schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101871",
"label": "fraudulent",
"label_confidence": 0.852,
"severity": "critical",
"timestamp": "2026-01-02T07:11:00Z",
"trace_id": "49504897-e339-1268-af6c-3a002cea5f04"
} | {
"account_age_days": 75,
"account_id": "ACCT-3631E0540A63",
"baseline_risk_score": 0.358,
"kyc_tier": "tier_1",
"session_entropy": 0.806
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 1105,
"timestamp": "2026-01-02T07:11:00Z",
"transaction_amount_usd": 67741.15
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.511,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 3",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 366133.75,
"financial_exposure_usd": 571867.31,
"recoverable_pct": 0.309
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106892",
"label": "benign",
"label_confidence": 0.539,
"severity": "low",
"timestamp": "2026-01-05T18:52:00Z",
"trace_id": "28554418-3513-acee-1db4-cb1829ad5934"
} | {
"account_age_days": 674,
"account_id": "ACCT-E43B30B986AD",
"baseline_risk_score": 0.191,
"kyc_tier": "tier_2",
"session_entropy": 0.72
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 977,
"timestamp": "2026-01-05T18:52:00Z",
"transaction_amount_usd": 7435.03
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.487,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2143.49,
"financial_exposure_usd": 3612.47,
"recoverable_pct": 0.951
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109915",
"label": "benign",
"label_confidence": 0.744,
"severity": "high",
"timestamp": "2026-01-07T21:15:00Z",
"trace_id": "cad5cc08-aaa1-a9e6-b736-15e7a0df756a"
} | {
"account_age_days": 658,
"account_id": "ACCT-BC92064BE220",
"baseline_risk_score": 0.087,
"kyc_tier": "tier_3",
"session_entropy": 0.121
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 316,
"timestamp": "2026-01-07T21:15:00Z",
"transaction_amount_usd": 4156.38
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.653,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 239.62,
"financial_exposure_usd": 547.63,
"recoverable_pct": 0.54
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109838",
"label": "benign",
"label_confidence": 0.504,
"severity": "low",
"timestamp": "2026-01-07T19:58:00Z",
"trace_id": "9a25d3f9-90c1-b0ff-8926-e1075b6ded85"
} | {
"account_age_days": 750,
"account_id": "ACCT-2737F421E100",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.249
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 110,
"timestamp": "2026-01-07T13:44:00Z",
"transaction_amount_usd": 1.74
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.697,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1659.45,
"financial_exposure_usd": 1861.66,
"recoverable_pct": 0.612
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106691",
"label": "benign",
"label_confidence": 0.744,
"severity": "low",
"timestamp": "2026-01-05T15:31:00Z",
"trace_id": "abd044d9-2c13-f6ec-f880-cf74a39cc4eb"
} | {
"account_age_days": 1513,
"account_id": "ACCT-DF7B1FE27CC8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.695
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 121,
"timestamp": "2026-01-05T14:54:00Z",
"transaction_amount_usd": 8.06
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.562,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1367.5,
"financial_exposure_usd": 1556.65,
"recoverable_pct": 0.878
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108431",
"label": "benign",
"label_confidence": 0.549,
"severity": "high",
"timestamp": "2026-01-06T20:31:00Z",
"trace_id": "1948767d-b2f6-ab7b-aeb5-2eef2a16d3aa"
} | {
"account_age_days": 794,
"account_id": "ACCT-E2EDF3081E0F",
"baseline_risk_score": 0.141,
"kyc_tier": "tier_2",
"session_entropy": 0.623
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 239,
"timestamp": "2026-01-06T20:31:00Z",
"transaction_amount_usd": 13809.81
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.554,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 124.3,
"financial_exposure_usd": 289.55,
"recoverable_pct": 0.827
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109969",
"label": "benign",
"label_confidence": 0.51,
"severity": "low",
"timestamp": "2026-01-07T22:09:00Z",
"trace_id": "02b7567c-5182-fe23-4473-ae53fca678f8"
} | {
"account_age_days": 1172,
"account_id": "ACCT-C285AAAE6A18",
"baseline_risk_score": 0.141,
"kyc_tier": "tier_3",
"session_entropy": 0.332
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 733,
"timestamp": "2026-01-07T22:09:00Z",
"transaction_amount_usd": 10772.58
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.527,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 601,
"financial_exposure_usd": 1027.67,
"recoverable_pct": 0.558
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109985",
"label": "benign",
"label_confidence": 0.509,
"severity": "critical",
"timestamp": "2026-01-07T22:25:00Z",
"trace_id": "02463729-ee3c-964e-f965-2cbd2a5eb247"
} | {
"account_age_days": 134,
"account_id": "ACCT-C358F6619C11",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.657
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 447,
"timestamp": "2026-01-07T22:25:00Z",
"transaction_amount_usd": 11963.6
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.677,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3797.81,
"financial_exposure_usd": 7135.61,
"recoverable_pct": 0.64
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104923",
"label": "fraudulent",
"label_confidence": 0.628,
"severity": "critical",
"timestamp": "2026-01-04T10:03:00Z",
"trace_id": "b9fc1216-3469-c121-3e45-b7c1cff70054"
} | {
"account_age_days": 1573,
"account_id": "ACCT-B1D097806FAE",
"baseline_risk_score": 0.354,
"kyc_tier": "tier_3",
"session_entropy": 0.169
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 81,
"timestamp": "2026-01-04T10:03:00Z",
"transaction_amount_usd": 1943072.06
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.835,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 5515716.23,
"financial_exposure_usd": 7616409.5,
"recoverable_pct": 0.602
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109155",
"label": "benign",
"label_confidence": 0.615,
"severity": "medium",
"timestamp": "2026-01-07T08:35:00Z",
"trace_id": "33524d6e-a3e1-e338-d9e5-10f68493cec0"
} | {
"account_age_days": 1049,
"account_id": "ACCT-07C96BD272C7",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.88
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 1137,
"timestamp": "2026-01-07T08:35:00Z",
"transaction_amount_usd": 7576.29
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.568,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3407.68,
"financial_exposure_usd": 3585.71,
"recoverable_pct": 0.745
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101550",
"label": "fraudulent",
"label_confidence": 0.929,
"severity": "critical",
"timestamp": "2026-01-02T01:50:00Z",
"trace_id": "07648c76-8cd4-2396-75c4-4e7f7b25bca0"
} | {
"account_age_days": 1884,
"account_id": "ACCT-472503B6D392",
"baseline_risk_score": 0.3,
"kyc_tier": "tier_3",
"session_entropy": 0.6
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CA",
"latency_ms": 303,
"timestamp": "2026-01-02T01:50:00Z",
"transaction_amount_usd": 22740.79
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.479,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 78499.06,
"financial_exposure_usd": 184781.01,
"recoverable_pct": 0.143
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109507",
"label": "benign",
"label_confidence": 0.481,
"severity": "low",
"timestamp": "2026-01-07T14:27:00Z",
"trace_id": "0ffcdf53-60ae-c9b8-77eb-9dee9a2940d5"
} | {
"account_age_days": 1544,
"account_id": "ACCT-8EFFA559C64F",
"baseline_risk_score": 0.152,
"kyc_tier": "tier_3",
"session_entropy": 0.708
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 1050,
"timestamp": "2026-01-07T14:27:00Z",
"transaction_amount_usd": 814.21
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.627,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3425.19,
"financial_exposure_usd": 4263.79,
"recoverable_pct": 0.44
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107470",
"label": "benign",
"label_confidence": 0.65,
"severity": "medium",
"timestamp": "2026-01-06T04:30:00Z",
"trace_id": "863914f3-28dc-1c68-5edc-a4e81b3bc93f"
} | {
"account_age_days": 1646,
"account_id": "ACCT-617B6CDF1AA3",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.905
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 1107,
"timestamp": "2026-01-06T04:30:00Z",
"transaction_amount_usd": 2939.23
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.737,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 627.87,
"financial_exposure_usd": 682.11,
"recoverable_pct": 0.862
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100676",
"label": "fraudulent",
"label_confidence": 0.909,
"severity": "high",
"timestamp": "2026-01-01T11:16:00Z",
"trace_id": "01bab5f5-56e0-7c4e-4e37-230601c518d0"
} | {
"account_age_days": 1426,
"account_id": "ACCT-122A223F8241",
"baseline_risk_score": 0.415,
"kyc_tier": "tier_1",
"session_entropy": 0.103
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 226,
"timestamp": "2025-12-31T23:18:00Z",
"transaction_amount_usd": 16.36
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.703,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 170132.45,
"financial_exposure_usd": 247119.15,
"recoverable_pct": 0.063
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106298",
"label": "fraudulent",
"label_confidence": 0.729,
"severity": "critical",
"timestamp": "2026-01-05T08:58:00Z",
"trace_id": "4cc9c369-8778-f1e5-a71b-85b8b9bdfa88"
} | {
"account_age_days": 1802,
"account_id": "ACCT-C5A70C580087",
"baseline_risk_score": 0.404,
"kyc_tier": "tier_2",
"session_entropy": 0.503
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 132,
"timestamp": "2026-01-05T08:58:00Z",
"transaction_amount_usd": 982573.97
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.53,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 1975516.42,
"financial_exposure_usd": 2597859.76,
"recoverable_pct": 0.727
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100298",
"label": "fraudulent",
"label_confidence": 0.787,
"severity": "high",
"timestamp": "2026-01-01T04:58:00Z",
"trace_id": "cf97b941-af62-a976-520c-7748addb47c3"
} | {
"account_age_days": 1817,
"account_id": "ACCT-047D4BC72753",
"baseline_risk_score": 0.568,
"kyc_tier": "tier_2",
"session_entropy": 0.456
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "SG",
"latency_ms": 83,
"timestamp": "2026-01-01T04:58:00Z",
"transaction_amount_usd": 77702.85
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.676,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 827829.23,
"financial_exposure_usd": 934647.55,
"recoverable_pct": 0.114
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100201",
"label": "fraudulent",
"label_confidence": 0.913,
"severity": "critical",
"timestamp": "2026-01-01T03:21:00Z",
"trace_id": "fc31654d-f6ae-7936-0071-4e0f2b23ace0"
} | {
"account_age_days": 1361,
"account_id": "ACCT-D907BA3F1949",
"baseline_risk_score": 0.614,
"kyc_tier": "tier_3",
"session_entropy": 0.542
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 368,
"timestamp": "2025-12-31T17:34:00Z",
"transaction_amount_usd": 20
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.897,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 9",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 483662.55,
"financial_exposure_usd": 566247.43,
"recoverable_pct": 0.547
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100542",
"label": "fraudulent",
"label_confidence": 0.928,
"severity": "critical",
"timestamp": "2026-01-01T09:02:00Z",
"trace_id": "25b0326c-ff93-5d77-8583-734d98feadc1"
} | {
"account_age_days": 1485,
"account_id": "ACCT-9490C1A401C4",
"baseline_risk_score": 0.323,
"kyc_tier": "tier_1",
"session_entropy": 0.559
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 85,
"timestamp": "2026-01-01T09:02:00Z",
"transaction_amount_usd": 118394.65
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.9,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 321236.79,
"financial_exposure_usd": 498537.27,
"recoverable_pct": 0.515
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100272",
"label": "fraudulent",
"label_confidence": 0.931,
"severity": "high",
"timestamp": "2026-01-01T04:32:00Z",
"trace_id": "857ea116-29a8-f004-7314-6dae97a70f9d"
} | {
"account_age_days": 1130,
"account_id": "ACCT-C04675C7C875",
"baseline_risk_score": 0.552,
"kyc_tier": "tier_3",
"session_entropy": 0.751
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 335,
"timestamp": "2025-12-31T23:30:00Z",
"transaction_amount_usd": 24.63
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.467,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 276698.39,
"financial_exposure_usd": 428856.23,
"recoverable_pct": 0.835
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107917",
"label": "benign",
"label_confidence": 0.526,
"severity": "low",
"timestamp": "2026-01-06T11:57:00Z",
"trace_id": "52186e32-5609-9327-6c86-1ae33b2bc236"
} | {
"account_age_days": 1603,
"account_id": "ACCT-7A0A889919CE",
"baseline_risk_score": 0.118,
"kyc_tier": "tier_1",
"session_entropy": 0.903
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 262,
"timestamp": "2026-01-06T03:10:00Z",
"transaction_amount_usd": 11.91
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.554,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1268.98,
"financial_exposure_usd": 1904.62,
"recoverable_pct": 0.659
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103122",
"label": "fraudulent",
"label_confidence": 0.791,
"severity": "high",
"timestamp": "2026-01-03T04:02:00Z",
"trace_id": "c13a5554-cfc9-039f-1d86-4605a275a002"
} | {
"account_age_days": 1759,
"account_id": "ACCT-5A08985E2BA7",
"baseline_risk_score": 0.361,
"kyc_tier": "tier_3",
"session_entropy": 0.405
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 837,
"timestamp": "2026-01-03T04:02:00Z",
"transaction_amount_usd": 63546.5
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.819,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 87404.77,
"financial_exposure_usd": 139902.78,
"recoverable_pct": 0.142
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103625",
"label": "fraudulent",
"label_confidence": 0.827,
"severity": "critical",
"timestamp": "2026-01-03T12:25:00Z",
"trace_id": "256fe80e-09dc-8ba0-1502-d44df1e7d309"
} | {
"account_age_days": 1173,
"account_id": "ACCT-38BC17568C91",
"baseline_risk_score": 0.151,
"kyc_tier": "tier_3",
"session_entropy": 0.691
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 127,
"timestamp": "2026-01-03T12:25:00Z",
"transaction_amount_usd": 1069716.11
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.857,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1313293.34,
"financial_exposure_usd": 1794785.15,
"recoverable_pct": 0.796
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105306",
"label": "fraudulent",
"label_confidence": 0.821,
"severity": "medium",
"timestamp": "2026-01-04T16:26:00Z",
"trace_id": "a294c5b9-dead-c199-277c-94ea97637091"
} | {
"account_age_days": 637,
"account_id": "ACCT-97FEA976029F",
"baseline_risk_score": 0.374,
"kyc_tier": "tier_3",
"session_entropy": 0.586
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 925,
"timestamp": "2026-01-04T16:26:00Z",
"transaction_amount_usd": 2268782.65
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.45,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 5031568.96,
"financial_exposure_usd": 5604774.88,
"recoverable_pct": 0.937
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106445",
"label": "fraudulent",
"label_confidence": 0.717,
"severity": "critical",
"timestamp": "2026-01-05T11:25:00Z",
"trace_id": "aea3e7fb-4e34-c549-0a5b-668fd2ac1381"
} | {
"account_age_days": 1466,
"account_id": "ACCT-A8184AC94189",
"baseline_risk_score": 0.391,
"kyc_tier": "tier_1",
"session_entropy": 0.48
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 219,
"timestamp": "2026-01-05T01:26:00Z",
"transaction_amount_usd": 1.63
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.939,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 5051917.89,
"financial_exposure_usd": 5129040.31,
"recoverable_pct": 0.635
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103135",
"label": "fraudulent",
"label_confidence": 0.905,
"severity": "high",
"timestamp": "2026-01-03T04:15:00Z",
"trace_id": "0bce4163-490a-4e42-22bc-ad75f1a24b21"
} | {
"account_age_days": 730,
"account_id": "ACCT-CDE0C2AAE9BC",
"baseline_risk_score": 0.532,
"kyc_tier": "tier_3",
"session_entropy": 0.943
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CA",
"latency_ms": 307,
"timestamp": "2026-01-03T04:15:00Z",
"transaction_amount_usd": 102983.69
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.648,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 611793.45,
"financial_exposure_usd": 1296838.16,
"recoverable_pct": 0.481
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106343",
"label": "fraudulent",
"label_confidence": 0.813,
"severity": "medium",
"timestamp": "2026-01-05T09:43:00Z",
"trace_id": "47b843b7-487f-d75f-68f8-a7e10014513e"
} | {
"account_age_days": 1819,
"account_id": "ACCT-5412E992B95D",
"baseline_risk_score": 0.075,
"kyc_tier": "tier_2",
"session_entropy": 0.762
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 767,
"timestamp": "2026-01-05T09:43:00Z",
"transaction_amount_usd": 651262.67
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.405,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1421874.61,
"financial_exposure_usd": 3305305.3,
"recoverable_pct": 0.544
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100464",
"label": "fraudulent",
"label_confidence": 0.906,
"severity": "medium",
"timestamp": "2026-01-01T07:44:00Z",
"trace_id": "0ee7305e-4904-f586-d3b6-f12e78a6d44a"
} | {
"account_age_days": 342,
"account_id": "ACCT-4206B9BEBDF3",
"baseline_risk_score": 0.403,
"kyc_tier": "tier_1",
"session_entropy": 0.669
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 274,
"timestamp": "2026-01-01T02:18:00Z",
"transaction_amount_usd": 18.3
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.4,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 702666.63,
"financial_exposure_usd": 1502055.16,
"recoverable_pct": 0.662
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104133",
"label": "fraudulent",
"label_confidence": 0.636,
"severity": "high",
"timestamp": "2026-01-03T20:53:00Z",
"trace_id": "914a79c1-b050-e9b0-ea86-4e777000d836"
} | {
"account_age_days": 340,
"account_id": "ACCT-AD38A30C85B1",
"baseline_risk_score": 0.368,
"kyc_tier": "tier_2",
"session_entropy": 0.198
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 365,
"timestamp": "2026-01-03T20:53:00Z",
"transaction_amount_usd": 942671.1
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.863,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4556102.16,
"financial_exposure_usd": 5737354.01,
"recoverable_pct": 0.493
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107237",
"label": "benign",
"label_confidence": 0.566,
"severity": "medium",
"timestamp": "2026-01-06T00:37:00Z",
"trace_id": "346e06ce-da90-d39c-20f1-9bb66407e7c1"
} | {
"account_age_days": 366,
"account_id": "ACCT-E4AEABDB382E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.629
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 567,
"timestamp": "2026-01-06T00:37:00Z",
"transaction_amount_usd": 8487.01
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.598,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3072.09,
"financial_exposure_usd": 4228.03,
"recoverable_pct": 0.709
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106516",
"label": "fraudulent",
"label_confidence": 0.797,
"severity": "medium",
"timestamp": "2026-01-05T12:36:00Z",
"trace_id": "3656d8f7-4bbc-cdee-cdb2-3344d615dc7e"
} | {
"account_age_days": 1193,
"account_id": "ACCT-C91EEC1682A7",
"baseline_risk_score": 0.092,
"kyc_tier": "tier_2",
"session_entropy": 0.476
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 1086,
"timestamp": "2026-01-05T12:36:00Z",
"transaction_amount_usd": 1618022.61
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.402,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 6099539.29,
"financial_exposure_usd": 6493801.5,
"recoverable_pct": 0.79
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101720",
"label": "fraudulent",
"label_confidence": 0.775,
"severity": "medium",
"timestamp": "2026-01-02T04:40:00Z",
"trace_id": "757a3e24-dc51-4db5-df17-84cec2954026"
} | {
"account_age_days": 168,
"account_id": "ACCT-FA1AB1976F17",
"baseline_risk_score": 0.435,
"kyc_tier": "tier_3",
"session_entropy": 0.691
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 344,
"timestamp": "2026-01-01T20:25:00Z",
"transaction_amount_usd": 4.09
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.635,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 195669.79,
"financial_exposure_usd": 441416.48,
"recoverable_pct": 0.445
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100181",
"label": "fraudulent",
"label_confidence": 0.762,
"severity": "critical",
"timestamp": "2026-01-01T03:01:00Z",
"trace_id": "6cfb6acc-2e0c-5488-a76f-7d3c62522f26"
} | {
"account_age_days": 1385,
"account_id": "ACCT-40987D5C5E8A",
"baseline_risk_score": 0.434,
"kyc_tier": "tier_2",
"session_entropy": 0.462
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 171,
"timestamp": "2026-01-01T00:00:00Z",
"transaction_amount_usd": 0.87
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.676,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 597796.5,
"financial_exposure_usd": 1037942.4,
"recoverable_pct": 0.355
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104219",
"label": "fraudulent",
"label_confidence": 0.878,
"severity": "high",
"timestamp": "2026-01-03T22:19:00Z",
"trace_id": "c83bc73f-ba73-89c3-8145-fede2c1b4a8a"
} | {
"account_age_days": 150,
"account_id": "ACCT-D8FC881E6043",
"baseline_risk_score": 0.282,
"kyc_tier": "tier_2",
"session_entropy": 0.326
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 954,
"timestamp": "2026-01-03T22:19:00Z",
"transaction_amount_usd": 2375548.74
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.497,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1939740.14,
"financial_exposure_usd": 2978578.97,
"recoverable_pct": 0.869
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107724",
"label": "benign",
"label_confidence": 0.5,
"severity": "high",
"timestamp": "2026-01-06T08:44:00Z",
"trace_id": "a20ee25f-57b9-794b-84ba-7afcb781a593"
} | {
"account_age_days": 1193,
"account_id": "ACCT-7CE74992EEAD",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.219
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 1007,
"timestamp": "2026-01-06T08:44:00Z",
"transaction_amount_usd": 14089.82
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.676,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2617.42,
"financial_exposure_usd": 2687.87,
"recoverable_pct": 0.562
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102940",
"label": "fraudulent",
"label_confidence": 0.806,
"severity": "high",
"timestamp": "2026-01-03T01:00:00Z",
"trace_id": "64e3f5fc-24e8-26ce-55c2-d628121ccedc"
} | {
"account_age_days": 1125,
"account_id": "ACCT-DD8CBE0C013D",
"baseline_risk_score": 0.356,
"kyc_tier": "tier_2",
"session_entropy": 0.317
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 925,
"timestamp": "2026-01-03T01:00:00Z",
"transaction_amount_usd": 87361.17
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.812,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 902683.53,
"financial_exposure_usd": 943761.87,
"recoverable_pct": 0.496
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100073",
"label": "fraudulent",
"label_confidence": 0.794,
"severity": "critical",
"timestamp": "2026-01-01T01:13:00Z",
"trace_id": "85695f97-180d-c855-c55f-fde8bc3e1d19"
} | {
"account_age_days": 1843,
"account_id": "ACCT-B972393A5BB0",
"baseline_risk_score": 0.425,
"kyc_tier": "tier_1",
"session_entropy": 0.215
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 404,
"timestamp": "2026-01-01T01:13:00Z",
"transaction_amount_usd": 57002.65
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.774,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 744121.67,
"financial_exposure_usd": 1025468.85,
"recoverable_pct": 0.417
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108912",
"label": "benign",
"label_confidence": 0.714,
"severity": "critical",
"timestamp": "2026-01-07T04:32:00Z",
"trace_id": "1f8a5a37-9a3b-fc58-b9b0-298dd2ee981a"
} | {
"account_age_days": 1733,
"account_id": "ACCT-A82DADA068A0",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.802
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 817,
"timestamp": "2026-01-07T04:32:00Z",
"transaction_amount_usd": 1684.08
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.79,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 968.45,
"financial_exposure_usd": 1879.65,
"recoverable_pct": 0.587
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108455",
"label": "benign",
"label_confidence": 0.601,
"severity": "low",
"timestamp": "2026-01-06T20:55:00Z",
"trace_id": "301a55c4-0c1a-a6ca-5e51-2dbe7839a83b"
} | {
"account_age_days": 1214,
"account_id": "ACCT-5358B9760A81",
"baseline_risk_score": 0.148,
"kyc_tier": "tier_3",
"session_entropy": 0.258
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 240,
"timestamp": "2026-01-06T13:37:00Z",
"transaction_amount_usd": 21.36
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.663,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3793,
"financial_exposure_usd": 4041.07,
"recoverable_pct": 0.601
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109104",
"label": "benign",
"label_confidence": 0.601,
"severity": "low",
"timestamp": "2026-01-07T07:44:00Z",
"trace_id": "645472a6-7959-dee3-5bf7-a3baaaaa0ad3"
} | {
"account_age_days": 1188,
"account_id": "ACCT-DF2AA14D1E26",
"baseline_risk_score": 0.115,
"kyc_tier": "tier_3",
"session_entropy": 0.677
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 296,
"timestamp": "2026-01-07T07:44:00Z",
"transaction_amount_usd": 1652.55
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.746,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2035.75,
"financial_exposure_usd": 3617.08,
"recoverable_pct": 0.54
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105926",
"label": "fraudulent",
"label_confidence": 0.661,
"severity": "medium",
"timestamp": "2026-01-05T02:46:00Z",
"trace_id": "e69ae313-d757-ff80-1662-d30d1965a3a4"
} | {
"account_age_days": 1744,
"account_id": "ACCT-5FCF0A8E87DD",
"baseline_risk_score": 0.249,
"kyc_tier": "tier_2",
"session_entropy": 0.815
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 752,
"timestamp": "2026-01-05T02:46:00Z",
"transaction_amount_usd": 2526918.85
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.377,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3187638.7,
"financial_exposure_usd": 5384685.42,
"recoverable_pct": 0.772
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100455",
"label": "fraudulent",
"label_confidence": 0.912,
"severity": "critical",
"timestamp": "2026-01-01T07:35:00Z",
"trace_id": "2b824325-b17b-f67b-d483-c35369b21ef3"
} | {
"account_age_days": 171,
"account_id": "ACCT-66E0AFCD2D5A",
"baseline_risk_score": 0.435,
"kyc_tier": "tier_2",
"session_entropy": 0.134
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 89,
"timestamp": "2025-12-31T21:55:00Z",
"transaction_amount_usd": 8.97
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.669,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 998172.7,
"financial_exposure_usd": 1016860.64,
"recoverable_pct": 0.017
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108703",
"label": "benign",
"label_confidence": 0.718,
"severity": "high",
"timestamp": "2026-01-07T01:03:00Z",
"trace_id": "77f081f3-e9f2-2098-f5e1-0327c11619f2"
} | {
"account_age_days": 712,
"account_id": "ACCT-EC65347E8A29",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.369
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 521,
"timestamp": "2026-01-07T01:03:00Z",
"transaction_amount_usd": 13345.27
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.475,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3385.11,
"financial_exposure_usd": 6468.75,
"recoverable_pct": 0.992
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107651",
"label": "benign",
"label_confidence": 0.484,
"severity": "medium",
"timestamp": "2026-01-06T07:31:00Z",
"trace_id": "bc545453-470c-db88-49f0-e8f810b5f751"
} | {
"account_age_days": 908,
"account_id": "ACCT-E1620853C077",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.479
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 146,
"timestamp": "2026-01-05T21:15:00Z",
"transaction_amount_usd": 19.82
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.743,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1071.85,
"financial_exposure_usd": 1261.29,
"recoverable_pct": 0.902
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104404",
"label": "fraudulent",
"label_confidence": 0.765,
"severity": "high",
"timestamp": "2026-01-04T01:24:00Z",
"trace_id": "06827f54-bb9c-9f91-f68b-741673427e7a"
} | {
"account_age_days": 1188,
"account_id": "ACCT-A02895CDF266",
"baseline_risk_score": 0.082,
"kyc_tier": "tier_3",
"session_entropy": 0.935
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 588,
"timestamp": "2026-01-04T01:24:00Z",
"transaction_amount_usd": 60704.34
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.38,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 5187613.67,
"financial_exposure_usd": 8538683.79,
"recoverable_pct": 0.68
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108326",
"label": "benign",
"label_confidence": 0.709,
"severity": "low",
"timestamp": "2026-01-06T18:46:00Z",
"trace_id": "0252dac4-988a-079b-fe5a-2894e46dad01"
} | {
"account_age_days": 1950,
"account_id": "ACCT-9FC02750C84A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.276
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 108,
"timestamp": "2026-01-06T18:46:00Z",
"transaction_amount_usd": 7246.04
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.491,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1973.77,
"financial_exposure_usd": 2552.75,
"recoverable_pct": 0.816
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102358",
"label": "fraudulent",
"label_confidence": 0.9,
"severity": "high",
"timestamp": "2026-01-02T15:18:00Z",
"trace_id": "fc60cf87-fd36-58bd-5c5d-8803be78b540"
} | {
"account_age_days": 494,
"account_id": "ACCT-DEF7ED972B11",
"baseline_risk_score": 0.574,
"kyc_tier": "tier_1",
"session_entropy": 0.284
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 85,
"timestamp": "2026-01-02T15:18:00Z",
"transaction_amount_usd": 11432.42
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.902,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 436581.61,
"financial_exposure_usd": 443529.01,
"recoverable_pct": 0.746
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108533",
"label": "benign",
"label_confidence": 0.513,
"severity": "low",
"timestamp": "2026-01-06T22:13:00Z",
"trace_id": "df8a410d-b256-a9c7-a5a4-d6e7cbb1dc5a"
} | {
"account_age_days": 591,
"account_id": "ACCT-3C571AB48E4D",
"baseline_risk_score": 0.061,
"kyc_tier": "tier_2",
"session_entropy": 0.71
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 1069,
"timestamp": "2026-01-06T22:13:00Z",
"transaction_amount_usd": 2033.2
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.638,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1066.1,
"financial_exposure_usd": 1157.43,
"recoverable_pct": 0.654
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101329",
"label": "fraudulent",
"label_confidence": 0.958,
"severity": "low",
"timestamp": "2026-01-01T22:09:00Z",
"trace_id": "b14c1706-c55f-da78-eac0-4a140c15a8ef"
} | {
"account_age_days": 1374,
"account_id": "ACCT-BE27D793F67E",
"baseline_risk_score": 0.561,
"kyc_tier": "tier_3",
"session_entropy": 0.535
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "FR",
"latency_ms": 1142,
"timestamp": "2026-01-01T22:09:00Z",
"transaction_amount_usd": 35431.85
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.485,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 330609.64,
"financial_exposure_usd": 564579.96,
"recoverable_pct": 0.606
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100039",
"label": "fraudulent",
"label_confidence": 0.795,
"severity": "critical",
"timestamp": "2026-01-01T00:39:00Z",
"trace_id": "c0986750-4741-9b48-34ae-4abd36fce0ac"
} | {
"account_age_days": 840,
"account_id": "ACCT-816462CB8FC3",
"baseline_risk_score": 0.444,
"kyc_tier": "tier_3",
"session_entropy": 0.655
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 1017,
"timestamp": "2026-01-01T00:39:00Z",
"transaction_amount_usd": 96040.53
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.599,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 292916.69,
"financial_exposure_usd": 422545.25,
"recoverable_pct": 0.07
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107671",
"label": "benign",
"label_confidence": 0.571,
"severity": "medium",
"timestamp": "2026-01-06T07:51:00Z",
"trace_id": "1f0e84e0-2fab-45dc-b5bd-4cdbdd5e3ca1"
} | {
"account_age_days": 1008,
"account_id": "ACCT-1A5B999DCB69",
"baseline_risk_score": 0.138,
"kyc_tier": "tier_3",
"session_entropy": 0.76
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 676,
"timestamp": "2026-01-06T07:51:00Z",
"transaction_amount_usd": 3562.95
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.547,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3324.04,
"financial_exposure_usd": 8214.13,
"recoverable_pct": 0.465
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108881",
"label": "benign",
"label_confidence": 0.454,
"severity": "medium",
"timestamp": "2026-01-07T04:01:00Z",
"trace_id": "02786ec2-49ef-4694-a48d-36badf1b1253"
} | {
"account_age_days": 1414,
"account_id": "ACCT-58709BE84FA5",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.679
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 867,
"timestamp": "2026-01-07T04:01:00Z",
"transaction_amount_usd": 3342.7
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.679,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 904.36,
"financial_exposure_usd": 1029.99,
"recoverable_pct": 0.537
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104378",
"label": "fraudulent",
"label_confidence": 0.679,
"severity": "medium",
"timestamp": "2026-01-04T00:58:00Z",
"trace_id": "06b6d4bb-e03a-4795-29c0-21f6880995cb"
} | {
"account_age_days": 1980,
"account_id": "ACCT-4C4FC93E9192",
"baseline_risk_score": 0.257,
"kyc_tier": "tier_2",
"session_entropy": 0.858
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 397,
"timestamp": "2026-01-04T00:58:00Z",
"transaction_amount_usd": 235136.64
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.875,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1827985.64,
"financial_exposure_usd": 2453660.7,
"recoverable_pct": 0.472
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106149",
"label": "fraudulent",
"label_confidence": 0.668,
"severity": "low",
"timestamp": "2026-01-05T06:29:00Z",
"trace_id": "e9a5dd19-3ebd-6b31-1264-7e75a50792dc"
} | {
"account_age_days": 1137,
"account_id": "ACCT-9329A2F91C0A",
"baseline_risk_score": 0.203,
"kyc_tier": "tier_3",
"session_entropy": 0.797
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 1174,
"timestamp": "2026-01-05T06:29:00Z",
"transaction_amount_usd": 368183.43
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.443,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3825068.11,
"financial_exposure_usd": 3886346.04,
"recoverable_pct": 0.533
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106928",
"label": "benign",
"label_confidence": 0.602,
"severity": "low",
"timestamp": "2026-01-05T19:28:00Z",
"trace_id": "a1869112-2781-42e0-93a3-7c39bffc9673"
} | {
"account_age_days": 289,
"account_id": "ACCT-038E019D25AA",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.482
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 460,
"timestamp": "2026-01-05T19:28:00Z",
"transaction_amount_usd": 8621.12
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.75,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 2220.51,
"financial_exposure_usd": 2999.61,
"recoverable_pct": 0.928
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101227",
"label": "fraudulent",
"label_confidence": 0.964,
"severity": "high",
"timestamp": "2026-01-01T20:27:00Z",
"trace_id": "b243fc45-fd92-3a76-4e74-df8946ca0888"
} | {
"account_age_days": 1775,
"account_id": "ACCT-737765962EAD",
"baseline_risk_score": 0.605,
"kyc_tier": "tier_3",
"session_entropy": 0.193
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 963,
"timestamp": "2026-01-01T20:27:00Z",
"transaction_amount_usd": 86720.13
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.817,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 418969.36,
"financial_exposure_usd": 1030299.29,
"recoverable_pct": 0.438
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102635",
"label": "fraudulent",
"label_confidence": 0.863,
"severity": "low",
"timestamp": "2026-01-02T19:55:00Z",
"trace_id": "3e8342f1-2270-3b57-d81e-750b84e16829"
} | {
"account_age_days": 1746,
"account_id": "ACCT-4370FFA91C38",
"baseline_risk_score": 0.568,
"kyc_tier": "tier_2",
"session_entropy": 0.783
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "MY",
"latency_ms": 717,
"timestamp": "2026-01-02T19:55:00Z",
"transaction_amount_usd": 113133.27
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.779,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 267343.45,
"financial_exposure_usd": 311669.01,
"recoverable_pct": 0.608
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103532",
"label": "fraudulent",
"label_confidence": 0.863,
"severity": "critical",
"timestamp": "2026-01-03T10:52:00Z",
"trace_id": "4ce0058e-bf91-2ca0-2b3e-f550eea71d9d"
} | {
"account_age_days": 1960,
"account_id": "ACCT-50CD3482495E",
"baseline_risk_score": 0.059,
"kyc_tier": "tier_1",
"session_entropy": 0.142
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 154,
"timestamp": "2026-01-03T09:47:00Z",
"transaction_amount_usd": 3.52
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.834,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 956455.5,
"financial_exposure_usd": 2093161.96,
"recoverable_pct": 0.848
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101039",
"label": "fraudulent",
"label_confidence": 0.832,
"severity": "critical",
"timestamp": "2026-01-01T17:19:00Z",
"trace_id": "a69bb8e7-e3bd-1c68-71b4-5b12cce8c333"
} | {
"account_age_days": 1405,
"account_id": "ACCT-B7D431463703",
"baseline_risk_score": 0.308,
"kyc_tier": "tier_3",
"session_entropy": 0.936
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 958,
"timestamp": "2026-01-01T17:19:00Z",
"transaction_amount_usd": 48670.71
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.705,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 636273.44,
"financial_exposure_usd": 976093.95,
"recoverable_pct": 0.357
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104480",
"label": "fraudulent",
"label_confidence": 0.785,
"severity": "high",
"timestamp": "2026-01-04T02:40:00Z",
"trace_id": "e7c56bd9-7973-2f1d-45bf-202b3d5531af"
} | {
"account_age_days": 997,
"account_id": "ACCT-BBC0F63EBB6E",
"baseline_risk_score": 0.222,
"kyc_tier": "tier_2",
"session_entropy": 0.66
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 648,
"timestamp": "2026-01-04T02:40:00Z",
"transaction_amount_usd": 1963822.13
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.904,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4321241.36,
"financial_exposure_usd": 4609282.84,
"recoverable_pct": 0.914
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109132",
"label": "benign",
"label_confidence": 0.64,
"severity": "low",
"timestamp": "2026-01-07T08:12:00Z",
"trace_id": "b053dc49-156d-8000-b1c1-b0f32e7f1d9c"
} | {
"account_age_days": 648,
"account_id": "ACCT-409F1B19EC87",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.469
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 1034,
"timestamp": "2026-01-07T08:12:00Z",
"transaction_amount_usd": 9125.45
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.467,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2054.17,
"financial_exposure_usd": 2245.37,
"recoverable_pct": 0.595
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108373",
"label": "benign",
"label_confidence": 0.486,
"severity": "low",
"timestamp": "2026-01-06T19:33:00Z",
"trace_id": "42b25694-59bf-16b7-66f0-676206635063"
} | {
"account_age_days": 721,
"account_id": "ACCT-07FE9851A34B",
"baseline_risk_score": 0.185,
"kyc_tier": "tier_3",
"session_entropy": 0.86
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 1143,
"timestamp": "2026-01-06T19:33:00Z",
"transaction_amount_usd": 3552.92
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.611,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 829.36,
"financial_exposure_usd": 1085.95,
"recoverable_pct": 0.613
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107685",
"label": "benign",
"label_confidence": 0.683,
"severity": "high",
"timestamp": "2026-01-06T08:05:00Z",
"trace_id": "c91e52ea-31b2-06b9-f310-8ea9c0bc543d"
} | {
"account_age_days": 24,
"account_id": "ACCT-EA697E30393E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.364
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 1019,
"timestamp": "2026-01-06T08:05:00Z",
"transaction_amount_usd": 8125.64
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.617,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 4790.32,
"financial_exposure_usd": 4796.18,
"recoverable_pct": 0.951
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106422",
"label": "fraudulent",
"label_confidence": 0.78,
"severity": "medium",
"timestamp": "2026-01-05T11:02:00Z",
"trace_id": "ba0b14a1-5488-4997-15e4-9c38b20964b0"
} | {
"account_age_days": 71,
"account_id": "ACCT-51F92C23283F",
"baseline_risk_score": 0.269,
"kyc_tier": "tier_3",
"session_entropy": 0.168
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 193,
"timestamp": "2026-01-04T23:45:00Z",
"transaction_amount_usd": 17.18
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.91,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 1650613.43,
"financial_exposure_usd": 3014706.33,
"recoverable_pct": 0.806
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109712",
"label": "benign",
"label_confidence": 0.522,
"severity": "high",
"timestamp": "2026-01-07T17:52:00Z",
"trace_id": "24d7d35d-b37e-e3b0-d38d-bda63025c4fd"
} | {
"account_age_days": 794,
"account_id": "ACCT-61C447F02400",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.434
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 223,
"timestamp": "2026-01-07T09:39:00Z",
"transaction_amount_usd": 1.53
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.462,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1102.58,
"financial_exposure_usd": 2075.93,
"recoverable_pct": 0.957
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106201",
"label": "fraudulent",
"label_confidence": 0.902,
"severity": "high",
"timestamp": "2026-01-05T07:21:00Z",
"trace_id": "f9310348-73c1-eacb-29a4-6838d8adfba8"
} | {
"account_age_days": 1124,
"account_id": "ACCT-D9BB79A58A79",
"baseline_risk_score": 0.141,
"kyc_tier": "tier_3",
"session_entropy": 0.419
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 963,
"timestamp": "2026-01-05T07:21:00Z",
"transaction_amount_usd": 517302.97
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.365,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3592794.15,
"financial_exposure_usd": 5057210.2,
"recoverable_pct": 0.541
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101382",
"label": "fraudulent",
"label_confidence": 0.867,
"severity": "critical",
"timestamp": "2026-01-01T23:02:00Z",
"trace_id": "3b2de727-00ba-3fe2-0d1c-45fe67eef03f"
} | {
"account_age_days": 678,
"account_id": "ACCT-38AF43C74F29",
"baseline_risk_score": 0.3,
"kyc_tier": "tier_2",
"session_entropy": 0.792
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 876,
"timestamp": "2026-01-01T23:02:00Z",
"transaction_amount_usd": 63972.6
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.785,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 325519.9,
"financial_exposure_usd": 421858.04,
"recoverable_pct": 0.698
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106064",
"label": "fraudulent",
"label_confidence": 0.883,
"severity": "high",
"timestamp": "2026-01-05T05:04:00Z",
"trace_id": "a3cf766a-3c59-2a76-2b89-32d6a5f8e33a"
} | {
"account_age_days": 1701,
"account_id": "ACCT-1B844F25DBA5",
"baseline_risk_score": 0.273,
"kyc_tier": "tier_1",
"session_entropy": 0.569
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 707,
"timestamp": "2026-01-05T05:04:00Z",
"transaction_amount_usd": 1209633.17
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.523,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4143595.81,
"financial_exposure_usd": 5702129.96,
"recoverable_pct": 0.858
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100435",
"label": "fraudulent",
"label_confidence": 0.85,
"severity": "medium",
"timestamp": "2026-01-01T07:15:00Z",
"trace_id": "8cb9b57e-279c-def7-8ff6-3d7ed92fcf51"
} | {
"account_age_days": 531,
"account_id": "ACCT-2BFE6EB67AE2",
"baseline_risk_score": 0.62,
"kyc_tier": "tier_2",
"session_entropy": 0.85
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 217,
"timestamp": "2026-01-01T00:49:00Z",
"transaction_amount_usd": 14.13
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.731,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 488616.41,
"financial_exposure_usd": 628204.16,
"recoverable_pct": 0.291
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108784",
"label": "benign",
"label_confidence": 0.711,
"severity": "high",
"timestamp": "2026-01-07T02:24:00Z",
"trace_id": "522de8d8-58c5-378a-0edd-23814b3b614f"
} | {
"account_age_days": 1928,
"account_id": "ACCT-FC9685A8E817",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.275
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 422,
"timestamp": "2026-01-07T02:24:00Z",
"transaction_amount_usd": 900.9
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.666,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1054.8,
"financial_exposure_usd": 1427.38,
"recoverable_pct": 0.573
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104739",
"label": "fraudulent",
"label_confidence": 0.918,
"severity": "medium",
"timestamp": "2026-01-04T06:59:00Z",
"trace_id": "fab768e5-3a44-9747-1424-3456a8a607ce"
} | {
"account_age_days": 1708,
"account_id": "ACCT-EA2231912885",
"baseline_risk_score": 0.075,
"kyc_tier": "tier_2",
"session_entropy": 0.234
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 597,
"timestamp": "2026-01-04T06:59:00Z",
"transaction_amount_usd": 466639.55
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.594,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1098324.33,
"financial_exposure_usd": 2169973.73,
"recoverable_pct": 0.52
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107070",
"label": "benign",
"label_confidence": 0.506,
"severity": "low",
"timestamp": "2026-01-05T21:50:00Z",
"trace_id": "215e9714-2664-1ddc-706e-ab6042a3663a"
} | {
"account_age_days": 1473,
"account_id": "ACCT-0BB6E828804C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.205
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 373,
"timestamp": "2026-01-05T15:59:00Z",
"transaction_amount_usd": 21.65
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.742,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 405.2,
"financial_exposure_usd": 658.56,
"recoverable_pct": 0.685
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101043",
"label": "fraudulent",
"label_confidence": 0.963,
"severity": "high",
"timestamp": "2026-01-01T17:23:00Z",
"trace_id": "f2595fad-b471-44cb-9c3f-8284898563c2"
} | {
"account_age_days": 133,
"account_id": "ACCT-2EC694F6BA19",
"baseline_risk_score": 0.485,
"kyc_tier": "tier_1",
"session_entropy": 0.89
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 914,
"timestamp": "2026-01-01T17:23:00Z",
"transaction_amount_usd": 87577.03
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.822,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 219750.57,
"financial_exposure_usd": 408838.2,
"recoverable_pct": 0.285
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102416",
"label": "fraudulent",
"label_confidence": 0.937,
"severity": "medium",
"timestamp": "2026-01-02T16:16:00Z",
"trace_id": "c3cf220e-0c52-7f34-9c26-12d3b1c66f5b"
} | {
"account_age_days": 534,
"account_id": "ACCT-1569FB1FADFE",
"baseline_risk_score": 0.326,
"kyc_tier": "tier_2",
"session_entropy": 0.374
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 1070,
"timestamp": "2026-01-02T16:16:00Z",
"transaction_amount_usd": 22217.06
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.871,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 442640.51,
"financial_exposure_usd": 820593.13,
"recoverable_pct": 0.046
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109871",
"label": "benign",
"label_confidence": 0.548,
"severity": "medium",
"timestamp": "2026-01-07T20:31:00Z",
"trace_id": "73fc8656-903d-5013-d6a2-a663bb4abe76"
} | {
"account_age_days": 533,
"account_id": "ACCT-E9F21912BE26",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.545
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 354,
"timestamp": "2026-01-07T20:31:00Z",
"transaction_amount_usd": 11639.35
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.506,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2957.29,
"financial_exposure_usd": 3852.31,
"recoverable_pct": 0.832
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102959",
"label": "fraudulent",
"label_confidence": 0.927,
"severity": "critical",
"timestamp": "2026-01-03T01:19:00Z",
"trace_id": "4e015926-597d-9d07-2362-ee9faa534444"
} | {
"account_age_days": 1145,
"account_id": "ACCT-2C6F42FE194C",
"baseline_risk_score": 0.262,
"kyc_tier": "tier_3",
"session_entropy": 0.883
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 209,
"timestamp": "2026-01-02T18:55:00Z",
"transaction_amount_usd": 0.76
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.884,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 430182.43,
"financial_exposure_usd": 628286.87,
"recoverable_pct": 0.284
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104317",
"label": "fraudulent",
"label_confidence": 0.943,
"severity": "medium",
"timestamp": "2026-01-03T23:57:00Z",
"trace_id": "bc13c68e-e778-84f5-1372-1548f4cec118"
} | {
"account_age_days": 236,
"account_id": "ACCT-8AD021D0FA8E",
"baseline_risk_score": 0.152,
"kyc_tier": "tier_1",
"session_entropy": 0.383
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 164,
"timestamp": "2026-01-03T12:41:00Z",
"transaction_amount_usd": 13.75
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.38,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 9",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 4648526.09,
"financial_exposure_usd": 7049365.1,
"recoverable_pct": 0.474
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105401",
"label": "fraudulent",
"label_confidence": 0.677,
"severity": "high",
"timestamp": "2026-01-04T18:01:00Z",
"trace_id": "982e8058-d01c-9247-06ee-dcb283b87a82"
} | {
"account_age_days": 1053,
"account_id": "ACCT-D0DC16883FF8",
"baseline_risk_score": 0.371,
"kyc_tier": "tier_2",
"session_entropy": 0.749
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 306,
"timestamp": "2026-01-04T08:34:00Z",
"transaction_amount_usd": 12.42
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.521,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2313788.83,
"financial_exposure_usd": 2717534.3,
"recoverable_pct": 0.545
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101745",
"label": "fraudulent",
"label_confidence": 0.86,
"severity": "high",
"timestamp": "2026-01-02T05:05:00Z",
"trace_id": "fdcc504c-9b43-5c84-ae4b-93858d3d0b08"
} | {
"account_age_days": 811,
"account_id": "ACCT-8233A2FE6C35",
"baseline_risk_score": 0.58,
"kyc_tier": "tier_2",
"session_entropy": 0.106
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 85,
"timestamp": "2026-01-02T02:27:00Z",
"transaction_amount_usd": 0.84
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.374,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 873184.92,
"financial_exposure_usd": 917995.67,
"recoverable_pct": 0.763
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100991",
"label": "fraudulent",
"label_confidence": 0.754,
"severity": "high",
"timestamp": "2026-01-01T16:31:00Z",
"trace_id": "11a0dd24-d1f3-d0a6-20f7-59f69df0503b"
} | {
"account_age_days": 338,
"account_id": "ACCT-D810ABB71428",
"baseline_risk_score": 0.633,
"kyc_tier": "tier_1",
"session_entropy": 0.306
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 1003,
"timestamp": "2026-01-01T16:31:00Z",
"transaction_amount_usd": 51265.4
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.458,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 506487,
"financial_exposure_usd": 943524.86,
"recoverable_pct": 0.339
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109780",
"label": "benign",
"label_confidence": 0.68,
"severity": "medium",
"timestamp": "2026-01-07T19:00:00Z",
"trace_id": "81e7bdee-bcae-1406-e25b-abe05ff9f1c8"
} | {
"account_age_days": 1720,
"account_id": "ACCT-7912A19D4723",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.54
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 222,
"timestamp": "2026-01-07T19:00:00Z",
"transaction_amount_usd": 6288.56
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.796,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 902.13,
"financial_exposure_usd": 1899.09,
"recoverable_pct": 0.872
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105388",
"label": "fraudulent",
"label_confidence": 0.6,
"severity": "high",
"timestamp": "2026-01-04T17:48:00Z",
"trace_id": "ccf37c8d-7982-7770-da1c-7a699f6b1cf4"
} | {
"account_age_days": 1306,
"account_id": "ACCT-2FE4B1419658",
"baseline_risk_score": 0.051,
"kyc_tier": "tier_2",
"session_entropy": 0.342
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 353,
"timestamp": "2026-01-04T15:42:00Z",
"transaction_amount_usd": 24.8
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.484,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4695123.56,
"financial_exposure_usd": 5016777.67,
"recoverable_pct": 0.577
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101509",
"label": "fraudulent",
"label_confidence": 0.799,
"severity": "critical",
"timestamp": "2026-01-02T01:09:00Z",
"trace_id": "b1b0acb2-34c2-3bf3-f354-24da5828f37e"
} | {
"account_age_days": 818,
"account_id": "ACCT-F4D0DDCDAC73",
"baseline_risk_score": 0.527,
"kyc_tier": "tier_3",
"session_entropy": 0.142
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NL",
"latency_ms": 1128,
"timestamp": "2026-01-02T01:09:00Z",
"transaction_amount_usd": 67828.03
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.87,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 372733.26,
"financial_exposure_usd": 455182.84,
"recoverable_pct": 0.423
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103028",
"label": "fraudulent",
"label_confidence": 0.911,
"severity": "medium",
"timestamp": "2026-01-03T02:28:00Z",
"trace_id": "effd7f06-7e78-b1fe-65f3-6ba49b6918cc"
} | {
"account_age_days": 1703,
"account_id": "ACCT-EC7E42437C95",
"baseline_risk_score": 0.412,
"kyc_tier": "tier_2",
"session_entropy": 0.524
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "DE",
"latency_ms": 707,
"timestamp": "2026-01-03T02:28:00Z",
"transaction_amount_usd": 55001.11
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.941,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 468162,
"financial_exposure_usd": 816553.49,
"recoverable_pct": 0.295
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108049",
"label": "benign",
"label_confidence": 0.564,
"severity": "low",
"timestamp": "2026-01-06T14:09:00Z",
"trace_id": "91ebed33-fcec-abc4-fc6a-421354292750"
} | {
"account_age_days": 1225,
"account_id": "ACCT-F504716699C5",
"baseline_risk_score": 0.176,
"kyc_tier": "tier_1",
"session_entropy": 0.705
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 309,
"timestamp": "2026-01-06T08:40:00Z",
"transaction_amount_usd": 9.3
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.753,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3177.86,
"financial_exposure_usd": 6908.42,
"recoverable_pct": 0.688
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100814",
"label": "fraudulent",
"label_confidence": 0.938,
"severity": "critical",
"timestamp": "2026-01-01T13:34:00Z",
"trace_id": "180005e9-0d9d-3295-f1d1-4db3d39eb9ea"
} | {
"account_age_days": 6,
"account_id": "ACCT-796D19BD4169",
"baseline_risk_score": 0.255,
"kyc_tier": "tier_3",
"session_entropy": 0.298
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 771,
"timestamp": "2026-01-01T13:34:00Z",
"transaction_amount_usd": 16231.4
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.368,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 457456.24,
"financial_exposure_usd": 474069.64,
"recoverable_pct": 0.183
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108568",
"label": "benign",
"label_confidence": 0.655,
"severity": "low",
"timestamp": "2026-01-06T22:48:00Z",
"trace_id": "3732f8b3-1225-41fe-8896-b349ee45ba9d"
} | {
"account_age_days": 1432,
"account_id": "ACCT-1372643F3484",
"baseline_risk_score": 0.073,
"kyc_tier": "tier_2",
"session_entropy": 0.455
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 1078,
"timestamp": "2026-01-06T22:48:00Z",
"transaction_amount_usd": 11314.42
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.708,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1395.62,
"financial_exposure_usd": 2348.21,
"recoverable_pct": 0.464
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106333",
"label": "fraudulent",
"label_confidence": 0.859,
"severity": "medium",
"timestamp": "2026-01-05T09:33:00Z",
"trace_id": "bc39cc3d-c50a-217b-079e-f8f4b51ba654"
} | {
"account_age_days": 1088,
"account_id": "ACCT-C1E7A82C7064",
"baseline_risk_score": 0.315,
"kyc_tier": "tier_1",
"session_entropy": 0.866
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 632,
"timestamp": "2026-01-05T09:33:00Z",
"transaction_amount_usd": 1632442.19
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.68,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 3110904.26,
"financial_exposure_usd": 3688069.75,
"recoverable_pct": 0.622
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104377",
"label": "fraudulent",
"label_confidence": 0.674,
"severity": "high",
"timestamp": "2026-01-04T00:57:00Z",
"trace_id": "43a883c6-7335-f35c-361d-98813fe722e9"
} | {
"account_age_days": 711,
"account_id": "ACCT-67CB8E0EE2EC",
"baseline_risk_score": 0.306,
"kyc_tier": "tier_2",
"session_entropy": 0.275
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 332,
"timestamp": "2026-01-03T20:45:00Z",
"transaction_amount_usd": 12.84
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.591,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4379624.85,
"financial_exposure_usd": 4386049.3,
"recoverable_pct": 0.817
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106474",
"label": "fraudulent",
"label_confidence": 0.883,
"severity": "low",
"timestamp": "2026-01-05T11:54:00Z",
"trace_id": "7240e925-730a-d0f3-6b15-657608ca601f"
} | {
"account_age_days": 627,
"account_id": "ACCT-46A945D51CF2",
"baseline_risk_score": 0.157,
"kyc_tier": "tier_1",
"session_entropy": 0.391
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 305,
"timestamp": "2026-01-05T07:21:00Z",
"transaction_amount_usd": 18.13
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.889,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 9",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5299915.4,
"financial_exposure_usd": 7022918.32,
"recoverable_pct": 0.955
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108835",
"label": "benign",
"label_confidence": 0.482,
"severity": "medium",
"timestamp": "2026-01-07T03:15:00Z",
"trace_id": "baa445e8-9837-731d-b5ba-9d4f50aa6ec7"
} | {
"account_age_days": 1082,
"account_id": "ACCT-439B4C4A1557",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.949
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 309,
"timestamp": "2026-01-07T03:15:00Z",
"transaction_amount_usd": 4029.05
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.621,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1328.09,
"financial_exposure_usd": 1498.86,
"recoverable_pct": 0.989
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109262",
"label": "benign",
"label_confidence": 0.682,
"severity": "medium",
"timestamp": "2026-01-07T10:22:00Z",
"trace_id": "a0cc0a4d-5d41-b074-2ff1-ceea7abdd52e"
} | {
"account_age_days": 1046,
"account_id": "ACCT-F0A4B31AA662",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.515
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 234,
"timestamp": "2026-01-07T10:22:00Z",
"transaction_amount_usd": 12143.66
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.798,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1163.54,
"financial_exposure_usd": 2489.3,
"recoverable_pct": 0.502
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108586",
"label": "benign",
"label_confidence": 0.456,
"severity": "low",
"timestamp": "2026-01-06T23:06:00Z",
"trace_id": "925c3ac5-2a75-007e-16cc-c651fcff3d8a"
} | {
"account_age_days": 82,
"account_id": "ACCT-716C5C1ED075",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.669
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 838,
"timestamp": "2026-01-06T23:06:00Z",
"transaction_amount_usd": 4431.15
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.79,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 787.16,
"financial_exposure_usd": 1415.65,
"recoverable_pct": 0.914
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109824",
"label": "benign",
"label_confidence": 0.552,
"severity": "high",
"timestamp": "2026-01-07T19:44:00Z",
"trace_id": "457f7c45-b0fc-841f-a88e-ff18ce6d8616"
} | {
"account_age_days": 1384,
"account_id": "ACCT-14C55B8A8F82",
"baseline_risk_score": 0.11,
"kyc_tier": "tier_2",
"session_entropy": 0.604
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 461,
"timestamp": "2026-01-07T19:44:00Z",
"transaction_amount_usd": 5027.87
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.496,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2561.25,
"financial_exposure_usd": 5466.26,
"recoverable_pct": 0.534
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102149",
"label": "fraudulent",
"label_confidence": 0.93,
"severity": "medium",
"timestamp": "2026-01-02T11:49:00Z",
"trace_id": "1f8ee0ab-7319-1c43-87cc-1b601e27918f"
} | {
"account_age_days": 441,
"account_id": "ACCT-E5115BFC7193",
"baseline_risk_score": 0.497,
"kyc_tier": "tier_3",
"session_entropy": 0.747
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 497,
"timestamp": "2026-01-02T11:49:00Z",
"transaction_amount_usd": 2637.74
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.841,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 283557.25,
"financial_exposure_usd": 512471.25,
"recoverable_pct": 0.689
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105815",
"label": "fraudulent",
"label_confidence": 0.607,
"severity": "medium",
"timestamp": "2026-01-05T00:55:00Z",
"trace_id": "50a93033-bf8b-b06a-095a-c1dbb6c8a5ff"
} | {
"account_age_days": 1268,
"account_id": "ACCT-E4D7C0F8E39E",
"baseline_risk_score": 0.189,
"kyc_tier": "tier_2",
"session_entropy": 0.35
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 1042,
"timestamp": "2026-01-05T00:55:00Z",
"transaction_amount_usd": 786731.21
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.54,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2774263.25,
"financial_exposure_usd": 3321326.13,
"recoverable_pct": 0.529
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100157",
"label": "fraudulent",
"label_confidence": 0.784,
"severity": "high",
"timestamp": "2026-01-01T02:37:00Z",
"trace_id": "93424e7c-0922-d88d-e522-8d310d9a6fce"
} | {
"account_age_days": 929,
"account_id": "ACCT-CDCBE8184DFA",
"baseline_risk_score": 0.317,
"kyc_tier": "tier_2",
"session_entropy": 0.726
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 280,
"timestamp": "2025-12-31T21:12:00Z",
"transaction_amount_usd": 15.51
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.944,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 196708.3,
"financial_exposure_usd": 246487.7,
"recoverable_pct": 0.216
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101284",
"label": "fraudulent",
"label_confidence": 0.908,
"severity": "medium",
"timestamp": "2026-01-01T21:24:00Z",
"trace_id": "d9878e7f-1e86-7917-c8f3-1d4e19c89532"
} | {
"account_age_days": 393,
"account_id": "ACCT-EBC23786905C",
"baseline_risk_score": 0.516,
"kyc_tier": "tier_1",
"session_entropy": 0.893
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 511,
"timestamp": "2026-01-01T21:24:00Z",
"transaction_amount_usd": 61530.93
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.793,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 304613,
"financial_exposure_usd": 350518.84,
"recoverable_pct": 0.54
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102487",
"label": "fraudulent",
"label_confidence": 0.755,
"severity": "critical",
"timestamp": "2026-01-02T17:27:00Z",
"trace_id": "fd472011-1539-f397-c649-6bd1e5be473f"
} | {
"account_age_days": 228,
"account_id": "ACCT-C09035E6FCBA",
"baseline_risk_score": 0.585,
"kyc_tier": "tier_3",
"session_entropy": 0.851
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 1012,
"timestamp": "2026-01-02T17:27:00Z",
"transaction_amount_usd": 67030.34
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.648,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 347093.86,
"financial_exposure_usd": 590741.67,
"recoverable_pct": 0.345
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105438",
"label": "fraudulent",
"label_confidence": 0.776,
"severity": "critical",
"timestamp": "2026-01-04T18:38:00Z",
"trace_id": "70e5f415-6379-2aeb-a473-7983912d94c4"
} | {
"account_age_days": 1575,
"account_id": "ACCT-DA731022CC35",
"baseline_risk_score": 0.124,
"kyc_tier": "tier_1",
"session_entropy": 0.874
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 106,
"timestamp": "2026-01-04T09:24:00Z",
"transaction_amount_usd": 21.6
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.612,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4614438.55,
"financial_exposure_usd": 6605456.6,
"recoverable_pct": 0.561
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107435",
"label": "benign",
"label_confidence": 0.543,
"severity": "high",
"timestamp": "2026-01-06T03:55:00Z",
"trace_id": "80230cbf-b59e-7c00-2753-22e97724d034"
} | {
"account_age_days": 1007,
"account_id": "ACCT-98AEF300F628",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.678
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 171,
"timestamp": "2026-01-05T23:20:00Z",
"transaction_amount_usd": 8.95
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.594,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2404.74,
"financial_exposure_usd": 2769.33,
"recoverable_pct": 0.675
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.