_confidence": 0.828,
"severity": "medium",
"timestamp": "2026-01-04T11:06:00Z",
"trace_id": "b3bf6600-71fa-f977-fd7b-da803c91a909"
} | {
"account_age_days": 741,
"account_id": "ACCT-85EA2E9E134F",
"baseline_risk_score": 0.202,
"kyc_tier": "tier_3",
"session_entropy": 0.67
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 374,
"timestamp": "2026-01-04T00:04:00Z",
"transaction_amount_usd": 11.28
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.524,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 404078.18,
"financial_exposure_usd": 991434.9,
"recoverable_pct": 0.908
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106384",
"label": "fraudulent",
"label_confidence": 0.807,
"severity": "high",
"timestamp": "2026-01-05T10:24:00Z",
"trace_id": "9d93af1c-c3fa-84f4-a0a4-f96beb51edc8"
} | {
"account_age_days": 478,
"account_id": "ACCT-736969593881",
"baseline_risk_score": 0.315,
"kyc_tier": "tier_1",
"session_entropy": 0.658
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 1142,
"timestamp": "2026-01-05T10:24:00Z",
"transaction_amount_usd": 2903018.39
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.763,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3342433,
"financial_exposure_usd": 5473949.82,
"recoverable_pct": 0.505
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104707",
"label": "fraudulent",
"label_confidence": 0.607,
"severity": "medium",
"timestamp": "2026-01-04T06:27:00Z",
"trace_id": "d60382e1-41f7-85f5-ab17-b23c741872f7"
} | {
"account_age_days": 1966,
"account_id": "ACCT-3140CC6A2748",
"baseline_risk_score": 0.096,
"kyc_tier": "tier_3",
"session_entropy": 0.903
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 295,
"timestamp": "2026-01-03T23:18:00Z",
"transaction_amount_usd": 9.02
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.414,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2179550.96,
"financial_exposure_usd": 3145704.4,
"recoverable_pct": 0.429
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108372",
"label": "benign",
"label_confidence": 0.634,
"severity": "high",
"timestamp": "2026-01-06T19:32:00Z",
"trace_id": "42f41a35-bb26-bd23-587f-65e0726936b1"
} | {
"account_age_days": 734,
"account_id": "ACCT-A5C958E296EB",
"baseline_risk_score": 0.168,
"kyc_tier": "tier_2",
"session_entropy": 0.131
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 268,
"timestamp": "2026-01-06T19:32:00Z",
"transaction_amount_usd": 10627.75
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.583,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2495.13,
"financial_exposure_usd": 4488.08,
"recoverable_pct": 0.753
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109618",
"label": "benign",
"label_confidence": 0.472,
"severity": "medium",
"timestamp": "2026-01-07T16:18:00Z",
"trace_id": "f8aff954-051b-1bb9-0421-5736f8a918d6"
} | {
"account_age_days": 1622,
"account_id": "ACCT-68ECF459A270",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.931
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 821,
"timestamp": "2026-01-07T16:18:00Z",
"transaction_amount_usd": 7714.73
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.575,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1688.19,
"financial_exposure_usd": 3613.37,
"recoverable_pct": 0.908
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100573",
"label": "fraudulent",
"label_confidence": 0.946,
"severity": "medium",
"timestamp": "2026-01-01T09:33:00Z",
"trace_id": "7aebdb28-4dc0-7f30-9dde-83c4f04259d3"
} | {
"account_age_days": 731,
"account_id": "ACCT-9A87A83D8AB4",
"baseline_risk_score": 0.364,
"kyc_tier": "tier_1",
"session_entropy": 0.161
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 1135,
"timestamp": "2026-01-01T09:33:00Z",
"transaction_amount_usd": 78180.26
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.924,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 707253.47,
"financial_exposure_usd": 1003755.85,
"recoverable_pct": 0.765
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102065",
"label": "fraudulent",
"label_confidence": 0.94,
"severity": "medium",
"timestamp": "2026-01-02T10:25:00Z",
"trace_id": "91670511-0c7e-4acf-3e9f-76293976d6f5"
} | {
"account_age_days": 593,
"account_id": "ACCT-8AA7F89641AB",
"baseline_risk_score": 0.439,
"kyc_tier": "tier_3",
"session_entropy": 0.916
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 464,
"timestamp": "2026-01-02T10:25:00Z",
"transaction_amount_usd": 83756.12
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.903,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 209705.41,
"financial_exposure_usd": 415232.81,
"recoverable_pct": 0.555
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106738",
"label": "benign",
"label_confidence": 0.701,
"severity": "high",
"timestamp": "2026-01-05T16:18:00Z",
"trace_id": "b9b26a8a-f43a-77e4-7c22-919f191762a8"
} | {
"account_age_days": 853,
"account_id": "ACCT-9E472A148148",
"baseline_risk_score": 0.184,
"kyc_tier": "tier_2",
"session_entropy": 0.48
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 195,
"timestamp": "2026-01-05T14:52:00Z",
"transaction_amount_usd": 10.61
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.591,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1473.07,
"financial_exposure_usd": 3305.17,
"recoverable_pct": 0.41
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103965",
"label": "fraudulent",
"label_confidence": 0.702,
"severity": "high",
"timestamp": "2026-01-03T18:05:00Z",
"trace_id": "ad65d844-b2d8-762c-824c-e8b241260ef7"
} | {
"account_age_days": 41,
"account_id": "ACCT-1760DD28F8B6",
"baseline_risk_score": 0.166,
"kyc_tier": "tier_1",
"session_entropy": 0.349
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 352,
"timestamp": "2026-01-03T12:19:00Z",
"transaction_amount_usd": 21.77
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.397,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2406564.76,
"financial_exposure_usd": 2438445.11,
"recoverable_pct": 0.513
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101404",
"label": "fraudulent",
"label_confidence": 0.846,
"severity": "medium",
"timestamp": "2026-01-01T23:24:00Z",
"trace_id": "6473131c-b576-4972-cb55-e034c5f3ea9d"
} | {
"account_age_days": 1798,
"account_id": "ACCT-3CF35263CF8D",
"baseline_risk_score": 0.485,
"kyc_tier": "tier_3",
"session_entropy": 0.412
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 477,
"timestamp": "2026-01-01T23:24:00Z",
"transaction_amount_usd": 106103.43
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.451,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 766445.97,
"financial_exposure_usd": 943989.84,
"recoverable_pct": 0.018
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107525",
"label": "benign",
"label_confidence": 0.548,
"severity": "low",
"timestamp": "2026-01-06T05:25:00Z",
"trace_id": "45c43634-699b-b64c-1441-8ccbe340f717"
} | {
"account_age_days": 1370,
"account_id": "ACCT-26C4344EA244",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.208
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 390,
"timestamp": "2026-01-06T02:27:00Z",
"transaction_amount_usd": 13.68
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.524,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1061.93,
"financial_exposure_usd": 1706.49,
"recoverable_pct": 0.555
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108473",
"label": "benign",
"label_confidence": 0.694,
"severity": "high",
"timestamp": "2026-01-06T21:13:00Z",
"trace_id": "cbf9134c-2288-d91e-23d0-d93a867d3b21"
} | {
"account_age_days": 124,
"account_id": "ACCT-9CFD8AE9E09B",
"baseline_risk_score": 0.074,
"kyc_tier": "tier_1",
"session_entropy": 0.811
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 976,
"timestamp": "2026-01-06T21:13:00Z",
"transaction_amount_usd": 10506.06
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.661,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2685.51,
"financial_exposure_usd": 2928.52,
"recoverable_pct": 0.855
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103523",
"label": "fraudulent",
"label_confidence": 0.699,
"severity": "medium",
"timestamp": "2026-01-03T10:43:00Z",
"trace_id": "562e67f8-debc-c081-e99b-75fb16be316e"
} | {
"account_age_days": 1414,
"account_id": "ACCT-F273D087CF0C",
"baseline_risk_score": 0.19,
"kyc_tier": "tier_2",
"session_entropy": 0.132
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 1145,
"timestamp": "2026-01-03T10:43:00Z",
"transaction_amount_usd": 1212586.86
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.732,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1641333.18,
"financial_exposure_usd": 3792658.4,
"recoverable_pct": 0.692
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100437",
"label": "fraudulent",
"label_confidence": 0.849,
"severity": "critical",
"timestamp": "2026-01-01T07:17:00Z",
"trace_id": "6560624f-2ea9-d81a-d1d0-cc642f3157fa"
} | {
"account_age_days": 1323,
"account_id": "ACCT-114B32AA6815",
"baseline_risk_score": 0.504,
"kyc_tier": "tier_2",
"session_entropy": 0.835
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "BR",
"latency_ms": 106,
"timestamp": "2026-01-01T07:17:00Z",
"transaction_amount_usd": 31405.65
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.437,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 584267.32,
"financial_exposure_usd": 1062977.31,
"recoverable_pct": 0.627
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102673",
"label": "fraudulent",
"label_confidence": 0.817,
"severity": "high",
"timestamp": "2026-01-02T20:33:00Z",
"trace_id": "b58f981b-fa77-7757-915c-b1d2f5a83c62"
} | {
"account_age_days": 1784,
"account_id": "ACCT-E7FE425B3A33",
"baseline_risk_score": 0.529,
"kyc_tier": "tier_2",
"session_entropy": 0.439
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 1108,
"timestamp": "2026-01-02T20:33:00Z",
"transaction_amount_usd": 102448.19
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.859,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 337607.56,
"financial_exposure_usd": 712496.56,
"recoverable_pct": 0.128
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104088",
"label": "fraudulent",
"label_confidence": 0.693,
"severity": "medium",
"timestamp": "2026-01-03T20:08:00Z",
"trace_id": "e51bb0e6-9a1c-d71f-802c-ab41835f91a0"
} | {
"account_age_days": 348,
"account_id": "ACCT-09FAA84B4F3C",
"baseline_risk_score": 0.213,
"kyc_tier": "tier_1",
"session_entropy": 0.306
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 215,
"timestamp": "2026-01-03T15:44:00Z",
"transaction_amount_usd": 23.53
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.558,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2142260.61,
"financial_exposure_usd": 3803398.82,
"recoverable_pct": 0.902
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109286",
"label": "benign",
"label_confidence": 0.488,
"severity": "high",
"timestamp": "2026-01-07T10:46:00Z",
"trace_id": "50a43293-63b5-eb86-910a-a478c8de28cc"
} | {
"account_age_days": 488,
"account_id": "ACCT-43A95FAAD962",
"baseline_risk_score": 0.083,
"kyc_tier": "tier_2",
"session_entropy": 0.452
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 568,
"timestamp": "2026-01-07T10:46:00Z",
"transaction_amount_usd": 14119.17
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.756,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1955.27,
"financial_exposure_usd": 2133.7,
"recoverable_pct": 0.921
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102425",
"label": "fraudulent",
"label_confidence": 0.94,
"severity": "medium",
"timestamp": "2026-01-02T16:25:00Z",
"trace_id": "6fcfa1bb-e560-c603-b449-dd839f112c46"
} | {
"account_age_days": 1934,
"account_id": "ACCT-511219443626",
"baseline_risk_score": 0.626,
"kyc_tier": "tier_1",
"session_entropy": 0.582
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 484,
"timestamp": "2026-01-02T16:25:00Z",
"transaction_amount_usd": 74129.06
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.515,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 740681.48,
"financial_exposure_usd": 804710.94,
"recoverable_pct": 0.369
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102484",
"label": "fraudulent",
"label_confidence": 0.878,
"severity": "critical",
"timestamp": "2026-01-02T17:24:00Z",
"trace_id": "d13e7911-30b2-411e-fd16-a505bdc35e12"
} | {
"account_age_days": 1893,
"account_id": "ACCT-62FD6687CE58",
"baseline_risk_score": 0.613,
"kyc_tier": "tier_3",
"session_entropy": 0.471
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "MY",
"latency_ms": 115,
"timestamp": "2026-01-02T17:24:00Z",
"transaction_amount_usd": 48161.22
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.867,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 500355.32,
"financial_exposure_usd": 546853.92,
"recoverable_pct": 0.191
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102409",
"label": "fraudulent",
"label_confidence": 0.976,
"severity": "high",
"timestamp": "2026-01-02T16:09:00Z",
"trace_id": "1dc80010-ebc4-7f00-b2fb-3504d2bcd618"
} | {
"account_age_days": 501,
"account_id": "ACCT-19DBA9BA2F03",
"baseline_risk_score": 0.635,
"kyc_tier": "tier_1",
"session_entropy": 0.904
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 1131,
"timestamp": "2026-01-02T16:09:00Z",
"transaction_amount_usd": 71845.59
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.694,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 993765.66,
"financial_exposure_usd": 1065664.7,
"recoverable_pct": 0.06
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102128",
"label": "fraudulent",
"label_confidence": 0.754,
"severity": "critical",
"timestamp": "2026-01-02T11:28:00Z",
"trace_id": "3bb42c7a-5238-72bf-2cff-3f4f0ab9c1ae"
} | {
"account_age_days": 213,
"account_id": "ACCT-958749D27B2F",
"baseline_risk_score": 0.331,
"kyc_tier": "tier_3",
"session_entropy": 0.101
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 575,
"timestamp": "2026-01-02T11:28:00Z",
"transaction_amount_usd": 39647.22
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.756,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 415357.02,
"financial_exposure_usd": 936868.83,
"recoverable_pct": 0.225
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100457",
"label": "fraudulent",
"label_confidence": 0.941,
"severity": "high",
"timestamp": "2026-01-01T07:37:00Z",
"trace_id": "b8b5658f-9e0f-bcff-9632-ba728426ab76"
} | {
"account_age_days": 1899,
"account_id": "ACCT-62B6C58122AC",
"baseline_risk_score": 0.483,
"kyc_tier": "tier_2",
"session_entropy": 0.644
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 206,
"timestamp": "2026-01-01T02:52:00Z",
"transaction_amount_usd": 2.65
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.743,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 1057827.54,
"financial_exposure_usd": 1228381.78,
"recoverable_pct": 0.706
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103067",
"label": "fraudulent",
"label_confidence": 0.762,
"severity": "high",
"timestamp": "2026-01-03T03:07:00Z",
"trace_id": "633396c9-ba1a-e3cb-beb2-143a6a1f2a69"
} | {
"account_age_days": 794,
"account_id": "ACCT-0C1652DB3A01",
"baseline_risk_score": 0.585,
"kyc_tier": "tier_3",
"session_entropy": 0.249
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 761,
"timestamp": "2026-01-03T03:07:00Z",
"transaction_amount_usd": 15598.8
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.573,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 785468.37,
"financial_exposure_usd": 925015.29,
"recoverable_pct": 0.332
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103018",
"label": "fraudulent",
"label_confidence": 0.86,
"severity": "high",
"timestamp": "2026-01-03T02:18:00Z",
"trace_id": "f614cc65-a723-5177-5a8c-cc82d7673d5c"
} | {
"account_age_days": 192,
"account_id": "ACCT-1C8CF5D82495",
"baseline_risk_score": 0.264,
"kyc_tier": "tier_3",
"session_entropy": 0.504
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "MY",
"latency_ms": 331,
"timestamp": "2026-01-03T02:18:00Z",
"transaction_amount_usd": 47371.01
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.703,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 748039.53,
"financial_exposure_usd": 1034432.05,
"recoverable_pct": 0.706
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108117",
"label": "benign",
"label_confidence": 0.558,
"severity": "high",
"timestamp": "2026-01-06T15:17:00Z",
"trace_id": "59ae3777-476f-2d00-f9f0-8be8c14d055f"
} | {
"account_age_days": 1862,
"account_id": "ACCT-6F5388F2AF35",
"baseline_risk_score": 0.058,
"kyc_tier": "tier_1",
"session_entropy": 0.85
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 223,
"timestamp": "2026-01-06T03:42:00Z",
"transaction_amount_usd": 15.68
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.68,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 1338.32,
"financial_exposure_usd": 2128.58,
"recoverable_pct": 0.532
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100070",
"label": "fraudulent",
"label_confidence": 0.913,
"severity": "medium",
"timestamp": "2026-01-01T01:10:00Z",
"trace_id": "d9719e00-e4ad-5e9b-fedd-22d9226cbc6a"
} | {
"account_age_days": 1602,
"account_id": "ACCT-457083E4653C",
"baseline_risk_score": 0.511,
"kyc_tier": "tier_2",
"session_entropy": 0.855
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 177,
"timestamp": "2026-01-01T01:10:00Z",
"transaction_amount_usd": 86606.96
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.663,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 343096.04,
"financial_exposure_usd": 529147.92,
"recoverable_pct": 0.156
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106057",
"label": "fraudulent",
"label_confidence": 0.8,
"severity": "medium",
"timestamp": "2026-01-05T04:57:00Z",
"trace_id": "6b590870-5264-7f36-d0e3-c3be59001763"
} | {
"account_age_days": 1010,
"account_id": "ACCT-71E102935C35",
"baseline_risk_score": 0.323,
"kyc_tier": "tier_2",
"session_entropy": 0.435
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 138,
"timestamp": "2026-01-04T23:38:00Z",
"transaction_amount_usd": 12.78
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.522,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 6026581.3,
"financial_exposure_usd": 6345038.37,
"recoverable_pct": 0.922
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101307",
"label": "fraudulent",
"label_confidence": 0.837,
"severity": "critical",
"timestamp": "2026-01-01T21:47:00Z",
"trace_id": "2fff86a0-2011-7963-8cb3-4fe02c7a1131"
} | {
"account_age_days": 203,
"account_id": "ACCT-7A412E4311A9",
"baseline_risk_score": 0.374,
"kyc_tier": "tier_3",
"session_entropy": 0.859
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "BR",
"latency_ms": 1069,
"timestamp": "2026-01-01T21:47:00Z",
"transaction_amount_usd": 24476.63
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.395,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 299879.48,
"financial_exposure_usd": 585948.95,
"recoverable_pct": 0.049
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102233",
"label": "fraudulent",
"label_confidence": 0.816,
"severity": "medium",
"timestamp": "2026-01-02T13:13:00Z",
"trace_id": "a47caf78-30cf-7c21-8d16-4b9883e1edc8"
} | {
"account_age_days": 1000,
"account_id": "ACCT-F984620190E7",
"baseline_risk_score": 0.464,
"kyc_tier": "tier_1",
"session_entropy": 0.436
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 194,
"timestamp": "2026-01-02T12:26:00Z",
"transaction_amount_usd": 19.5
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.888,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 148692.49,
"financial_exposure_usd": 342045.1,
"recoverable_pct": 0.565
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102254",
"label": "fraudulent",
"label_confidence": 0.969,
"severity": "high",
"timestamp": "2026-01-02T13:34:00Z",
"trace_id": "98277c07-a330-d911-75d8-58a1f173108c"
} | {
"account_age_days": 1367,
"account_id": "ACCT-11BD3E055EFA",
"baseline_risk_score": 0.613,
"kyc_tier": "tier_2",
"session_entropy": 0.745
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 799,
"timestamp": "2026-01-02T13:34:00Z",
"transaction_amount_usd": 43783.96
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.469,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 511899.03,
"financial_exposure_usd": 840713.94,
"recoverable_pct": 0.394
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107171",
"label": "benign",
"label_confidence": 0.532,
"severity": "low",
"timestamp": "2026-01-05T23:31:00Z",
"trace_id": "fb675f1d-8894-b74e-ceb6-14bbb2d6eff7"
} | {
"account_age_days": 1418,
"account_id": "ACCT-F9B2A10C5FD6",
"baseline_risk_score": 0.073,
"kyc_tier": "tier_2",
"session_entropy": 0.168
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 349,
"timestamp": "2026-01-05T23:31:00Z",
"transaction_amount_usd": 11869.89
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.761,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3225.18,
"financial_exposure_usd": 4853.91,
"recoverable_pct": 0.419
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109926",
"label": "benign",
"label_confidence": 0.695,
"severity": "high",
"timestamp": "2026-01-07T21:26:00Z",
"trace_id": "833fd10a-710e-520d-cdde-9c9f26bf411b"
} | {
"account_age_days": 467,
"account_id": "ACCT-5A2BCCF82E16",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.764
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 671,
"timestamp": "2026-01-07T21:26:00Z",
"transaction_amount_usd": 1257.74
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.543,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 8000.6,
"financial_exposure_usd": 8032.72,
"recoverable_pct": 0.724
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109959",
"label": "benign",
"label_confidence": 0.669,
"severity": "critical",
"timestamp": "2026-01-07T21:59:00Z",
"trace_id": "ec626429-46b5-f407-1637-54747c60bb46"
} | {
"account_age_days": 1266,
"account_id": "ACCT-1ED254DA72E5",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.551
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 184,
"timestamp": "2026-01-07T17:15:00Z",
"transaction_amount_usd": 18.58
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.665,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 926.91,
"financial_exposure_usd": 1188.76,
"recoverable_pct": 0.414
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102188",
"label": "fraudulent",
"label_confidence": 0.953,
"severity": "high",
"timestamp": "2026-01-02T12:28:00Z",
"trace_id": "dacf4f26-1d82-dbae-89e3-c8ba43299dde"
} | {
"account_age_days": 1006,
"account_id": "ACCT-2FF43A407E9B",
"baseline_risk_score": 0.562,
"kyc_tier": "tier_2",
"session_entropy": 0.527
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 1067,
"timestamp": "2026-01-02T12:28:00Z",
"transaction_amount_usd": 38369.93
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.659,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 788862.05,
"financial_exposure_usd": 1188944.36,
"recoverable_pct": 0.809
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103674",
"label": "fraudulent",
"label_confidence": 0.715,
"severity": "medium",
"timestamp": "2026-01-03T13:14:00Z",
"trace_id": "07b0447b-07af-adec-02c7-99f44389007c"
} | {
"account_age_days": 1164,
"account_id": "ACCT-25B40A13888F",
"baseline_risk_score": 0.331,
"kyc_tier": "tier_2",
"session_entropy": 0.823
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 176,
"timestamp": "2026-01-03T02:19:00Z",
"transaction_amount_usd": 7.52
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.787,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1299850.58,
"financial_exposure_usd": 3232506.64,
"recoverable_pct": 0.412
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106465",
"label": "fraudulent",
"label_confidence": 0.914,
"severity": "medium",
"timestamp": "2026-01-05T11:45:00Z",
"trace_id": "21c5be62-5114-a217-f804-6b1aa17803c0"
} | {
"account_age_days": 681,
"account_id": "ACCT-913CA26CD828",
"baseline_risk_score": 0.14,
"kyc_tier": "tier_1",
"session_entropy": 0.554
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 1168,
"timestamp": "2026-01-05T11:45:00Z",
"transaction_amount_usd": 683217.73
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.376,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3880144.68,
"financial_exposure_usd": 5087195.56,
"recoverable_pct": 0.779
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109984",
"label": "benign",
"label_confidence": 0.693,
"severity": "low",
"timestamp": "2026-01-07T22:24:00Z",
"trace_id": "b9866942-2d98-7409-12a5-0749d12f5bbc"
} | {
"account_age_days": 935,
"account_id": "ACCT-84C710068F12",
"baseline_risk_score": 0.162,
"kyc_tier": "tier_1",
"session_entropy": 0.171
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 210,
"timestamp": "2026-01-07T13:38:00Z",
"transaction_amount_usd": 15.49
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.745,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 63.47,
"financial_exposure_usd": 82.32,
"recoverable_pct": 0.823
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105720",
"label": "fraudulent",
"label_confidence": 0.633,
"severity": "high",
"timestamp": "2026-01-04T23:20:00Z",
"trace_id": "dfb38e20-a425-8d05-e195-6eda66f5beae"
} | {
"account_age_days": 572,
"account_id": "ACCT-84BE45903E7A",
"baseline_risk_score": 0.158,
"kyc_tier": "tier_3",
"session_entropy": 0.287
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 351,
"timestamp": "2026-01-04T21:08:00Z",
"transaction_amount_usd": 12.89
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.419,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3576084.16,
"financial_exposure_usd": 5631016.06,
"recoverable_pct": 0.533
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101564",
"label": "fraudulent",
"label_confidence": 0.939,
"severity": "high",
"timestamp": "2026-01-02T02:04:00Z",
"trace_id": "d6138db6-3a3c-60d3-31f0-bf30f35522af"
} | {
"account_age_days": 936,
"account_id": "ACCT-58E188771CB8",
"baseline_risk_score": 0.558,
"kyc_tier": "tier_3",
"session_entropy": 0.137
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 198,
"timestamp": "2026-01-02T02:04:00Z",
"transaction_amount_usd": 92875.62
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.595,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 814068.33,
"financial_exposure_usd": 1043040.53,
"recoverable_pct": 0.394
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108172",
"label": "benign",
"label_confidence": 0.471,
"severity": "low",
"timestamp": "2026-01-06T16:12:00Z",
"trace_id": "e2dba38b-b4be-2eb4-44bf-5dbf14f16ae0"
} | {
"account_age_days": 1523,
"account_id": "ACCT-F1EA095A625D",
"baseline_risk_score": 0.176,
"kyc_tier": "tier_3",
"session_entropy": 0.946
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 781,
"timestamp": "2026-01-06T16:12:00Z",
"transaction_amount_usd": 9085.31
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.651,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 4630.5,
"financial_exposure_usd": 5153.4,
"recoverable_pct": 0.942
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102932",
"label": "fraudulent",
"label_confidence": 0.902,
"severity": "high",
"timestamp": "2026-01-03T00:52:00Z",
"trace_id": "507f2356-1a36-18a1-e99a-812d1144c6f4"
} | {
"account_age_days": 1091,
"account_id": "ACCT-E6427E40483B",
"baseline_risk_score": 0.476,
"kyc_tier": "tier_2",
"session_entropy": 0.369
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 1104,
"timestamp": "2026-01-03T00:52:00Z",
"transaction_amount_usd": 75580.95
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.538,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 131591.33,
"financial_exposure_usd": 292388.21,
"recoverable_pct": 0.765
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100713",
"label": "fraudulent",
"label_confidence": 0.886,
"severity": "critical",
"timestamp": "2026-01-01T11:53:00Z",
"trace_id": "3af72cc3-c747-a6f2-57bf-356510a678ba"
} | {
"account_age_days": 837,
"account_id": "ACCT-3AF0BE82F1FC",
"baseline_risk_score": 0.421,
"kyc_tier": "tier_1",
"session_entropy": 0.791
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 969,
"timestamp": "2026-01-01T11:53:00Z",
"transaction_amount_usd": 13013.75
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.753,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 572860.92,
"financial_exposure_usd": 659003.36,
"recoverable_pct": 0.708
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100725",
"label": "fraudulent",
"label_confidence": 0.822,
"severity": "critical",
"timestamp": "2026-01-01T12:05:00Z",
"trace_id": "a9376658-aca0-e259-bf29-d84c4f8b00fb"
} | {
"account_age_days": 1144,
"account_id": "ACCT-2E4478EADB84",
"baseline_risk_score": 0.388,
"kyc_tier": "tier_1",
"session_entropy": 0.906
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 885,
"timestamp": "2026-01-01T12:05:00Z",
"transaction_amount_usd": 65692.07
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.55,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 161264.97,
"financial_exposure_usd": 354235.94,
"recoverable_pct": 0.513
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107720",
"label": "benign",
"label_confidence": 0.746,
"severity": "medium",
"timestamp": "2026-01-06T08:40:00Z",
"trace_id": "d42c808e-bf09-70bc-5aee-27af222181ab"
} | {
"account_age_days": 1526,
"account_id": "ACCT-E000DF52C270",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.271
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 1091,
"timestamp": "2026-01-06T08:40:00Z",
"transaction_amount_usd": 1271.64
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.5,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tra... | {
"customer_funds_at_risk_usd": 848.26,
"financial_exposure_usd": 1700.93,
"recoverable_pct": 0.578
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105414",
"label": "fraudulent",
"label_confidence": 0.924,
"severity": "critical",
"timestamp": "2026-01-04T18:14:00Z",
"trace_id": "9fc75ab9-0db8-77b4-e29c-87e8876129ef"
} | {
"account_age_days": 1046,
"account_id": "ACCT-DCCC545DC109",
"baseline_risk_score": 0.11,
"kyc_tier": "tier_2",
"session_entropy": 0.578
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 224,
"timestamp": "2026-01-04T18:14:00Z",
"transaction_amount_usd": 1952850.46
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.534,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4090502.63,
"financial_exposure_usd": 5244749.76,
"recoverable_pct": 0.763
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101531",
"label": "fraudulent",
"label_confidence": 0.921,
"severity": "medium",
"timestamp": "2026-01-02T01:31:00Z",
"trace_id": "19700db9-f0e7-a28d-915d-5b79ac2144c3"
} | {
"account_age_days": 939,
"account_id": "ACCT-05437BDBEE3D",
"baseline_risk_score": 0.475,
"kyc_tier": "tier_2",
"session_entropy": 0.462
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 300,
"timestamp": "2026-01-02T01:31:00Z",
"transaction_amount_usd": 10252.45
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.392,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 226782.32,
"financial_exposure_usd": 410244.68,
"recoverable_pct": 0.776
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109093",
"label": "benign",
"label_confidence": 0.492,
"severity": "low",
"timestamp": "2026-01-07T07:33:00Z",
"trace_id": "2551b3ef-b754-c166-7ea1-f8a8adc46c5b"
} | {
"account_age_days": 310,
"account_id": "ACCT-BC7ECEE9589D",
"baseline_risk_score": 0.134,
"kyc_tier": "tier_1",
"session_entropy": 0.652
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 1023,
"timestamp": "2026-01-07T07:33:00Z",
"transaction_amount_usd": 2028.41
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.513,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 5664.76,
"financial_exposure_usd": 6033.69,
"recoverable_pct": 0.493
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107704",
"label": "benign",
"label_confidence": 0.693,
"severity": "high",
"timestamp": "2026-01-06T08:24:00Z",
"trace_id": "9f0c7dc8-fa11-834d-5da3-89e7b2d9d65c"
} | {
"account_age_days": 502,
"account_id": "ACCT-3FB62F151033",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.162
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 1176,
"timestamp": "2026-01-06T08:24:00Z",
"transaction_amount_usd": 3580.14
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.517,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1668.78,
"financial_exposure_usd": 2539.93,
"recoverable_pct": 0.676
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105475",
"label": "fraudulent",
"label_confidence": 0.925,
"severity": "medium",
"timestamp": "2026-01-04T19:15:00Z",
"trace_id": "7d37016e-b2ea-5ec4-b375-71a9f327594d"
} | {
"account_age_days": 1772,
"account_id": "ACCT-C98A68BE15D8",
"baseline_risk_score": 0.232,
"kyc_tier": "tier_2",
"session_entropy": 0.875
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 242,
"timestamp": "2026-01-04T09:12:00Z",
"transaction_amount_usd": 16.52
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.891,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1781665.99,
"financial_exposure_usd": 4374141.17,
"recoverable_pct": 0.949
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102098",
"label": "fraudulent",
"label_confidence": 0.917,
"severity": "low",
"timestamp": "2026-01-02T10:58:00Z",
"trace_id": "87c30868-69f2-45c1-be9f-8afd06499b5c"
} | {
"account_age_days": 167,
"account_id": "ACCT-73C308F0BB87",
"baseline_risk_score": 0.266,
"kyc_tier": "tier_1",
"session_entropy": 0.146
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 355,
"timestamp": "2026-01-02T04:32:00Z",
"transaction_amount_usd": 12.64
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.935,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 566762.1,
"financial_exposure_usd": 1126940.45,
"recoverable_pct": 0.455
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109595",
"label": "benign",
"label_confidence": 0.64,
"severity": "medium",
"timestamp": "2026-01-07T15:55:00Z",
"trace_id": "2eff01a6-e5d4-a9c1-2f51-ac83f0dc4d47"
} | {
"account_age_days": 205,
"account_id": "ACCT-3710A0537859",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.447
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 380,
"timestamp": "2026-01-07T15:55:00Z",
"transaction_amount_usd": 12827.98
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.64,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 1853.63,
"financial_exposure_usd": 1916.77,
"recoverable_pct": 0.933
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109656",
"label": "benign",
"label_confidence": 0.559,
"severity": "medium",
"timestamp": "2026-01-07T16:56:00Z",
"trace_id": "866f8c7e-b39b-7e9f-8803-f2622d3ea6f0"
} | {
"account_age_days": 924,
"account_id": "ACCT-FDBA7147C597",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.396
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 387,
"timestamp": "2026-01-07T16:56:00Z",
"transaction_amount_usd": 2523.7
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.595,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 4710.02,
"financial_exposure_usd": 5555.78,
"recoverable_pct": 0.983
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103666",
"label": "fraudulent",
"label_confidence": 0.945,
"severity": "high",
"timestamp": "2026-01-03T13:06:00Z",
"trace_id": "c3e51c93-6ff1-936d-845f-152c341ed41e"
} | {
"account_age_days": 916,
"account_id": "ACCT-621461A675E1",
"baseline_risk_score": 0.067,
"kyc_tier": "tier_1",
"session_entropy": 0.902
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 1080,
"timestamp": "2026-01-03T13:06:00Z",
"transaction_amount_usd": 1998073.06
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.548,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1896900.59,
"financial_exposure_usd": 4575312.84,
"recoverable_pct": 0.82
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103316",
"label": "fraudulent",
"label_confidence": 0.818,
"severity": "medium",
"timestamp": "2026-01-03T07:16:00Z",
"trace_id": "3e799f60-b877-91ae-113a-4d3cfa815164"
} | {
"account_age_days": 1890,
"account_id": "ACCT-2C1C84E35BAF",
"baseline_risk_score": 0.402,
"kyc_tier": "tier_3",
"session_entropy": 0.47
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "US",
"latency_ms": 961,
"timestamp": "2026-01-03T07:16:00Z",
"transaction_amount_usd": 3860.03
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.648,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 489251.97,
"financial_exposure_usd": 932930.3,
"recoverable_pct": 0.665
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102270",
"label": "fraudulent",
"label_confidence": 0.962,
"severity": "low",
"timestamp": "2026-01-02T13:50:00Z",
"trace_id": "c717cc6d-42a7-c9dd-4927-1a84229e5f33"
} | {
"account_age_days": 276,
"account_id": "ACCT-B5AE7DD7DBD1",
"baseline_risk_score": 0.579,
"kyc_tier": "tier_1",
"session_entropy": 0.321
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 256,
"timestamp": "2026-01-02T01:32:00Z",
"transaction_amount_usd": 1.2
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.912,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 279632.86,
"financial_exposure_usd": 374455.5,
"recoverable_pct": 0.501
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102451",
"label": "fraudulent",
"label_confidence": 0.976,
"severity": "high",
"timestamp": "2026-01-02T16:51:00Z",
"trace_id": "0758702e-0108-b206-a88e-67da4376a86c"
} | {
"account_age_days": 1730,
"account_id": "ACCT-C8ACCE61155F",
"baseline_risk_score": 0.533,
"kyc_tier": "tier_2",
"session_entropy": 0.632
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 737,
"timestamp": "2026-01-02T16:51:00Z",
"transaction_amount_usd": 87393.83
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.834,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 708599.29,
"financial_exposure_usd": 884376.96,
"recoverable_pct": 0.247
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108084",
"label": "benign",
"label_confidence": 0.73,
"severity": "low",
"timestamp": "2026-01-06T14:44:00Z",
"trace_id": "db33e115-d8d8-d2aa-82b0-1ed3b5d8c7d0"
} | {
"account_age_days": 971,
"account_id": "ACCT-A02A28A09429",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.191
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 272,
"timestamp": "2026-01-06T12:43:00Z",
"transaction_amount_usd": 8.34
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.462,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 919.09,
"financial_exposure_usd": 1182.74,
"recoverable_pct": 0.98
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102518",
"label": "fraudulent",
"label_confidence": 0.864,
"severity": "critical",
"timestamp": "2026-01-02T17:58:00Z",
"trace_id": "9eaf72bc-4cff-d71c-4b20-fa8504316ea5"
} | {
"account_age_days": 274,
"account_id": "ACCT-74C8DBEB6501",
"baseline_risk_score": 0.341,
"kyc_tier": "tier_2",
"session_entropy": 0.618
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 1035,
"timestamp": "2026-01-02T17:58:00Z",
"transaction_amount_usd": 16019.99
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.922,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 427581.58,
"financial_exposure_usd": 1019958.92,
"recoverable_pct": 0.744
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100344",
"label": "fraudulent",
"label_confidence": 0.807,
"severity": "critical",
"timestamp": "2026-01-01T05:44:00Z",
"trace_id": "976865b1-087d-f61d-21e4-a7e77856fcb3"
} | {
"account_age_days": 337,
"account_id": "ACCT-41F3E01C7DA1",
"baseline_risk_score": 0.253,
"kyc_tier": "tier_2",
"session_entropy": 0.202
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 357,
"timestamp": "2026-01-01T05:44:00Z",
"transaction_amount_usd": 77509.07
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.929,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 333907,
"financial_exposure_usd": 484416.64,
"recoverable_pct": 0.526
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108952",
"label": "benign",
"label_confidence": 0.593,
"severity": "low",
"timestamp": "2026-01-07T05:12:00Z",
"trace_id": "9101e63e-1d2b-2a4e-5f35-5fab3a876f17"
} | {
"account_age_days": 455,
"account_id": "ACCT-765D42E702D9",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.3
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 1023,
"timestamp": "2026-01-07T05:12:00Z",
"transaction_amount_usd": 6988.39
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.728,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1465.01,
"financial_exposure_usd": 2146.97,
"recoverable_pct": 0.961
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106831",
"label": "benign",
"label_confidence": 0.547,
"severity": "low",
"timestamp": "2026-01-05T17:51:00Z",
"trace_id": "ce947940-5a86-8d04-2180-02b542a95cc5"
} | {
"account_age_days": 330,
"account_id": "ACCT-7337432A9C8A",
"baseline_risk_score": 0.088,
"kyc_tier": "tier_1",
"session_entropy": 0.436
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 1026,
"timestamp": "2026-01-05T17:51:00Z",
"transaction_amount_usd": 7701.37
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.566,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2253.55,
"financial_exposure_usd": 3742.83,
"recoverable_pct": 0.412
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105267",
"label": "fraudulent",
"label_confidence": 0.666,
"severity": "medium",
"timestamp": "2026-01-04T15:47:00Z",
"trace_id": "13bb58bf-30b8-9932-5f14-131221d217ab"
} | {
"account_age_days": 192,
"account_id": "ACCT-1F896E69E1C2",
"baseline_risk_score": 0.257,
"kyc_tier": "tier_2",
"session_entropy": 0.155
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 1019,
"timestamp": "2026-01-04T15:47:00Z",
"transaction_amount_usd": 657072.71
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.569,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4096382.21,
"financial_exposure_usd": 5681300.93,
"recoverable_pct": 0.426
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102407",
"label": "fraudulent",
"label_confidence": 0.939,
"severity": "critical",
"timestamp": "2026-01-02T16:07:00Z",
"trace_id": "96c588df-92a2-1640-a9dc-6c590b1bb371"
} | {
"account_age_days": 389,
"account_id": "ACCT-C5A9D1C38D77",
"baseline_risk_score": 0.466,
"kyc_tier": "tier_1",
"session_entropy": 0.915
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 223,
"timestamp": "2026-01-02T12:54:00Z",
"transaction_amount_usd": 23.66
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.447,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 817984.58,
"financial_exposure_usd": 947300.46,
"recoverable_pct": 0.784
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106441",
"label": "fraudulent",
"label_confidence": 0.877,
"severity": "critical",
"timestamp": "2026-01-05T11:21:00Z",
"trace_id": "22a1b78a-8b1f-f5b1-2d2e-0884da2e6100"
} | {
"account_age_days": 1543,
"account_id": "ACCT-81B7FEB16E05",
"baseline_risk_score": 0.16,
"kyc_tier": "tier_3",
"session_entropy": 0.594
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 252,
"timestamp": "2026-01-05T05:58:00Z",
"transaction_amount_usd": 14.11
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.403,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4293295.89,
"financial_exposure_usd": 5196544.1,
"recoverable_pct": 0.948
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100568",
"label": "fraudulent",
"label_confidence": 0.814,
"severity": "critical",
"timestamp": "2026-01-01T09:28:00Z",
"trace_id": "4e42fce0-4c05-2884-d32c-9257bf10cb99"
} | {
"account_age_days": 614,
"account_id": "ACCT-A824C9BF64C1",
"baseline_risk_score": 0.53,
"kyc_tier": "tier_2",
"session_entropy": 0.95
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 581,
"timestamp": "2026-01-01T09:28:00Z",
"transaction_amount_usd": 19283.79
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.81,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 297508.21,
"financial_exposure_usd": 547943.75,
"recoverable_pct": 0.497
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107764",
"label": "benign",
"label_confidence": 0.538,
"severity": "low",
"timestamp": "2026-01-06T09:24:00Z",
"trace_id": "e88ee301-8b08-9906-065b-9b66c38d4d9a"
} | {
"account_age_days": 1473,
"account_id": "ACCT-556509B42263",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.504
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 839,
"timestamp": "2026-01-06T09:24:00Z",
"transaction_amount_usd": 10275.4
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.77,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 2271.18,
"financial_exposure_usd": 2470.42,
"recoverable_pct": 0.482
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109430",
"label": "benign",
"label_confidence": 0.709,
"severity": "critical",
"timestamp": "2026-01-07T13:10:00Z",
"trace_id": "342fe63b-d3f7-f2d5-ed08-1020ac5b3a93"
} | {
"account_age_days": 297,
"account_id": "ACCT-2A1CD63D5605",
"baseline_risk_score": 0.086,
"kyc_tier": "tier_3",
"session_entropy": 0.284
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 750,
"timestamp": "2026-01-07T13:10:00Z",
"transaction_amount_usd": 788.1
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.465,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1625.38,
"financial_exposure_usd": 1996.38,
"recoverable_pct": 0.764
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109653",
"label": "benign",
"label_confidence": 0.629,
"severity": "medium",
"timestamp": "2026-01-07T16:53:00Z",
"trace_id": "81d826bb-7d06-28cb-b0eb-5fbf6d6f7b98"
} | {
"account_age_days": 790,
"account_id": "ACCT-1E539C35E9E9",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.131
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 268,
"timestamp": "2026-01-07T14:46:00Z",
"transaction_amount_usd": 1.49
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.747,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1407.81,
"financial_exposure_usd": 2234.86,
"recoverable_pct": 0.873
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101664",
"label": "fraudulent",
"label_confidence": 0.843,
"severity": "medium",
"timestamp": "2026-01-02T03:44:00Z",
"trace_id": "41e4b772-2d72-c1ed-bdbd-2fe3a2b655e3"
} | {
"account_age_days": 837,
"account_id": "ACCT-CF4863F2589D",
"baseline_risk_score": 0.257,
"kyc_tier": "tier_2",
"session_entropy": 0.433
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 83,
"timestamp": "2026-01-01T15:51:00Z",
"transaction_amount_usd": 0.71
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.68,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 405259.05,
"financial_exposure_usd": 500175.89,
"recoverable_pct": 0.484
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107373",
"label": "benign",
"label_confidence": 0.616,
"severity": "low",
"timestamp": "2026-01-06T02:53:00Z",
"trace_id": "011dd30c-39a2-9a20-cc13-1fa790853105"
} | {
"account_age_days": 1332,
"account_id": "ACCT-65BF7D650FED",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.927
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 369,
"timestamp": "2026-01-06T00:23:00Z",
"transaction_amount_usd": 20.97
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.694,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3529.49,
"financial_exposure_usd": 4331.83,
"recoverable_pct": 0.619
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107292",
"label": "benign",
"label_confidence": 0.501,
"severity": "high",
"timestamp": "2026-01-06T01:32:00Z",
"trace_id": "3885fff4-b28b-a93f-9695-e214b6eff468"
} | {
"account_age_days": 1275,
"account_id": "ACCT-D715F0AE99C8",
"baseline_risk_score": 0.196,
"kyc_tier": "tier_1",
"session_entropy": 0.773
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 509,
"timestamp": "2026-01-06T01:32:00Z",
"transaction_amount_usd": 4268.78
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.73,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 881.42,
"financial_exposure_usd": 1096.92,
"recoverable_pct": 0.642
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101856",
"label": "fraudulent",
"label_confidence": 0.83,
"severity": "critical",
"timestamp": "2026-01-02T06:56:00Z",
"trace_id": "45e6b44c-b471-560a-ce58-75f675a4777c"
} | {
"account_age_days": 384,
"account_id": "ACCT-1E6F88F08B56",
"baseline_risk_score": 0.57,
"kyc_tier": "tier_2",
"session_entropy": 0.279
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 116,
"timestamp": "2026-01-02T06:56:00Z",
"transaction_amount_usd": 109608.32
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.69,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 602780.73,
"financial_exposure_usd": 830831.53,
"recoverable_pct": 0.824
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101706",
"label": "fraudulent",
"label_confidence": 0.919,
"severity": "low",
"timestamp": "2026-01-02T04:26:00Z",
"trace_id": "745c5434-5404-a6f3-fe78-9fee8c730c0b"
} | {
"account_age_days": 1704,
"account_id": "ACCT-649B1812FD27",
"baseline_risk_score": 0.488,
"kyc_tier": "tier_2",
"session_entropy": 0.144
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "DE",
"latency_ms": 684,
"timestamp": "2026-01-02T04:26:00Z",
"transaction_amount_usd": 58762.53
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.86,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 574728.72,
"financial_exposure_usd": 646364.02,
"recoverable_pct": 0.382
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106673",
"label": "benign",
"label_confidence": 0.719,
"severity": "medium",
"timestamp": "2026-01-05T15:13:00Z",
"trace_id": "d34f45e1-e6e3-5d55-657d-e3266d7a9011"
} | {
"account_age_days": 687,
"account_id": "ACCT-ABCA3BE919BA",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.377
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 727,
"timestamp": "2026-01-05T15:13:00Z",
"transaction_amount_usd": 8338.66
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.747,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 251.42,
"financial_exposure_usd": 558.21,
"recoverable_pct": 0.506
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102264",
"label": "fraudulent",
"label_confidence": 0.939,
"severity": "medium",
"timestamp": "2026-01-02T13:44:00Z",
"trace_id": "7d13b658-cd6f-ca41-7ded-1b218de9e7bf"
} | {
"account_age_days": 1346,
"account_id": "ACCT-EA19C38713DF",
"baseline_risk_score": 0.643,
"kyc_tier": "tier_3",
"session_entropy": 0.201
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 522,
"timestamp": "2026-01-02T13:44:00Z",
"transaction_amount_usd": 88736.28
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.555,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 548955.11,
"financial_exposure_usd": 897889.87,
"recoverable_pct": 0.566
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105907",
"label": "fraudulent",
"label_confidence": 0.763,
"severity": "medium",
"timestamp": "2026-01-05T02:27:00Z",
"trace_id": "0107b6e4-1770-cb45-0e1c-d23595c1efbe"
} | {
"account_age_days": 287,
"account_id": "ACCT-09A175944D02",
"baseline_risk_score": 0.234,
"kyc_tier": "tier_2",
"session_entropy": 0.618
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 408,
"timestamp": "2026-01-05T02:27:00Z",
"transaction_amount_usd": 2948700.31
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.811,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4237829.55,
"financial_exposure_usd": 6193787.78,
"recoverable_pct": 0.69
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106897",
"label": "benign",
"label_confidence": 0.549,
"severity": "high",
"timestamp": "2026-01-05T18:57:00Z",
"trace_id": "468d7b11-53a5-64ba-23fa-abf75ee7b22a"
} | {
"account_age_days": 1066,
"account_id": "ACCT-B579822CCA4D",
"baseline_risk_score": 0.097,
"kyc_tier": "tier_1",
"session_entropy": 0.535
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 115,
"timestamp": "2026-01-05T18:57:00Z",
"transaction_amount_usd": 10753.97
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.498,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1957.03,
"financial_exposure_usd": 2955.67,
"recoverable_pct": 0.743
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.