schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108778",
"label": "benign",
"label_confidence": 0.59,
"severity": "medium",
"timestamp": "2026-01-07T02:18:00Z",
"trace_id": "091a298f-7eec-0d86-205c-6be953958f11"
} | {
"account_age_days": 514,
"account_id": "ACCT-C53D16FC8A34",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.467
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 137,
"timestamp": "2026-01-06T19:55:00Z",
"transaction_amount_usd": 18.46
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.79,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 5542.06,
"financial_exposure_usd": 5734.41,
"recoverable_pct": 0.899
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109496",
"label": "benign",
"label_confidence": 0.728,
"severity": "low",
"timestamp": "2026-01-07T14:16:00Z",
"trace_id": "2a840dbc-0032-0cc6-61b0-70b9ee502044"
} | {
"account_age_days": 757,
"account_id": "ACCT-A568357CA7BC",
"baseline_risk_score": 0.106,
"kyc_tier": "tier_1",
"session_entropy": 0.468
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 124,
"timestamp": "2026-01-07T13:51:00Z",
"transaction_amount_usd": 11.43
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.627,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 768.89,
"financial_exposure_usd": 1031.47,
"recoverable_pct": 0.618
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105271",
"label": "fraudulent",
"label_confidence": 0.675,
"severity": "high",
"timestamp": "2026-01-04T15:51:00Z",
"trace_id": "abb3e235-d9a5-4c63-9281-a15bf0f256d5"
} | {
"account_age_days": 626,
"account_id": "ACCT-0949DD88FB06",
"baseline_risk_score": 0.38,
"kyc_tier": "tier_1",
"session_entropy": 0.416
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 82,
"timestamp": "2026-01-04T10:03:00Z",
"transaction_amount_usd": 12.09
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.508,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 9",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 6438492.6,
"financial_exposure_usd": 7075194.76,
"recoverable_pct": 0.97
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108450",
"label": "benign",
"label_confidence": 0.475,
"severity": "low",
"timestamp": "2026-01-06T20:50:00Z",
"trace_id": "59a70151-57ca-8079-b091-7725bdd081d5"
} | {
"account_age_days": 175,
"account_id": "ACCT-436036C924EC",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.523
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 797,
"timestamp": "2026-01-06T20:50:00Z",
"transaction_amount_usd": 10319.6
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.539,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2683.47,
"financial_exposure_usd": 2943.34,
"recoverable_pct": 0.781
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100706",
"label": "fraudulent",
"label_confidence": 0.792,
"severity": "medium",
"timestamp": "2026-01-01T11:46:00Z",
"trace_id": "faeefe01-e70f-56b0-cb72-06308ffa0683"
} | {
"account_age_days": 1416,
"account_id": "ACCT-0FAEA29A04A5",
"baseline_risk_score": 0.318,
"kyc_tier": "tier_1",
"session_entropy": 0.439
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 269,
"timestamp": "2025-12-31T23:39:00Z",
"transaction_amount_usd": 10.05
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.413,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 1554594.43,
"financial_exposure_usd": 1735097.31,
"recoverable_pct": 0.725
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102298",
"label": "fraudulent",
"label_confidence": 0.966,
"severity": "medium",
"timestamp": "2026-01-02T14:18:00Z",
"trace_id": "6f8f9d51-2f61-bfca-0ff9-c57b07f9121f"
} | {
"account_age_days": 967,
"account_id": "ACCT-9442075A306C",
"baseline_risk_score": 0.253,
"kyc_tier": "tier_2",
"session_entropy": 0.19
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 144,
"timestamp": "2026-01-02T14:18:00Z",
"transaction_amount_usd": 41213.91
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.559,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 197009.81,
"financial_exposure_usd": 198360.3,
"recoverable_pct": 0.157
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106008",
"label": "fraudulent",
"label_confidence": 0.665,
"severity": "critical",
"timestamp": "2026-01-05T04:08:00Z",
"trace_id": "733c558e-b040-daf3-f6b7-e56a62d031f0"
} | {
"account_age_days": 1206,
"account_id": "ACCT-6F00EE4B2475",
"baseline_risk_score": 0.244,
"kyc_tier": "tier_2",
"session_entropy": 0.67
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 148,
"timestamp": "2026-01-05T00:54:00Z",
"transaction_amount_usd": 24.26
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.892,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5028577.17,
"financial_exposure_usd": 8684726.15,
"recoverable_pct": 0.533
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107678",
"label": "benign",
"label_confidence": 0.552,
"severity": "medium",
"timestamp": "2026-01-06T07:58:00Z",
"trace_id": "9f62f269-59ce-d802-8d9e-f062c0f1efc3"
} | {
"account_age_days": 1424,
"account_id": "ACCT-51E92A20E437",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.104
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 272,
"timestamp": "2026-01-06T04:43:00Z",
"transaction_amount_usd": 6.09
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.556,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 293.99,
"financial_exposure_usd": 513.67,
"recoverable_pct": 0.881
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101302",
"label": "fraudulent",
"label_confidence": 0.967,
"severity": "medium",
"timestamp": "2026-01-01T21:42:00Z",
"trace_id": "cedb2f98-90d2-9bfa-2a93-f811f21e0d5f"
} | {
"account_age_days": 2000,
"account_id": "ACCT-481E914D4969",
"baseline_risk_score": 0.277,
"kyc_tier": "tier_2",
"session_entropy": 0.397
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "FR",
"latency_ms": 1118,
"timestamp": "2026-01-01T21:42:00Z",
"transaction_amount_usd": 36212.54
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.545,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 502157.54,
"financial_exposure_usd": 581684.94,
"recoverable_pct": 0.166
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104031",
"label": "fraudulent",
"label_confidence": 0.727,
"severity": "high",
"timestamp": "2026-01-03T19:11:00Z",
"trace_id": "8045864a-baec-8618-160f-d7e684a4b88c"
} | {
"account_age_days": 1242,
"account_id": "ACCT-E8751DD92317",
"baseline_risk_score": 0.2,
"kyc_tier": "tier_1",
"session_entropy": 0.86
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 325,
"timestamp": "2026-01-03T19:11:00Z",
"transaction_amount_usd": 2880559.19
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.577,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2023597.07,
"financial_exposure_usd": 4311225.96,
"recoverable_pct": 0.767
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101425",
"label": "fraudulent",
"label_confidence": 0.849,
"severity": "high",
"timestamp": "2026-01-01T23:45:00Z",
"trace_id": "8739620f-10b8-e0b4-e6b9-197f48fd16e1"
} | {
"account_age_days": 1545,
"account_id": "ACCT-22AD4E788F81",
"baseline_risk_score": 0.431,
"kyc_tier": "tier_3",
"session_entropy": 0.725
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 323,
"timestamp": "2026-01-01T21:25:00Z",
"transaction_amount_usd": 19.38
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.943,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 456464,
"financial_exposure_usd": 812962.88,
"recoverable_pct": 0.531
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103713",
"label": "fraudulent",
"label_confidence": 0.893,
"severity": "high",
"timestamp": "2026-01-03T13:53:00Z",
"trace_id": "a8de2ad7-7cc4-2299-a920-b52f298cd455"
} | {
"account_age_days": 622,
"account_id": "ACCT-035DD560EC60",
"baseline_risk_score": 0.334,
"kyc_tier": "tier_3",
"session_entropy": 0.9
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 278,
"timestamp": "2026-01-03T09:16:00Z",
"transaction_amount_usd": 17.52
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.748,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 5909148.72,
"financial_exposure_usd": 6268003.2,
"recoverable_pct": 0.483
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104165",
"label": "fraudulent",
"label_confidence": 0.654,
"severity": "medium",
"timestamp": "2026-01-03T21:25:00Z",
"trace_id": "dcf1d7bf-6ddd-3915-98d7-e1c4e841a5b1"
} | {
"account_age_days": 1613,
"account_id": "ACCT-65F7AB857420",
"baseline_risk_score": 0.244,
"kyc_tier": "tier_2",
"session_entropy": 0.367
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 293,
"timestamp": "2026-01-03T09:36:00Z",
"transaction_amount_usd": 18.58
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.603,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 5368090.99,
"financial_exposure_usd": 5610398.49,
"recoverable_pct": 0.976
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102789",
"label": "fraudulent",
"label_confidence": 0.865,
"severity": "medium",
"timestamp": "2026-01-02T22:29:00Z",
"trace_id": "9434049e-459c-41a7-f8f2-b1b96cdc82ac"
} | {
"account_age_days": 816,
"account_id": "ACCT-174F5A375337",
"baseline_risk_score": 0.628,
"kyc_tier": "tier_1",
"session_entropy": 0.296
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 302,
"timestamp": "2026-01-02T19:46:00Z",
"transaction_amount_usd": 1.51
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.682,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 404716.81,
"financial_exposure_usd": 636713.91,
"recoverable_pct": 0.607
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104077",
"label": "fraudulent",
"label_confidence": 0.814,
"severity": "high",
"timestamp": "2026-01-03T19:57:00Z",
"trace_id": "26448627-7853-b3bc-d451-d4c978d0abe1"
} | {
"account_age_days": 1763,
"account_id": "ACCT-29BF72584E43",
"baseline_risk_score": 0.316,
"kyc_tier": "tier_1",
"session_entropy": 0.772
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 579,
"timestamp": "2026-01-03T19:57:00Z",
"transaction_amount_usd": 1230038.68
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.44,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 2336011.36,
"financial_exposure_usd": 3450992.09,
"recoverable_pct": 0.482
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108510",
"label": "benign",
"label_confidence": 0.633,
"severity": "high",
"timestamp": "2026-01-06T21:50:00Z",
"trace_id": "4dfaff5b-4950-1893-6451-a47a11e6daea"
} | {
"account_age_days": 1841,
"account_id": "ACCT-A46B8E4DA063",
"baseline_risk_score": 0.097,
"kyc_tier": "tier_2",
"session_entropy": 0.363
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 156,
"timestamp": "2026-01-06T11:27:00Z",
"transaction_amount_usd": 16.23
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.451,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1285.65,
"financial_exposure_usd": 1859.99,
"recoverable_pct": 0.466
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106536",
"label": "fraudulent",
"label_confidence": 0.9,
"severity": "low",
"timestamp": "2026-01-05T12:56:00Z",
"trace_id": "83572ecd-1073-b8e9-0ba6-969dbebf2848"
} | {
"account_age_days": 271,
"account_id": "ACCT-DCD9893044B2",
"baseline_risk_score": 0.189,
"kyc_tier": "tier_3",
"session_entropy": 0.245
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 102,
"timestamp": "2026-01-05T08:47:00Z",
"transaction_amount_usd": 12.93
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.572,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3289951.03,
"financial_exposure_usd": 5221483.88,
"recoverable_pct": 0.441
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106665",
"label": "fraudulent",
"label_confidence": 0.776,
"severity": "medium",
"timestamp": "2026-01-05T15:05:00Z",
"trace_id": "dfb75404-3470-ce58-a1b3-32a7f91c8947"
} | {
"account_age_days": 607,
"account_id": "ACCT-B3007E135405",
"baseline_risk_score": 0.082,
"kyc_tier": "tier_1",
"session_entropy": 0.615
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 158,
"timestamp": "2026-01-05T15:05:00Z",
"transaction_amount_usd": 2009140.1
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.539,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2017058.49,
"financial_exposure_usd": 3615436.61,
"recoverable_pct": 0.699
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104889",
"label": "fraudulent",
"label_confidence": 0.816,
"severity": "critical",
"timestamp": "2026-01-04T09:29:00Z",
"trace_id": "52546c64-94c1-715f-639a-04ea0b3a8ae7"
} | {
"account_age_days": 291,
"account_id": "ACCT-84BEFEED9FB9",
"baseline_risk_score": 0.241,
"kyc_tier": "tier_2",
"session_entropy": 0.542
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 308,
"timestamp": "2026-01-04T09:29:00Z",
"transaction_amount_usd": 2206748.37
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.838,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5388871.49,
"financial_exposure_usd": 7440010.48,
"recoverable_pct": 0.84
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107046",
"label": "benign",
"label_confidence": 0.705,
"severity": "medium",
"timestamp": "2026-01-05T21:26:00Z",
"trace_id": "ca0549f4-2eed-5317-3183-03aec7e24ecd"
} | {
"account_age_days": 1376,
"account_id": "ACCT-6A0EE81040D5",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.397
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 716,
"timestamp": "2026-01-05T21:26:00Z",
"transaction_amount_usd": 14520.98
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.639,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1266.01,
"financial_exposure_usd": 2894.46,
"recoverable_pct": 0.936
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109974",
"label": "benign",
"label_confidence": 0.59,
"severity": "low",
"timestamp": "2026-01-07T22:14:00Z",
"trace_id": "d340d0d8-0b25-bd28-f41a-b6913f1b92f5"
} | {
"account_age_days": 1058,
"account_id": "ACCT-2FA1FF47D169",
"baseline_risk_score": 0.198,
"kyc_tier": "tier_2",
"session_entropy": 0.935
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 84,
"timestamp": "2026-01-07T13:37:00Z",
"transaction_amount_usd": 20.04
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.581,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2558.42,
"financial_exposure_usd": 3956.63,
"recoverable_pct": 0.915
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106156",
"label": "fraudulent",
"label_confidence": 0.845,
"severity": "medium",
"timestamp": "2026-01-05T06:36:00Z",
"trace_id": "e734ca11-936f-79e2-7924-e6e9d9277add"
} | {
"account_age_days": 155,
"account_id": "ACCT-59D591D31B4F",
"baseline_risk_score": 0.343,
"kyc_tier": "tier_3",
"session_entropy": 0.485
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 371,
"timestamp": "2026-01-05T04:08:00Z",
"transaction_amount_usd": 10.31
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.925,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3260399.33,
"financial_exposure_usd": 4981668.84,
"recoverable_pct": 0.988
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101215",
"label": "fraudulent",
"label_confidence": 0.807,
"severity": "medium",
"timestamp": "2026-01-01T20:15:00Z",
"trace_id": "c4732847-2503-23fc-5111-3de8e942c1d2"
} | {
"account_age_days": 170,
"account_id": "ACCT-3F20785A0D2B",
"baseline_risk_score": 0.557,
"kyc_tier": "tier_1",
"session_entropy": 0.418
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 308,
"timestamp": "2026-01-01T14:36:00Z",
"transaction_amount_usd": 19.71
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.809,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 538198.5,
"financial_exposure_usd": 549857.76,
"recoverable_pct": 0.214
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109794",
"label": "benign",
"label_confidence": 0.684,
"severity": "high",
"timestamp": "2026-01-07T19:14:00Z",
"trace_id": "bf6a2d8a-53ce-a7de-2850-e6272ee9ccd1"
} | {
"account_age_days": 1143,
"account_id": "ACCT-5C03735403C9",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.132
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 290,
"timestamp": "2026-01-07T19:14:00Z",
"transaction_amount_usd": 14129.19
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.673,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3917.13,
"financial_exposure_usd": 4055.59,
"recoverable_pct": 0.706
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102250",
"label": "fraudulent",
"label_confidence": 0.901,
"severity": "medium",
"timestamp": "2026-01-02T13:30:00Z",
"trace_id": "c36d873d-e1b8-0ab7-06c6-5548a423d375"
} | {
"account_age_days": 1668,
"account_id": "ACCT-9BCC35B3AF50",
"baseline_risk_score": 0.33,
"kyc_tier": "tier_1",
"session_entropy": 0.473
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 545,
"timestamp": "2026-01-02T13:30:00Z",
"transaction_amount_usd": 66801.15
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.623,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 317721.64,
"financial_exposure_usd": 378298.39,
"recoverable_pct": 0.792
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107601",
"label": "benign",
"label_confidence": 0.539,
"severity": "low",
"timestamp": "2026-01-06T06:41:00Z",
"trace_id": "c67e03b6-27e3-7f32-f539-b6e2c7e2a31a"
} | {
"account_age_days": 730,
"account_id": "ACCT-C950203F98E5",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.566
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 165,
"timestamp": "2026-01-05T19:08:00Z",
"transaction_amount_usd": 20.63
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.516,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 6461.11,
"financial_exposure_usd": 6551.57,
"recoverable_pct": 0.534
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102171",
"label": "fraudulent",
"label_confidence": 0.857,
"severity": "high",
"timestamp": "2026-01-02T12:11:00Z",
"trace_id": "50b2cc98-3c77-5736-f975-a9fb436656ea"
} | {
"account_age_days": 27,
"account_id": "ACCT-CD51CDBB61E5",
"baseline_risk_score": 0.383,
"kyc_tier": "tier_1",
"session_entropy": 0.139
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 1101,
"timestamp": "2026-01-02T12:11:00Z",
"transaction_amount_usd": 76499.63
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.941,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 233249.12,
"financial_exposure_usd": 299148.97,
"recoverable_pct": 0.419
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102947",
"label": "fraudulent",
"label_confidence": 0.847,
"severity": "critical",
"timestamp": "2026-01-03T01:07:00Z",
"trace_id": "1bf3198d-20cc-e14a-2481-0ad090e58ff9"
} | {
"account_age_days": 1230,
"account_id": "ACCT-10239E3D28AD",
"baseline_risk_score": 0.525,
"kyc_tier": "tier_2",
"session_entropy": 0.561
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 210,
"timestamp": "2026-01-02T13:17:00Z",
"transaction_amount_usd": 10.22
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.815,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 861711.62,
"financial_exposure_usd": 1024089.81,
"recoverable_pct": 0.343
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107958",
"label": "benign",
"label_confidence": 0.488,
"severity": "low",
"timestamp": "2026-01-06T12:38:00Z",
"trace_id": "50635a38-817e-4fe1-5217-71f7ebe3c54f"
} | {
"account_age_days": 1262,
"account_id": "ACCT-B5CB86F5068D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.508
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 1084,
"timestamp": "2026-01-06T12:38:00Z",
"transaction_amount_usd": 13444.92
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.737,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1924.65,
"financial_exposure_usd": 2926.45,
"recoverable_pct": 0.953
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100849",
"label": "fraudulent",
"label_confidence": 0.911,
"severity": "critical",
"timestamp": "2026-01-01T14:09:00Z",
"trace_id": "f15a2799-a890-64e2-deac-719041038dc4"
} | {
"account_age_days": 1984,
"account_id": "ACCT-4C296360A4EE",
"baseline_risk_score": 0.444,
"kyc_tier": "tier_1",
"session_entropy": 0.254
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 269,
"timestamp": "2026-01-01T14:09:00Z",
"transaction_amount_usd": 41752.76
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.853,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 551711.79,
"financial_exposure_usd": 801336.11,
"recoverable_pct": 0.505
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107942",
"label": "benign",
"label_confidence": 0.747,
"severity": "medium",
"timestamp": "2026-01-06T12:22:00Z",
"trace_id": "3cb2e67b-3b86-4ff4-986a-86ef298cc87f"
} | {
"account_age_days": 888,
"account_id": "ACCT-6115FA654725",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.925
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 130,
"timestamp": "2026-01-06T02:19:00Z",
"transaction_amount_usd": 24.57
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.48,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 1170.94,
"financial_exposure_usd": 2792.54,
"recoverable_pct": 0.781
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109207",
"label": "benign",
"label_confidence": 0.562,
"severity": "high",
"timestamp": "2026-01-07T09:27:00Z",
"trace_id": "07b0f76a-32aa-e175-74c0-f264432cceb8"
} | {
"account_age_days": 1061,
"account_id": "ACCT-80651599C886",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.775
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 270,
"timestamp": "2026-01-07T09:27:00Z",
"transaction_amount_usd": 5035.2
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.476,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2029.29,
"financial_exposure_usd": 2318.23,
"recoverable_pct": 0.492
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106081",
"label": "fraudulent",
"label_confidence": 0.714,
"severity": "high",
"timestamp": "2026-01-05T05:21:00Z",
"trace_id": "9674a11f-c9cd-10ce-9f68-9255c8f6ae31"
} | {
"account_age_days": 1152,
"account_id": "ACCT-F87CD74172CD",
"baseline_risk_score": 0.195,
"kyc_tier": "tier_2",
"session_entropy": 0.271
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 371,
"timestamp": "2026-01-05T05:21:00Z",
"transaction_amount_usd": 201864.05
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.62,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 1728262.96,
"financial_exposure_usd": 1822374.55,
"recoverable_pct": 0.41
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105314",
"label": "fraudulent",
"label_confidence": 0.821,
"severity": "medium",
"timestamp": "2026-01-04T16:34:00Z",
"trace_id": "d714b5b7-4fcb-ef59-cc0e-584e083727fc"
} | {
"account_age_days": 729,
"account_id": "ACCT-AB56E9B4098D",
"baseline_risk_score": 0.153,
"kyc_tier": "tier_3",
"session_entropy": 0.359
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 478,
"timestamp": "2026-01-04T16:34:00Z",
"transaction_amount_usd": 1253596.04
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.835,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2046421.92,
"financial_exposure_usd": 4797314.4,
"recoverable_pct": 0.511
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105460",
"label": "fraudulent",
"label_confidence": 0.78,
"severity": "high",
"timestamp": "2026-01-04T19:00:00Z",
"trace_id": "60e7f036-0861-c617-2eed-ccfdaaf6500a"
} | {
"account_age_days": 1275,
"account_id": "ACCT-3CDFE800B16C",
"baseline_risk_score": 0.236,
"kyc_tier": "tier_3",
"session_entropy": 0.233
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 1108,
"timestamp": "2026-01-04T19:00:00Z",
"transaction_amount_usd": 2260220.09
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.361,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3269086.47,
"financial_exposure_usd": 3335431.78,
"recoverable_pct": 0.915
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100439",
"label": "fraudulent",
"label_confidence": 0.933,
"severity": "critical",
"timestamp": "2026-01-01T07:19:00Z",
"trace_id": "7fa7f07d-dbf4-7ef7-88c9-49cb53031bdb"
} | {
"account_age_days": 571,
"account_id": "ACCT-A1BDE1AC83D2",
"baseline_risk_score": 0.407,
"kyc_tier": "tier_2",
"session_entropy": 0.652
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 391,
"timestamp": "2026-01-01T07:19:00Z",
"transaction_amount_usd": 114744.65
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.36,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 508896.15,
"financial_exposure_usd": 1077725.1,
"recoverable_pct": 0.349
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104202",
"label": "fraudulent",
"label_confidence": 0.822,
"severity": "high",
"timestamp": "2026-01-03T22:02:00Z",
"trace_id": "1473b91b-bbbe-1c52-e790-bb3f6d1011ff"
} | {
"account_age_days": 540,
"account_id": "ACCT-B6D8ECE4C063",
"baseline_risk_score": 0.416,
"kyc_tier": "tier_1",
"session_entropy": 0.204
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 587,
"timestamp": "2026-01-03T22:02:00Z",
"transaction_amount_usd": 1447160.33
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.789,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2508539.91,
"financial_exposure_usd": 5590832.63,
"recoverable_pct": 0.714
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109841",
"label": "benign",
"label_confidence": 0.695,
"severity": "low",
"timestamp": "2026-01-07T20:01:00Z",
"trace_id": "e2f37104-2696-4e04-8889-099a6ad560c1"
} | {
"account_age_days": 30,
"account_id": "ACCT-248E8E171B56",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.345
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 261,
"timestamp": "2026-01-07T20:01:00Z",
"transaction_amount_usd": 820.31
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.589,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 4564.22,
"financial_exposure_usd": 4606.47,
"recoverable_pct": 0.677
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100257",
"label": "fraudulent",
"label_confidence": 0.913,
"severity": "critical",
"timestamp": "2026-01-01T04:17:00Z",
"trace_id": "4d9e6b9f-a3ee-785f-134a-fb2395ce2483"
} | {
"account_age_days": 1940,
"account_id": "ACCT-945F42812366",
"baseline_risk_score": 0.336,
"kyc_tier": "tier_3",
"session_entropy": 0.909
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "BR",
"latency_ms": 580,
"timestamp": "2026-01-01T04:17:00Z",
"transaction_amount_usd": 17692.82
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.428,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 914057.91,
"financial_exposure_usd": 1030049.22,
"recoverable_pct": 0.64
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101693",
"label": "fraudulent",
"label_confidence": 0.957,
"severity": "low",
"timestamp": "2026-01-02T04:13:00Z",
"trace_id": "6f49a2d4-70f1-6a38-9b36-ce36307bd708"
} | {
"account_age_days": 1760,
"account_id": "ACCT-07D96A700444",
"baseline_risk_score": 0.432,
"kyc_tier": "tier_3",
"session_entropy": 0.862
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 331,
"timestamp": "2026-01-02T04:13:00Z",
"transaction_amount_usd": 40065.26
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.431,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 553310.01,
"financial_exposure_usd": 571250.91,
"recoverable_pct": 0.496
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102293",
"label": "fraudulent",
"label_confidence": 0.849,
"severity": "medium",
"timestamp": "2026-01-02T14:13:00Z",
"trace_id": "35c9bc43-3ad3-2b36-88b1-1bec5a6eae2c"
} | {
"account_age_days": 1984,
"account_id": "ACCT-37C33133F682",
"baseline_risk_score": 0.412,
"kyc_tier": "tier_3",
"session_entropy": 0.902
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "SG",
"latency_ms": 739,
"timestamp": "2026-01-02T14:13:00Z",
"transaction_amount_usd": 48891.19
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.463,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 385537.87,
"financial_exposure_usd": 723850.49,
"recoverable_pct": 0.762
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107273",
"label": "benign",
"label_confidence": 0.456,
"severity": "low",
"timestamp": "2026-01-06T01:13:00Z",
"trace_id": "96e82c48-eadd-0cac-a996-a72c43ea69dd"
} | {
"account_age_days": 499,
"account_id": "ACCT-41E3B52BC035",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.704
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 452,
"timestamp": "2026-01-06T01:13:00Z",
"transaction_amount_usd": 1296.69
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.501,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 6103.01,
"financial_exposure_usd": 6509.34,
"recoverable_pct": 0.583
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108119",
"label": "benign",
"label_confidence": 0.607,
"severity": "medium",
"timestamp": "2026-01-06T15:19:00Z",
"trace_id": "f634d5e7-6516-44ce-1350-69ec77051ca8"
} | {
"account_age_days": 55,
"account_id": "ACCT-A78CFE49ABD8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.642
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 1177,
"timestamp": "2026-01-06T15:19:00Z",
"transaction_amount_usd": 4541.78
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.551,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1169.07,
"financial_exposure_usd": 1236.7,
"recoverable_pct": 0.942
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106981",
"label": "benign",
"label_confidence": 0.549,
"severity": "medium",
"timestamp": "2026-01-05T20:21:00Z",
"trace_id": "333b4dca-62a4-5bc0-1b2c-2fb5545b860f"
} | {
"account_age_days": 1789,
"account_id": "ACCT-F4565340B429",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.567
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 156,
"timestamp": "2026-01-05T20:21:00Z",
"transaction_amount_usd": 10139.62
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.545,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1125.16,
"financial_exposure_usd": 2317.91,
"recoverable_pct": 0.887
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103595",
"label": "fraudulent",
"label_confidence": 0.621,
"severity": "high",
"timestamp": "2026-01-03T11:55:00Z",
"trace_id": "840aeac0-469e-c2a3-6478-a0547c2acd26"
} | {
"account_age_days": 1789,
"account_id": "ACCT-65C0B700AED3",
"baseline_risk_score": 0.158,
"kyc_tier": "tier_3",
"session_entropy": 0.631
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 539,
"timestamp": "2026-01-03T11:55:00Z",
"transaction_amount_usd": 109065.78
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.507,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2796232.34,
"financial_exposure_usd": 2944980.68,
"recoverable_pct": 0.627
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106920",
"label": "benign",
"label_confidence": 0.596,
"severity": "low",
"timestamp": "2026-01-05T19:20:00Z",
"trace_id": "5fa016b3-b4fc-c731-4378-de90a3e7e5a7"
} | {
"account_age_days": 105,
"account_id": "ACCT-5B2F08A00BEA",
"baseline_risk_score": 0.083,
"kyc_tier": "tier_3",
"session_entropy": 0.566
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 102,
"timestamp": "2026-01-05T13:42:00Z",
"transaction_amount_usd": 1.47
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.566,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2426.49,
"financial_exposure_usd": 3152.61,
"recoverable_pct": 0.489
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108007",
"label": "benign",
"label_confidence": 0.469,
"severity": "high",
"timestamp": "2026-01-06T13:27:00Z",
"trace_id": "a7f9c70b-3786-33d4-72a3-f3438da71175"
} | {
"account_age_days": 1375,
"account_id": "ACCT-ED63722BD1EA",
"baseline_risk_score": 0.168,
"kyc_tier": "tier_3",
"session_entropy": 0.912
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 236,
"timestamp": "2026-01-06T13:27:00Z",
"transaction_amount_usd": 10715.44
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.577,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 640.61,
"financial_exposure_usd": 1113.07,
"recoverable_pct": 0.53
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102743",
"label": "fraudulent",
"label_confidence": 0.837,
"severity": "medium",
"timestamp": "2026-01-02T21:43:00Z",
"trace_id": "e0c062ca-fc33-740f-72e6-d7ff11973b06"
} | {
"account_age_days": 1943,
"account_id": "ACCT-B5643E70383D",
"baseline_risk_score": 0.296,
"kyc_tier": "tier_1",
"session_entropy": 0.389
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 255,
"timestamp": "2026-01-02T13:39:00Z",
"transaction_amount_usd": 11.24
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.508,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 291280.77,
"financial_exposure_usd": 577565.22,
"recoverable_pct": 0.343
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104360",
"label": "fraudulent",
"label_confidence": 0.84,
"severity": "high",
"timestamp": "2026-01-04T00:40:00Z",
"trace_id": "1013f616-b125-6713-218c-6bb30df6a420"
} | {
"account_age_days": 495,
"account_id": "ACCT-3F56E3203408",
"baseline_risk_score": 0.448,
"kyc_tier": "tier_3",
"session_entropy": 0.203
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 126,
"timestamp": "2026-01-04T00:40:00Z",
"transaction_amount_usd": 2051960.71
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.549,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2381440.68,
"financial_exposure_usd": 5197530.14,
"recoverable_pct": 0.437
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107708",
"label": "benign",
"label_confidence": 0.708,
"severity": "medium",
"timestamp": "2026-01-06T08:28:00Z",
"trace_id": "7fc25252-46ff-7f0d-894c-5a3cc4c105a9"
} | {
"account_age_days": 227,
"account_id": "ACCT-198A4A73B2EC",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.816
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 860,
"timestamp": "2026-01-06T08:28:00Z",
"transaction_amount_usd": 836.19
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.565,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2323.88,
"financial_exposure_usd": 4214.84,
"recoverable_pct": 0.437
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100449",
"label": "fraudulent",
"label_confidence": 0.767,
"severity": "low",
"timestamp": "2026-01-01T07:29:00Z",
"trace_id": "e17e7d37-1e52-3ceb-2013-5be69b86c124"
} | {
"account_age_days": 531,
"account_id": "ACCT-75AD231B95DE",
"baseline_risk_score": 0.381,
"kyc_tier": "tier_2",
"session_entropy": 0.264
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 464,
"timestamp": "2026-01-01T07:29:00Z",
"transaction_amount_usd": 41010.64
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.726,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 398998.67,
"financial_exposure_usd": 825077.98,
"recoverable_pct": 0.075
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100828",
"label": "fraudulent",
"label_confidence": 0.94,
"severity": "low",
"timestamp": "2026-01-01T13:48:00Z",
"trace_id": "4bb14b83-cde8-5a6b-631f-cff32845b26c"
} | {
"account_age_days": 1402,
"account_id": "ACCT-00AD1B729ED8",
"baseline_risk_score": 0.509,
"kyc_tier": "tier_3",
"session_entropy": 0.719
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "LU",
"latency_ms": 955,
"timestamp": "2026-01-01T13:48:00Z",
"transaction_amount_usd": 96384.42
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.688,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 759713.22,
"financial_exposure_usd": 952239.22,
"recoverable_pct": 0.695
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109494",
"label": "benign",
"label_confidence": 0.593,
"severity": "critical",
"timestamp": "2026-01-07T14:14:00Z",
"trace_id": "df55e810-f8a4-22a8-aa67-f0bffdfa51de"
} | {
"account_age_days": 178,
"account_id": "ACCT-97FD5E67C666",
"baseline_risk_score": 0.146,
"kyc_tier": "tier_2",
"session_entropy": 0.152
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 306,
"timestamp": "2026-01-07T01:34:00Z",
"transaction_amount_usd": 9.79
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.589,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1945.7,
"financial_exposure_usd": 4065.03,
"recoverable_pct": 0.755
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102185",
"label": "fraudulent",
"label_confidence": 0.837,
"severity": "medium",
"timestamp": "2026-01-02T12:25:00Z",
"trace_id": "e05077bd-ce4f-d8a0-a667-1338a0c7e3ee"
} | {
"account_age_days": 647,
"account_id": "ACCT-D20D81C01A87",
"baseline_risk_score": 0.456,
"kyc_tier": "tier_3",
"session_entropy": 0.381
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 927,
"timestamp": "2026-01-02T12:25:00Z",
"transaction_amount_usd": 118799.41
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.568,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 380509.86,
"financial_exposure_usd": 892877.74,
"recoverable_pct": 0.533
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108831",
"label": "benign",
"label_confidence": 0.6,
"severity": "high",
"timestamp": "2026-01-07T03:11:00Z",
"trace_id": "c1f85524-bf65-717d-857b-7f7b58c9d395"
} | {
"account_age_days": 212,
"account_id": "ACCT-59F56B99EAFD",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.362
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 226,
"timestamp": "2026-01-06T20:07:00Z",
"transaction_amount_usd": 14.83
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.7,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tra... | {
"customer_funds_at_risk_usd": 1943.4,
"financial_exposure_usd": 2137.57,
"recoverable_pct": 0.872
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103347",
"label": "fraudulent",
"label_confidence": 0.648,
"severity": "critical",
"timestamp": "2026-01-03T07:47:00Z",
"trace_id": "5e1d3e35-d3ba-8f19-8707-80dc2daca231"
} | {
"account_age_days": 432,
"account_id": "ACCT-C7DE60BD83C8",
"baseline_risk_score": 0.413,
"kyc_tier": "tier_3",
"session_entropy": 0.935
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 481,
"timestamp": "2026-01-03T07:47:00Z",
"transaction_amount_usd": 1613539.13
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.888,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1568500.63,
"financial_exposure_usd": 3257886.14,
"recoverable_pct": 0.515
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107260",
"label": "benign",
"label_confidence": 0.649,
"severity": "medium",
"timestamp": "2026-01-06T01:00:00Z",
"trace_id": "40236fb2-ad21-6591-481c-30c322b428a1"
} | {
"account_age_days": 1255,
"account_id": "ACCT-7B1E4C71935E",
"baseline_risk_score": 0.195,
"kyc_tier": "tier_2",
"session_entropy": 0.415
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 368,
"timestamp": "2026-01-06T01:00:00Z",
"transaction_amount_usd": 3116.39
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.509,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2830.19,
"financial_exposure_usd": 4765.78,
"recoverable_pct": 0.763
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104790",
"label": "fraudulent",
"label_confidence": 0.747,
"severity": "high",
"timestamp": "2026-01-04T07:50:00Z",
"trace_id": "9ee20e43-ee3b-9efa-7241-905a781ac729"
} | {
"account_age_days": 1279,
"account_id": "ACCT-25DD8EBD416B",
"baseline_risk_score": 0.118,
"kyc_tier": "tier_1",
"session_entropy": 0.732
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 387,
"timestamp": "2026-01-03T21:20:00Z",
"transaction_amount_usd": 3.61
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.354,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4344587.93,
"financial_exposure_usd": 6575834.94,
"recoverable_pct": 0.645
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101558",
"label": "fraudulent",
"label_confidence": 0.887,
"severity": "critical",
"timestamp": "2026-01-02T01:58:00Z",
"trace_id": "263592fb-1a7a-eabb-cd3f-264912ded809"
} | {
"account_age_days": 1830,
"account_id": "ACCT-B52A38708E21",
"baseline_risk_score": 0.419,
"kyc_tier": "tier_3",
"session_entropy": 0.331
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 1031,
"timestamp": "2026-01-02T01:58:00Z",
"transaction_amount_usd": 83334.06
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.64,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 248156.55,
"financial_exposure_usd": 273199.05,
"recoverable_pct": 0.03
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105212",
"label": "fraudulent",
"label_confidence": 0.663,
"severity": "low",
"timestamp": "2026-01-04T14:52:00Z",
"trace_id": "cd23f67a-3384-b6fa-b680-ce50e5f4ad39"
} | {
"account_age_days": 810,
"account_id": "ACCT-84F396C4101F",
"baseline_risk_score": 0.071,
"kyc_tier": "tier_2",
"session_entropy": 0.247
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 246,
"timestamp": "2026-01-04T14:52:00Z",
"transaction_amount_usd": 2901395.8
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.761,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 5210255.31,
"financial_exposure_usd": 5396429.38,
"recoverable_pct": 0.464
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103079",
"label": "fraudulent",
"label_confidence": 0.893,
"severity": "critical",
"timestamp": "2026-01-03T03:19:00Z",
"trace_id": "fdc82b6d-c703-eef2-fbad-2291a68fa253"
} | {
"account_age_days": 1459,
"account_id": "ACCT-9CCD6CC957F2",
"baseline_risk_score": 0.425,
"kyc_tier": "tier_1",
"session_entropy": 0.799
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 760,
"timestamp": "2026-01-03T03:19:00Z",
"transaction_amount_usd": 78992.33
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.754,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 430629.73,
"financial_exposure_usd": 794228.33,
"recoverable_pct": 0.677
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108799",
"label": "benign",
"label_confidence": 0.664,
"severity": "low",
"timestamp": "2026-01-07T02:39:00Z",
"trace_id": "59469db1-c8da-6128-7b40-bd5b98605b39"
} | {
"account_age_days": 1668,
"account_id": "ACCT-42B8AD9C1E51",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.303
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 97,
"timestamp": "2026-01-06T18:14:00Z",
"transaction_amount_usd": 3.02
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.795,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 648.21,
"financial_exposure_usd": 1418.09,
"recoverable_pct": 0.681
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107627",
"label": "benign",
"label_confidence": 0.675,
"severity": "medium",
"timestamp": "2026-01-06T07:07:00Z",
"trace_id": "7d5983b7-0579-713e-698b-553e0a6b8c9b"
} | {
"account_age_days": 547,
"account_id": "ACCT-3D3A37A9F036",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.841
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 197,
"timestamp": "2026-01-06T07:07:00Z",
"transaction_amount_usd": 3616.54
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.735,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2329,
"financial_exposure_usd": 3276.9,
"recoverable_pct": 0.892
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103781",
"label": "fraudulent",
"label_confidence": 0.702,
"severity": "low",
"timestamp": "2026-01-03T15:01:00Z",
"trace_id": "e896698f-ae92-7d08-505c-8eae29bece7f"
} | {
"account_age_days": 1213,
"account_id": "ACCT-8F9B71CA236C",
"baseline_risk_score": 0.167,
"kyc_tier": "tier_3",
"session_entropy": 0.223
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 222,
"timestamp": "2026-01-03T04:17:00Z",
"transaction_amount_usd": 20.19
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.946,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3851553.38,
"financial_exposure_usd": 3965140.5,
"recoverable_pct": 0.439
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104696",
"label": "fraudulent",
"label_confidence": 0.752,
"severity": "medium",
"timestamp": "2026-01-04T06:16:00Z",
"trace_id": "56a28efd-f61a-36b2-cbbb-5c2ce6e502d0"
} | {
"account_age_days": 1002,
"account_id": "ACCT-CD3BD1436838",
"baseline_risk_score": 0.143,
"kyc_tier": "tier_2",
"session_entropy": 0.365
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 720,
"timestamp": "2026-01-04T06:16:00Z",
"transaction_amount_usd": 970085.4
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.369,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4945643.3,
"financial_exposure_usd": 5645971.12,
"recoverable_pct": 0.546
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100978",
"label": "fraudulent",
"label_confidence": 0.933,
"severity": "critical",
"timestamp": "2026-01-01T16:18:00Z",
"trace_id": "265f8a10-ae0d-ff0e-ca4d-11c05594b6b4"
} | {
"account_age_days": 459,
"account_id": "ACCT-6B55633BC51C",
"baseline_risk_score": 0.563,
"kyc_tier": "tier_3",
"session_entropy": 0.369
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 290,
"timestamp": "2026-01-01T09:11:00Z",
"transaction_amount_usd": 6.31
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.49,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 119516.29,
"financial_exposure_usd": 202947.57,
"recoverable_pct": 0.799
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102348",
"label": "fraudulent",
"label_confidence": 0.814,
"severity": "low",
"timestamp": "2026-01-02T15:08:00Z",
"trace_id": "15c5e128-1b8b-278a-7df0-0ffd944ccfd2"
} | {
"account_age_days": 1426,
"account_id": "ACCT-32FC04C167E4",
"baseline_risk_score": 0.607,
"kyc_tier": "tier_1",
"session_entropy": 0.766
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 386,
"timestamp": "2026-01-02T10:40:00Z",
"transaction_amount_usd": 12.72
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.729,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 565040.79,
"financial_exposure_usd": 906014.07,
"recoverable_pct": 0.128
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107696",
"label": "benign",
"label_confidence": 0.609,
"severity": "medium",
"timestamp": "2026-01-06T08:16:00Z",
"trace_id": "f963c19e-d3e4-3b0e-de67-3f48dd9dbaf2"
} | {
"account_age_days": 413,
"account_id": "ACCT-86834506892D",
"baseline_risk_score": 0.088,
"kyc_tier": "tier_1",
"session_entropy": 0.18
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 856,
"timestamp": "2026-01-06T08:16:00Z",
"transaction_amount_usd": 10703.06
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.643,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 4381.57,
"financial_exposure_usd": 5343.71,
"recoverable_pct": 0.46
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105596",
"label": "fraudulent",
"label_confidence": 0.683,
"severity": "medium",
"timestamp": "2026-01-04T21:16:00Z",
"trace_id": "54a23d02-296d-a2e7-ceed-950d482648d3"
} | {
"account_age_days": 1049,
"account_id": "ACCT-67CB5690D416",
"baseline_risk_score": 0.304,
"kyc_tier": "tier_2",
"session_entropy": 0.464
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 899,
"timestamp": "2026-01-04T21:16:00Z",
"transaction_amount_usd": 2530499.71
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.799,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2697437.58,
"financial_exposure_usd": 3069283,
"recoverable_pct": 0.718
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104712",
"label": "fraudulent",
"label_confidence": 0.753,
"severity": "high",
"timestamp": "2026-01-04T06:32:00Z",
"trace_id": "afe9e6c5-e2af-a621-5ec8-3205a65c5cec"
} | {
"account_age_days": 765,
"account_id": "ACCT-B92CA1972A44",
"baseline_risk_score": 0.407,
"kyc_tier": "tier_1",
"session_entropy": 0.755
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 116,
"timestamp": "2026-01-03T22:13:00Z",
"transaction_amount_usd": 12.37
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.687,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3947831.96,
"financial_exposure_usd": 4668952.72,
"recoverable_pct": 0.574
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105847",
"label": "fraudulent",
"label_confidence": 0.721,
"severity": "critical",
"timestamp": "2026-01-05T01:27:00Z",
"trace_id": "0346c3ca-e233-f75e-506e-d2c9d7b7b686"
} | {
"account_age_days": 1764,
"account_id": "ACCT-2A3064690F32",
"baseline_risk_score": 0.125,
"kyc_tier": "tier_2",
"session_entropy": 0.261
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 1183,
"timestamp": "2026-01-05T01:27:00Z",
"transaction_amount_usd": 2330580.81
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.903,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2703606.79,
"financial_exposure_usd": 4479890.76,
"recoverable_pct": 0.423
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104882",
"label": "fraudulent",
"label_confidence": 0.814,
"severity": "critical",
"timestamp": "2026-01-04T09:22:00Z",
"trace_id": "c81dabf1-04ba-21ad-90e9-15b6d36eff76"
} | {
"account_age_days": 444,
"account_id": "ACCT-C042A9E67A76",
"baseline_risk_score": 0.099,
"kyc_tier": "tier_2",
"session_entropy": 0.381
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 675,
"timestamp": "2026-01-04T09:22:00Z",
"transaction_amount_usd": 759495.58
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.426,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3725669.98,
"financial_exposure_usd": 4341502.38,
"recoverable_pct": 0.717
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102521",
"label": "fraudulent",
"label_confidence": 0.821,
"severity": "medium",
"timestamp": "2026-01-02T18:01:00Z",
"trace_id": "5d2f31b6-3b2d-d086-5695-7e0987d4c4b6"
} | {
"account_age_days": 965,
"account_id": "ACCT-F2601E4DAB21",
"baseline_risk_score": 0.569,
"kyc_tier": "tier_3",
"session_entropy": 0.381
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 320,
"timestamp": "2026-01-02T13:05:00Z",
"transaction_amount_usd": 20.82
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.835,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 387671.45,
"financial_exposure_usd": 555840.79,
"recoverable_pct": 0.529
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109784",
"label": "benign",
"label_confidence": 0.603,
"severity": "medium",
"timestamp": "2026-01-07T19:04:00Z",
"trace_id": "3f2921b8-de48-70dc-078d-be0e6d96cae6"
} | {
"account_age_days": 1091,
"account_id": "ACCT-F30654BAD14D",
"baseline_risk_score": 0.159,
"kyc_tier": "tier_1",
"session_entropy": 0.875
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 1189,
"timestamp": "2026-01-07T19:04:00Z",
"transaction_amount_usd": 4282.84
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.526,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1483.61,
"financial_exposure_usd": 1690.75,
"recoverable_pct": 0.801
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101462",
"label": "fraudulent",
"label_confidence": 0.917,
"severity": "high",
"timestamp": "2026-01-02T00:22:00Z",
"trace_id": "1c9c546c-b3e6-5385-b342-f8bc6ae3113a"
} | {
"account_age_days": 128,
"account_id": "ACCT-277F4AE42F54",
"baseline_risk_score": 0.385,
"kyc_tier": "tier_2",
"session_entropy": 0.463
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "LU",
"latency_ms": 1086,
"timestamp": "2026-01-02T00:22:00Z",
"transaction_amount_usd": 95909.22
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.415,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 522250.42,
"financial_exposure_usd": 846601.47,
"recoverable_pct": 0.235
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105310",
"label": "fraudulent",
"label_confidence": 0.947,
"severity": "medium",
"timestamp": "2026-01-04T16:30:00Z",
"trace_id": "18e1f0a8-c382-ca5c-2a0d-8a5a5be4372d"
} | {
"account_age_days": 1873,
"account_id": "ACCT-2122AD838588",
"baseline_risk_score": 0.237,
"kyc_tier": "tier_2",
"session_entropy": 0.701
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 238,
"timestamp": "2026-01-04T16:30:00Z",
"transaction_amount_usd": 615544.04
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.459,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3182009.91,
"financial_exposure_usd": 4140626.31,
"recoverable_pct": 0.81
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105287",
"label": "fraudulent",
"label_confidence": 0.72,
"severity": "critical",
"timestamp": "2026-01-04T16:07:00Z",
"trace_id": "1076840b-65c3-e721-7298-92511a429010"
} | {
"account_age_days": 482,
"account_id": "ACCT-A7248421C739",
"baseline_risk_score": 0.275,
"kyc_tier": "tier_1",
"session_entropy": 0.368
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 357,
"timestamp": "2026-01-04T07:32:00Z",
"transaction_amount_usd": 21.46
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.723,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3523033.85,
"financial_exposure_usd": 5795108.69,
"recoverable_pct": 0.6
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107441",
"label": "benign",
"label_confidence": 0.502,
"severity": "medium",
"timestamp": "2026-01-06T04:01:00Z",
"trace_id": "d227e825-a5a3-b7c1-a249-1d45259d663c"
} | {
"account_age_days": 1329,
"account_id": "ACCT-13B0AAC300C8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.123
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 270,
"timestamp": "2026-01-05T20:58:00Z",
"transaction_amount_usd": 22.16
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.605,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2340.51,
"financial_exposure_usd": 5162.02,
"recoverable_pct": 0.716
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108489",
"label": "benign",
"label_confidence": 0.503,
"severity": "high",
"timestamp": "2026-01-06T21:29:00Z",
"trace_id": "8b6d93a4-e8d9-7978-bd85-5332aa47bedb"
} | {
"account_age_days": 794,
"account_id": "ACCT-1081083A35EA",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.629
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 285,
"timestamp": "2026-01-06T18:11:00Z",
"transaction_amount_usd": 23.45
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.521,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 483.42,
"financial_exposure_usd": 960.88,
"recoverable_pct": 0.989
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105528",
"label": "fraudulent",
"label_confidence": 0.759,
"severity": "high",
"timestamp": "2026-01-04T20:08:00Z",
"trace_id": "9b47a735-50b5-68c1-d567-66b59b8c3ef8"
} | {
"account_age_days": 697,
"account_id": "ACCT-1F9DB4908E49",
"baseline_risk_score": 0.103,
"kyc_tier": "tier_2",
"session_entropy": 0.306
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 921,
"timestamp": "2026-01-04T20:08:00Z",
"transaction_amount_usd": 1318463
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.584,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 5183192.86,
"financial_exposure_usd": 7301111.99,
"recoverable_pct": 0.741
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100251",
"label": "fraudulent",
"label_confidence": 0.947,
"severity": "high",
"timestamp": "2026-01-01T04:11:00Z",
"trace_id": "09ac7ba5-eb28-73e6-e465-aed7207ad1d4"
} | {
"account_age_days": 1734,
"account_id": "ACCT-817C781A6FBC",
"baseline_risk_score": 0.467,
"kyc_tier": "tier_1",
"session_entropy": 0.523
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "JP",
"latency_ms": 1190,
"timestamp": "2026-01-01T04:11:00Z",
"transaction_amount_usd": 114192.3
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.542,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 490378.86,
"financial_exposure_usd": 704218.97,
"recoverable_pct": 0.637
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104456",
"label": "fraudulent",
"label_confidence": 0.7,
"severity": "medium",
"timestamp": "2026-01-04T02:16:00Z",
"trace_id": "4a09be17-6d1f-f8a8-b26d-4b70cad3100c"
} | {
"account_age_days": 607,
"account_id": "ACCT-8D9EF752CE4D",
"baseline_risk_score": 0.219,
"kyc_tier": "tier_2",
"session_entropy": 0.755
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 102,
"timestamp": "2026-01-03T21:35:00Z",
"transaction_amount_usd": 8.42
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.581,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3844042.74,
"financial_exposure_usd": 6184504.69,
"recoverable_pct": 0.531
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107611",
"label": "benign",
"label_confidence": 0.529,
"severity": "high",
"timestamp": "2026-01-06T06:51:00Z",
"trace_id": "d087029c-5b3c-758a-e524-8413efdc24eb"
} | {
"account_age_days": 1705,
"account_id": "ACCT-3309DE697BDF",
"baseline_risk_score": 0.147,
"kyc_tier": "tier_2",
"session_entropy": 0.673
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 1051,
"timestamp": "2026-01-06T06:51:00Z",
"transaction_amount_usd": 5916.37
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.718,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3813.22,
"financial_exposure_usd": 3906.16,
"recoverable_pct": 0.741
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108505",
"label": "benign",
"label_confidence": 0.631,
"severity": "high",
"timestamp": "2026-01-06T21:45:00Z",
"trace_id": "1814b5ed-6b40-7fa9-6253-66e97fe02860"
} | {
"account_age_days": 433,
"account_id": "ACCT-0698F0E0D500",
"baseline_risk_score": 0.165,
"kyc_tier": "tier_1",
"session_entropy": 0.204
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 889,
"timestamp": "2026-01-06T21:45:00Z",
"transaction_amount_usd": 5621.71
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.525,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 4512.1,
"financial_exposure_usd": 6370.83,
"recoverable_pct": 0.626
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109648",
"label": "benign",
"label_confidence": 0.454,
"severity": "low",
"timestamp": "2026-01-07T16:48:00Z",
"trace_id": "470ab196-6f60-eb59-5876-7894ee3f288f"
} | {
"account_age_days": 1678,
"account_id": "ACCT-3A688F2D50FE",
"baseline_risk_score": 0.06,
"kyc_tier": "tier_1",
"session_entropy": 0.385
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 174,
"timestamp": "2026-01-07T15:02:00Z",
"transaction_amount_usd": 12.92
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.465,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 982.15,
"financial_exposure_usd": 2207.4,
"recoverable_pct": 0.846
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102225",
"label": "fraudulent",
"label_confidence": 0.879,
"severity": "high",
"timestamp": "2026-01-02T13:05:00Z",
"trace_id": "a9544ed3-505d-5291-d35b-06bb73701ffe"
} | {
"account_age_days": 1652,
"account_id": "ACCT-8D69E638A5C4",
"baseline_risk_score": 0.559,
"kyc_tier": "tier_1",
"session_entropy": 0.418
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 218,
"timestamp": "2026-01-02T06:54:00Z",
"transaction_amount_usd": 15.78
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.687,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 935577.2,
"financial_exposure_usd": 1016584.54,
"recoverable_pct": 0.039
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108887",
"label": "benign",
"label_confidence": 0.484,
"severity": "low",
"timestamp": "2026-01-07T04:07:00Z",
"trace_id": "411614b1-f777-7a8f-38a3-5cb16bf8ef2c"
} | {
"account_age_days": 82,
"account_id": "ACCT-834433A9DDBB",
"baseline_risk_score": 0.134,
"kyc_tier": "tier_1",
"session_entropy": 0.882
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 162,
"timestamp": "2026-01-07T04:07:00Z",
"transaction_amount_usd": 1643.2
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.653,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 544.87,
"financial_exposure_usd": 856.41,
"recoverable_pct": 0.625
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103110",
"label": "fraudulent",
"label_confidence": 0.811,
"severity": "high",
"timestamp": "2026-01-03T03:50:00Z",
"trace_id": "45453d86-9bad-57ad-205f-5caf369675a3"
} | {
"account_age_days": 250,
"account_id": "ACCT-D0F45ABA2886",
"baseline_risk_score": 0.49,
"kyc_tier": "tier_2",
"session_entropy": 0.693
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 438,
"timestamp": "2026-01-03T03:50:00Z",
"transaction_amount_usd": 34188.23
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.438,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 639565.22,
"financial_exposure_usd": 1421052.6,
"recoverable_pct": 0.223
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106583",
"label": "fraudulent",
"label_confidence": 0.901,
"severity": "medium",
"timestamp": "2026-01-05T13:43:00Z",
"trace_id": "1e0645cf-5e2d-448f-548b-29750b191b66"
} | {
"account_age_days": 529,
"account_id": "ACCT-8EA894B2D271",
"baseline_risk_score": 0.113,
"kyc_tier": "tier_1",
"session_entropy": 0.183
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 1193,
"timestamp": "2026-01-05T13:43:00Z",
"transaction_amount_usd": 969256.15
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.483,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1327039.1,
"financial_exposure_usd": 2527669.21,
"recoverable_pct": 0.859
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106768",
"label": "benign",
"label_confidence": 0.632,
"severity": "medium",
"timestamp": "2026-01-05T16:48:00Z",
"trace_id": "6af39328-a048-ee42-6407-12e6b26d77bf"
} | {
"account_age_days": 724,
"account_id": "ACCT-73BF84E2D1AE",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.62
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 81,
"timestamp": "2026-01-05T05:28:00Z",
"transaction_amount_usd": 7.63
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.594,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 7106.98,
"financial_exposure_usd": 7760.83,
"recoverable_pct": 0.966
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109579",
"label": "benign",
"label_confidence": 0.476,
"severity": "low",
"timestamp": "2026-01-07T15:39:00Z",
"trace_id": "f8924d5d-3d8c-f391-7d46-9066699ad721"
} | {
"account_age_days": 430,
"account_id": "ACCT-2F4839E335F0",
"baseline_risk_score": 0.131,
"kyc_tier": "tier_2",
"session_entropy": 0.166
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 1118,
"timestamp": "2026-01-07T15:39:00Z",
"transaction_amount_usd": 4008.27
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.667,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3439.41,
"financial_exposure_usd": 4644.48,
"recoverable_pct": 0.654
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108166",
"label": "benign",
"label_confidence": 0.544,
"severity": "medium",
"timestamp": "2026-01-06T16:06:00Z",
"trace_id": "41003fab-bdab-2e0b-c5a9-76512c09c777"
} | {
"account_age_days": 501,
"account_id": "ACCT-8E6C2FDE3D81",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.862
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 372,
"timestamp": "2026-01-06T14:53:00Z",
"transaction_amount_usd": 6.68
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.498,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1218.73,
"financial_exposure_usd": 1441.66,
"recoverable_pct": 0.441
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106617",
"label": "fraudulent",
"label_confidence": 0.612,
"severity": "critical",
"timestamp": "2026-01-05T14:17:00Z",
"trace_id": "bdbd0904-f2ff-7536-878b-cc2ac63ae790"
} | {
"account_age_days": 1183,
"account_id": "ACCT-F13A187B4929",
"baseline_risk_score": 0.305,
"kyc_tier": "tier_3",
"session_entropy": 0.375
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 1070,
"timestamp": "2026-01-05T14:17:00Z",
"transaction_amount_usd": 2096791.92
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.599,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3823288.56,
"financial_exposure_usd": 7749827.08,
"recoverable_pct": 0.476
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101665",
"label": "fraudulent",
"label_confidence": 0.794,
"severity": "high",
"timestamp": "2026-01-02T03:45:00Z",
"trace_id": "2e6edf0c-bb22-d683-ad82-3fa212a89e5b"
} | {
"account_age_days": 177,
"account_id": "ACCT-1DCD82818A90",
"baseline_risk_score": 0.267,
"kyc_tier": "tier_1",
"session_entropy": 0.183
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "MY",
"latency_ms": 700,
"timestamp": "2026-01-02T03:45:00Z",
"transaction_amount_usd": 89970.81
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.639,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 268805.55,
"financial_exposure_usd": 487117.1,
"recoverable_pct": 0.697
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102918",
"label": "fraudulent",
"label_confidence": 0.825,
"severity": "critical",
"timestamp": "2026-01-03T00:38:00Z",
"trace_id": "44427d9b-02b0-0be8-d9d8-a877efc72d02"
} | {
"account_age_days": 1022,
"account_id": "ACCT-F9279C81A155",
"baseline_risk_score": 0.264,
"kyc_tier": "tier_2",
"session_entropy": 0.941
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 336,
"timestamp": "2026-01-03T00:38:00Z",
"transaction_amount_usd": 45020.4
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.796,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 504118.66,
"financial_exposure_usd": 792812.72,
"recoverable_pct": 0.332
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108755",
"label": "benign",
"label_confidence": 0.706,
"severity": "high",
"timestamp": "2026-01-07T01:55:00Z",
"trace_id": "1118fc92-1a96-ea44-df52-354c4c4cde98"
} | {
"account_age_days": 393,
"account_id": "ACCT-71160FC7FC68",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.132
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 117,
"timestamp": "2026-01-07T01:55:00Z",
"transaction_amount_usd": 5249.01
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.63,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 1459.55,
"financial_exposure_usd": 3349.71,
"recoverable_pct": 0.776
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104749",
"label": "fraudulent",
"label_confidence": 0.93,
"severity": "low",
"timestamp": "2026-01-04T07:09:00Z",
"trace_id": "fdd3a9c7-ee9f-db87-30ba-1f45c315df16"
} | {
"account_age_days": 430,
"account_id": "ACCT-4DBC291C4BC7",
"baseline_risk_score": 0.223,
"kyc_tier": "tier_1",
"session_entropy": 0.553
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 265,
"timestamp": "2026-01-03T22:01:00Z",
"transaction_amount_usd": 7.15
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.408,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2759796.79,
"financial_exposure_usd": 2797046.37,
"recoverable_pct": 0.761
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107253",
"label": "benign",
"label_confidence": 0.546,
"severity": "low",
"timestamp": "2026-01-06T00:53:00Z",
"trace_id": "1a141a72-ff74-bdb9-00ab-412f7e781fd2"
} | {
"account_age_days": 571,
"account_id": "ACCT-FFD6C7FA8068",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.38
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 1184,
"timestamp": "2026-01-06T00:53:00Z",
"transaction_amount_usd": 7811.98
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.78,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 1740.28,
"financial_exposure_usd": 3679.48,
"recoverable_pct": 0.764
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107346",
"label": "benign",
"label_confidence": 0.509,
"severity": "medium",
"timestamp": "2026-01-06T02:26:00Z",
"trace_id": "6f0801c2-4e6a-c40e-04d6-4eebc105c23d"
} | {
"account_age_days": 161,
"account_id": "ACCT-BF163460D250",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.635
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 356,
"timestamp": "2026-01-05T14:21:00Z",
"transaction_amount_usd": 18.73
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.721,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1583.81,
"financial_exposure_usd": 3419.54,
"recoverable_pct": 0.531
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100940",
"label": "fraudulent",
"label_confidence": 0.809,
"severity": "critical",
"timestamp": "2026-01-01T15:40:00Z",
"trace_id": "988e9651-feeb-10cc-3301-6eb34e0ce7ad"
} | {
"account_age_days": 85,
"account_id": "ACCT-1639F7CA16FC",
"baseline_risk_score": 0.251,
"kyc_tier": "tier_1",
"session_entropy": 0.113
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 207,
"timestamp": "2026-01-01T11:05:00Z",
"transaction_amount_usd": 12.88
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.737,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 761458.65,
"financial_exposure_usd": 813418.36,
"recoverable_pct": 0.525
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.