schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109772",
"label": "benign",
"label_confidence": 0.662,
"severity": "low",
"timestamp": "2026-01-07T18:52:00Z",
"trace_id": "ca93699e-8ddf-45a9-21f6-d9928cf3e918"
} | {
"account_age_days": 254,
"account_id": "ACCT-501D3485CDBF",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.164
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 317,
"timestamp": "2026-01-07T18:52:00Z",
"transaction_amount_usd": 2829.45
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.76,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 3429.62,
"financial_exposure_usd": 6396.44,
"recoverable_pct": 0.43
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104114",
"label": "fraudulent",
"label_confidence": 0.77,
"severity": "high",
"timestamp": "2026-01-03T20:34:00Z",
"trace_id": "523dc2df-9efc-9a6a-bedb-d3e3b75d81cc"
} | {
"account_age_days": 1493,
"account_id": "ACCT-AC71AA3EB98C",
"baseline_risk_score": 0.079,
"kyc_tier": "tier_1",
"session_entropy": 0.842
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 664,
"timestamp": "2026-01-03T20:34:00Z",
"transaction_amount_usd": 847961.41
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.919,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3700660.3,
"financial_exposure_usd": 7628288.3,
"recoverable_pct": 0.729
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109241",
"label": "benign",
"label_confidence": 0.697,
"severity": "low",
"timestamp": "2026-01-07T10:01:00Z",
"trace_id": "a5af3a5c-b264-0dd1-e4e9-0ec63d43e5e0"
} | {
"account_age_days": 1765,
"account_id": "ACCT-4445647B13B3",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.247
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 158,
"timestamp": "2026-01-07T07:25:00Z",
"transaction_amount_usd": 12.73
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.603,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3414.85,
"financial_exposure_usd": 4157.84,
"recoverable_pct": 0.84
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107274",
"label": "benign",
"label_confidence": 0.607,
"severity": "medium",
"timestamp": "2026-01-06T01:14:00Z",
"trace_id": "bb9b2908-4b56-a069-bd88-e90224a544f9"
} | {
"account_age_days": 455,
"account_id": "ACCT-B37ABC79C79B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.853
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 367,
"timestamp": "2026-01-05T19:20:00Z",
"transaction_amount_usd": 4.76
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.666,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2570.28,
"financial_exposure_usd": 4470.84,
"recoverable_pct": 0.914
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101297",
"label": "fraudulent",
"label_confidence": 0.888,
"severity": "low",
"timestamp": "2026-01-01T21:37:00Z",
"trace_id": "37c877e6-5ef3-6539-9c78-a40bbed596a6"
} | {
"account_age_days": 1411,
"account_id": "ACCT-230C54D889D0",
"baseline_risk_score": 0.255,
"kyc_tier": "tier_3",
"session_entropy": 0.213
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "FR",
"latency_ms": 261,
"timestamp": "2026-01-01T21:37:00Z",
"transaction_amount_usd": 61695.76
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.698,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 461420.48,
"financial_exposure_usd": 826480.19,
"recoverable_pct": 0.636
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103433",
"label": "fraudulent",
"label_confidence": 0.844,
"severity": "high",
"timestamp": "2026-01-03T09:13:00Z",
"trace_id": "c09127d3-3e86-215f-28e0-12f65833863b"
} | {
"account_age_days": 381,
"account_id": "ACCT-C9829640EA8C",
"baseline_risk_score": 0.363,
"kyc_tier": "tier_2",
"session_entropy": 0.658
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 216,
"timestamp": "2026-01-03T05:53:00Z",
"transaction_amount_usd": 22.11
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.858,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1747782.82,
"financial_exposure_usd": 2910637.82,
"recoverable_pct": 0.433
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104850",
"label": "fraudulent",
"label_confidence": 0.759,
"severity": "medium",
"timestamp": "2026-01-04T08:50:00Z",
"trace_id": "286ace7d-b0b2-5230-ec38-c0c1abb9c673"
} | {
"account_age_days": 427,
"account_id": "ACCT-4903E385D6D2",
"baseline_risk_score": 0.122,
"kyc_tier": "tier_3",
"session_entropy": 0.933
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 259,
"timestamp": "2026-01-04T03:56:00Z",
"transaction_amount_usd": 11.35
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.494,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3911920.83,
"financial_exposure_usd": 4286329.68,
"recoverable_pct": 0.558
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108690",
"label": "benign",
"label_confidence": 0.678,
"severity": "critical",
"timestamp": "2026-01-07T00:50:00Z",
"trace_id": "0c7313a2-e941-47fe-c977-6675cff749e8"
} | {
"account_age_days": 1926,
"account_id": "ACCT-6F59CD0D1A01",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.362
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 261,
"timestamp": "2026-01-06T22:45:00Z",
"transaction_amount_usd": 2.41
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.675,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 901.5,
"financial_exposure_usd": 944.76,
"recoverable_pct": 0.486
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104381",
"label": "fraudulent",
"label_confidence": 0.85,
"severity": "critical",
"timestamp": "2026-01-04T01:01:00Z",
"trace_id": "8aa30dc8-ce2c-9cb7-17d4-78949018683b"
} | {
"account_age_days": 1155,
"account_id": "ACCT-77805AA6E8AC",
"baseline_risk_score": 0.331,
"kyc_tier": "tier_2",
"session_entropy": 0.572
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 637,
"timestamp": "2026-01-04T01:01:00Z",
"transaction_amount_usd": 1817433.76
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.447,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3983508.45,
"financial_exposure_usd": 4393685.93,
"recoverable_pct": 0.671
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109107",
"label": "benign",
"label_confidence": 0.522,
"severity": "medium",
"timestamp": "2026-01-07T07:47:00Z",
"trace_id": "2aee9bb6-03e2-4a7b-4e05-0c032c481d01"
} | {
"account_age_days": 1262,
"account_id": "ACCT-3CDB51037E55",
"baseline_risk_score": 0.082,
"kyc_tier": "tier_3",
"session_entropy": 0.914
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 215,
"timestamp": "2026-01-07T07:47:00Z",
"transaction_amount_usd": 1333.76
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.475,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2536.76,
"financial_exposure_usd": 4810.05,
"recoverable_pct": 0.98
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102885",
"label": "fraudulent",
"label_confidence": 0.919,
"severity": "medium",
"timestamp": "2026-01-03T00:05:00Z",
"trace_id": "2f24ed49-8bac-d823-d6ca-0613a9474f73"
} | {
"account_age_days": 241,
"account_id": "ACCT-F2D9416F1D60",
"baseline_risk_score": 0.5,
"kyc_tier": "tier_2",
"session_entropy": 0.748
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 238,
"timestamp": "2026-01-02T19:14:00Z",
"transaction_amount_usd": 0.04
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.905,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 508246.42,
"financial_exposure_usd": 876068.66,
"recoverable_pct": 0.476
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105081",
"label": "fraudulent",
"label_confidence": 0.899,
"severity": "high",
"timestamp": "2026-01-04T12:41:00Z",
"trace_id": "92096f28-e622-d63e-0f4c-e1a1463d5080"
} | {
"account_age_days": 1770,
"account_id": "ACCT-5B4E09079079",
"baseline_risk_score": 0.373,
"kyc_tier": "tier_2",
"session_entropy": 0.101
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 96,
"timestamp": "2026-01-04T12:41:00Z",
"transaction_amount_usd": 2650934.77
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.699,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 6824181.94,
"financial_exposure_usd": 7598080.66,
"recoverable_pct": 0.816
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101094",
"label": "fraudulent",
"label_confidence": 0.818,
"severity": "high",
"timestamp": "2026-01-01T18:14:00Z",
"trace_id": "d050c023-582f-63bd-ef7a-f84ae2e9389d"
} | {
"account_age_days": 1608,
"account_id": "ACCT-B848D6C9BBFC",
"baseline_risk_score": 0.575,
"kyc_tier": "tier_1",
"session_entropy": 0.606
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 266,
"timestamp": "2026-01-01T18:14:00Z",
"transaction_amount_usd": 16109.78
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.813,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 518110.73,
"financial_exposure_usd": 802151.61,
"recoverable_pct": 0.4
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105323",
"label": "fraudulent",
"label_confidence": 0.875,
"severity": "medium",
"timestamp": "2026-01-04T16:43:00Z",
"trace_id": "3b6b47d6-4c38-6cb0-cac7-585c669d1e8b"
} | {
"account_age_days": 55,
"account_id": "ACCT-34FE1F4C70EE",
"baseline_risk_score": 0.148,
"kyc_tier": "tier_1",
"session_entropy": 0.521
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 666,
"timestamp": "2026-01-04T16:43:00Z",
"transaction_amount_usd": 2447300.85
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.499,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 6936795.58,
"financial_exposure_usd": 7505649.46,
"recoverable_pct": 0.73
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104674",
"label": "fraudulent",
"label_confidence": 0.91,
"severity": "high",
"timestamp": "2026-01-04T05:54:00Z",
"trace_id": "ed5c5abb-4f46-dfac-e92d-f4d9ae8876c5"
} | {
"account_age_days": 1322,
"account_id": "ACCT-ECB172C1476C",
"baseline_risk_score": 0.367,
"kyc_tier": "tier_3",
"session_entropy": 0.376
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 198,
"timestamp": "2026-01-03T18:22:00Z",
"transaction_amount_usd": 0.69
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.744,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4932101.54,
"financial_exposure_usd": 5541230.34,
"recoverable_pct": 0.657
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105264",
"label": "fraudulent",
"label_confidence": 0.746,
"severity": "low",
"timestamp": "2026-01-04T15:44:00Z",
"trace_id": "3dda11f8-16c0-a35e-6fe6-9acf14d4fede"
} | {
"account_age_days": 476,
"account_id": "ACCT-542D41F76630",
"baseline_risk_score": 0.179,
"kyc_tier": "tier_2",
"session_entropy": 0.774
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 968,
"timestamp": "2026-01-04T15:44:00Z",
"transaction_amount_usd": 1157074.69
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.773,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4254705.42,
"financial_exposure_usd": 5723503.41,
"recoverable_pct": 0.816
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109572",
"label": "benign",
"label_confidence": 0.519,
"severity": "low",
"timestamp": "2026-01-07T15:32:00Z",
"trace_id": "a014c83c-07ad-addc-ef03-3a3625c33db7"
} | {
"account_age_days": 1997,
"account_id": "ACCT-F91A545691DA",
"baseline_risk_score": 0.122,
"kyc_tier": "tier_1",
"session_entropy": 0.353
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 97,
"timestamp": "2026-01-07T14:12:00Z",
"transaction_amount_usd": 10.14
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.741,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 703.26,
"financial_exposure_usd": 1026.29,
"recoverable_pct": 0.781
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107203",
"label": "benign",
"label_confidence": 0.618,
"severity": "low",
"timestamp": "2026-01-06T00:03:00Z",
"trace_id": "7a82dd6b-d207-c146-5a9c-28ea5b306424"
} | {
"account_age_days": 416,
"account_id": "ACCT-684863B9EC00",
"baseline_risk_score": 0.172,
"kyc_tier": "tier_2",
"session_entropy": 0.482
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 517,
"timestamp": "2026-01-06T00:03:00Z",
"transaction_amount_usd": 7402.93
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.683,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1938.98,
"financial_exposure_usd": 2457.39,
"recoverable_pct": 0.889
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107328",
"label": "benign",
"label_confidence": 0.629,
"severity": "medium",
"timestamp": "2026-01-06T02:08:00Z",
"trace_id": "99c98669-19c7-3e94-fd43-412b6890ae80"
} | {
"account_age_days": 499,
"account_id": "ACCT-55580AE94A17",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.887
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 334,
"timestamp": "2026-01-06T02:08:00Z",
"transaction_amount_usd": 11422.19
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.674,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3778.41,
"financial_exposure_usd": 4340.99,
"recoverable_pct": 0.749
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107129",
"label": "benign",
"label_confidence": 0.459,
"severity": "low",
"timestamp": "2026-01-05T22:49:00Z",
"trace_id": "0cc05149-09c5-22cb-aa1d-ebf46d4eeb4a"
} | {
"account_age_days": 106,
"account_id": "ACCT-06F7EDD87E33",
"baseline_risk_score": 0.134,
"kyc_tier": "tier_3",
"session_entropy": 0.851
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 590,
"timestamp": "2026-01-05T22:49:00Z",
"transaction_amount_usd": 1712.33
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.667,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1638.12,
"financial_exposure_usd": 1862.39,
"recoverable_pct": 0.905
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108074",
"label": "benign",
"label_confidence": 0.457,
"severity": "critical",
"timestamp": "2026-01-06T14:34:00Z",
"trace_id": "ebefb4fa-63c6-5b9a-5adc-d687039f8cf7"
} | {
"account_age_days": 281,
"account_id": "ACCT-918B7575471D",
"baseline_risk_score": 0.145,
"kyc_tier": "tier_2",
"session_entropy": 0.522
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 880,
"timestamp": "2026-01-06T14:34:00Z",
"transaction_amount_usd": 3072.18
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.595,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2268.38,
"financial_exposure_usd": 4616.3,
"recoverable_pct": 0.541
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109738",
"label": "benign",
"label_confidence": 0.55,
"severity": "low",
"timestamp": "2026-01-07T18:18:00Z",
"trace_id": "5188b774-d1d5-b1f5-54cd-6b71be14dba6"
} | {
"account_age_days": 204,
"account_id": "ACCT-BFF19482D6ED",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.704
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 672,
"timestamp": "2026-01-07T18:18:00Z",
"transaction_amount_usd": 11719.75
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.514,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 275.25,
"financial_exposure_usd": 573.99,
"recoverable_pct": 0.58
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106368",
"label": "fraudulent",
"label_confidence": 0.87,
"severity": "medium",
"timestamp": "2026-01-05T10:08:00Z",
"trace_id": "bf007318-7d34-af10-1db6-40919de3509b"
} | {
"account_age_days": 1590,
"account_id": "ACCT-486F8B0E6B21",
"baseline_risk_score": 0.363,
"kyc_tier": "tier_1",
"session_entropy": 0.388
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 610,
"timestamp": "2026-01-05T10:08:00Z",
"transaction_amount_usd": 598279.72
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.926,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1333961.04,
"financial_exposure_usd": 1714486.35,
"recoverable_pct": 0.959
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101826",
"label": "fraudulent",
"label_confidence": 0.868,
"severity": "critical",
"timestamp": "2026-01-02T06:26:00Z",
"trace_id": "87a017d5-d641-b381-af4a-13d32a7f6ae0"
} | {
"account_age_days": 242,
"account_id": "ACCT-2A8FEFFC00C6",
"baseline_risk_score": 0.499,
"kyc_tier": "tier_1",
"session_entropy": 0.105
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 325,
"timestamp": "2026-01-02T06:26:00Z",
"transaction_amount_usd": 91963.16
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.85,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 1053681.82,
"financial_exposure_usd": 1233615.6,
"recoverable_pct": 0.447
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108577",
"label": "benign",
"label_confidence": 0.549,
"severity": "high",
"timestamp": "2026-01-06T22:57:00Z",
"trace_id": "1117c465-5af4-298b-c04d-22aa8796153a"
} | {
"account_age_days": 1233,
"account_id": "ACCT-37F2651BED23",
"baseline_risk_score": 0.111,
"kyc_tier": "tier_1",
"session_entropy": 0.578
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 495,
"timestamp": "2026-01-06T22:57:00Z",
"transaction_amount_usd": 13246.46
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.565,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 989.13,
"financial_exposure_usd": 1086.35,
"recoverable_pct": 0.916
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107068",
"label": "benign",
"label_confidence": 0.573,
"severity": "low",
"timestamp": "2026-01-05T21:48:00Z",
"trace_id": "c4de25f3-33c7-185a-2eb4-a739d85b9ef0"
} | {
"account_age_days": 1149,
"account_id": "ACCT-DA1C15F257DE",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.622
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 722,
"timestamp": "2026-01-05T21:48:00Z",
"transaction_amount_usd": 3553.36
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.642,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2447.58,
"financial_exposure_usd": 5060.51,
"recoverable_pct": 0.499
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106650",
"label": "fraudulent",
"label_confidence": 0.837,
"severity": "medium",
"timestamp": "2026-01-05T14:50:00Z",
"trace_id": "2a2b02ae-ee9a-2969-18f1-753d72fa10f2"
} | {
"account_age_days": 988,
"account_id": "ACCT-8745E128966D",
"baseline_risk_score": 0.121,
"kyc_tier": "tier_2",
"session_entropy": 0.175
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 385,
"timestamp": "2026-01-05T10:15:00Z",
"transaction_amount_usd": 5.61
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.777,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3956185.08,
"financial_exposure_usd": 5209511.29,
"recoverable_pct": 0.465
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100892",
"label": "fraudulent",
"label_confidence": 0.824,
"severity": "high",
"timestamp": "2026-01-01T14:52:00Z",
"trace_id": "62ae7b1d-b0bb-a8b6-3898-e9db63cc0716"
} | {
"account_age_days": 1134,
"account_id": "ACCT-B6A5E2C34462",
"baseline_risk_score": 0.548,
"kyc_tier": "tier_2",
"session_entropy": 0.106
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 372,
"timestamp": "2026-01-01T14:52:00Z",
"transaction_amount_usd": 117054.46
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.904,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 369774.5,
"financial_exposure_usd": 449005.33,
"recoverable_pct": 0.512
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109018",
"label": "benign",
"label_confidence": 0.461,
"severity": "high",
"timestamp": "2026-01-07T06:18:00Z",
"trace_id": "27343516-e616-1e25-47ee-5bf21ca55311"
} | {
"account_age_days": 1410,
"account_id": "ACCT-18108F44ECC5",
"baseline_risk_score": 0.066,
"kyc_tier": "tier_1",
"session_entropy": 0.624
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 1072,
"timestamp": "2026-01-07T06:18:00Z",
"transaction_amount_usd": 2104.87
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.591,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1615.09,
"financial_exposure_usd": 1907.49,
"recoverable_pct": 0.989
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105269",
"label": "fraudulent",
"label_confidence": 0.836,
"severity": "high",
"timestamp": "2026-01-04T15:49:00Z",
"trace_id": "920496d2-99e4-2182-6d6e-e0fbd8d943f3"
} | {
"account_age_days": 200,
"account_id": "ACCT-9F43ADF3659D",
"baseline_risk_score": 0.064,
"kyc_tier": "tier_1",
"session_entropy": 0.212
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 230,
"timestamp": "2026-01-04T15:49:00Z",
"transaction_amount_usd": 1718573.63
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.769,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3529449.79,
"financial_exposure_usd": 6228721.92,
"recoverable_pct": 0.633
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101093",
"label": "fraudulent",
"label_confidence": 0.782,
"severity": "critical",
"timestamp": "2026-01-01T18:13:00Z",
"trace_id": "9db4f407-a1ca-0204-a350-a593fc8de58c"
} | {
"account_age_days": 1363,
"account_id": "ACCT-AC10FE3816DB",
"baseline_risk_score": 0.266,
"kyc_tier": "tier_2",
"session_entropy": 0.145
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 224,
"timestamp": "2026-01-01T13:39:00Z",
"transaction_amount_usd": 8.93
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.821,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 148068.59,
"financial_exposure_usd": 184965.86,
"recoverable_pct": 0.12
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101877",
"label": "fraudulent",
"label_confidence": 0.974,
"severity": "high",
"timestamp": "2026-01-02T07:17:00Z",
"trace_id": "929db335-4abb-8695-9a66-7d8885b78749"
} | {
"account_age_days": 525,
"account_id": "ACCT-EF4342D9C795",
"baseline_risk_score": 0.366,
"kyc_tier": "tier_1",
"session_entropy": 0.3
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 604,
"timestamp": "2026-01-02T07:17:00Z",
"transaction_amount_usd": 30233.16
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.823,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 834379.92,
"financial_exposure_usd": 1267125.29,
"recoverable_pct": 0.205
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101142",
"label": "fraudulent",
"label_confidence": 0.869,
"severity": "critical",
"timestamp": "2026-01-01T19:02:00Z",
"trace_id": "7e825cdf-84bc-86dd-f9c0-5363dadb98cf"
} | {
"account_age_days": 297,
"account_id": "ACCT-B20284A767CF",
"baseline_risk_score": 0.281,
"kyc_tier": "tier_2",
"session_entropy": 0.698
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 218,
"timestamp": "2026-01-01T19:02:00Z",
"transaction_amount_usd": 53297.6
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.56,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 284723.16,
"financial_exposure_usd": 687923.48,
"recoverable_pct": 0.601
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102708",
"label": "fraudulent",
"label_confidence": 0.758,
"severity": "critical",
"timestamp": "2026-01-02T21:08:00Z",
"trace_id": "291ea4bf-2a42-c21f-874d-a05bb7a4c255"
} | {
"account_age_days": 1829,
"account_id": "ACCT-ACDE62E50EDF",
"baseline_risk_score": 0.484,
"kyc_tier": "tier_3",
"session_entropy": 0.529
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 228,
"timestamp": "2026-01-02T18:04:00Z",
"transaction_amount_usd": 6.44
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.725,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 585346.95,
"financial_exposure_usd": 1002167.63,
"recoverable_pct": 0.515
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100337",
"label": "fraudulent",
"label_confidence": 0.903,
"severity": "high",
"timestamp": "2026-01-01T05:37:00Z",
"trace_id": "6a673cff-e0e3-6d7a-59f5-870ddb2bee8a"
} | {
"account_age_days": 1820,
"account_id": "ACCT-7893AA696790",
"baseline_risk_score": 0.508,
"kyc_tier": "tier_1",
"session_entropy": 0.696
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 907,
"timestamp": "2026-01-01T05:37:00Z",
"transaction_amount_usd": 101965.02
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.91,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 296308.16,
"financial_exposure_usd": 352354.63,
"recoverable_pct": 0.358
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100984",
"label": "fraudulent",
"label_confidence": 0.905,
"severity": "critical",
"timestamp": "2026-01-01T16:24:00Z",
"trace_id": "ab21974d-ff20-5932-b52d-13a4c099f079"
} | {
"account_age_days": 1121,
"account_id": "ACCT-E1AFF24F1130",
"baseline_risk_score": 0.463,
"kyc_tier": "tier_3",
"session_entropy": 0.469
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "LU",
"latency_ms": 366,
"timestamp": "2026-01-01T16:24:00Z",
"transaction_amount_usd": 104089.02
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.654,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 332409.3,
"financial_exposure_usd": 814654.83,
"recoverable_pct": 0.613
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106460",
"label": "fraudulent",
"label_confidence": 0.754,
"severity": "high",
"timestamp": "2026-01-05T11:40:00Z",
"trace_id": "7bc91952-5b3f-8227-5a2d-7c4d1b169c96"
} | {
"account_age_days": 105,
"account_id": "ACCT-E62CD299D0D4",
"baseline_risk_score": 0.382,
"kyc_tier": "tier_3",
"session_entropy": 0.447
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 215,
"timestamp": "2026-01-05T11:40:00Z",
"transaction_amount_usd": 2898913.03
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.903,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1258991.96,
"financial_exposure_usd": 2476768.48,
"recoverable_pct": 0.784
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108322",
"label": "benign",
"label_confidence": 0.466,
"severity": "medium",
"timestamp": "2026-01-06T18:42:00Z",
"trace_id": "640738ad-d06b-8ea8-6521-0402bc81495b"
} | {
"account_age_days": 204,
"account_id": "ACCT-B2E3BB231F7F",
"baseline_risk_score": 0.065,
"kyc_tier": "tier_1",
"session_entropy": 0.267
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 151,
"timestamp": "2026-01-06T18:42:00Z",
"transaction_amount_usd": 4188.7
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.487,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 700.68,
"financial_exposure_usd": 1281.84,
"recoverable_pct": 0.856
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107400",
"label": "benign",
"label_confidence": 0.678,
"severity": "medium",
"timestamp": "2026-01-06T03:20:00Z",
"trace_id": "ca6482cf-1888-d2b6-8898-7251c053b168"
} | {
"account_age_days": 793,
"account_id": "ACCT-64B2849E5885",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.639
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 1076,
"timestamp": "2026-01-06T03:20:00Z",
"transaction_amount_usd": 8599.95
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.787,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 74.39,
"financial_exposure_usd": 142.94,
"recoverable_pct": 0.908
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104856",
"label": "fraudulent",
"label_confidence": 0.604,
"severity": "high",
"timestamp": "2026-01-04T08:56:00Z",
"trace_id": "25186765-be11-f161-7743-05efc59cd22f"
} | {
"account_age_days": 790,
"account_id": "ACCT-3287026E97B8",
"baseline_risk_score": 0.067,
"kyc_tier": "tier_3",
"session_entropy": 0.64
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 297,
"timestamp": "2026-01-03T20:44:00Z",
"transaction_amount_usd": 1.95
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.772,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1777210.1,
"financial_exposure_usd": 3192570.61,
"recoverable_pct": 0.62
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106240",
"label": "fraudulent",
"label_confidence": 0.616,
"severity": "low",
"timestamp": "2026-01-05T08:00:00Z",
"trace_id": "50cd76e0-32c1-062e-a630-dead7123e7c5"
} | {
"account_age_days": 1092,
"account_id": "ACCT-72DF68AA7F77",
"baseline_risk_score": 0.171,
"kyc_tier": "tier_2",
"session_entropy": 0.261
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 205,
"timestamp": "2026-01-05T05:06:00Z",
"transaction_amount_usd": 1.64
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.495,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3418740.67,
"financial_exposure_usd": 4464294.69,
"recoverable_pct": 0.45
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108845",
"label": "benign",
"label_confidence": 0.656,
"severity": "critical",
"timestamp": "2026-01-07T03:25:00Z",
"trace_id": "3a7ae453-0ac2-6d11-b07e-9a34690e18e2"
} | {
"account_age_days": 1199,
"account_id": "ACCT-770D42A00CFE",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.796
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 712,
"timestamp": "2026-01-07T03:25:00Z",
"transaction_amount_usd": 12071.87
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.669,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2997.58,
"financial_exposure_usd": 3494.75,
"recoverable_pct": 0.471
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105447",
"label": "fraudulent",
"label_confidence": 0.707,
"severity": "high",
"timestamp": "2026-01-04T18:47:00Z",
"trace_id": "473ad227-7ddc-f925-bd36-a1d468e2a4b0"
} | {
"account_age_days": 603,
"account_id": "ACCT-5F70DBA15133",
"baseline_risk_score": 0.133,
"kyc_tier": "tier_1",
"session_entropy": 0.821
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 872,
"timestamp": "2026-01-04T18:47:00Z",
"transaction_amount_usd": 1001561.14
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.89,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 2545639.52,
"financial_exposure_usd": 4030642.97,
"recoverable_pct": 0.684
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104358",
"label": "fraudulent",
"label_confidence": 0.734,
"severity": "high",
"timestamp": "2026-01-04T00:38:00Z",
"trace_id": "d3a7337b-d205-b7d2-ec83-3f00c62f64b8"
} | {
"account_age_days": 1804,
"account_id": "ACCT-AB1102B66835",
"baseline_risk_score": 0.352,
"kyc_tier": "tier_3",
"session_entropy": 0.336
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 314,
"timestamp": "2026-01-03T15:19:00Z",
"transaction_amount_usd": 12.94
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.835,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3948628.35,
"financial_exposure_usd": 5100876.09,
"recoverable_pct": 0.421
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106613",
"label": "fraudulent",
"label_confidence": 0.755,
"severity": "high",
"timestamp": "2026-01-05T14:13:00Z",
"trace_id": "21a7f43e-b67d-6783-8aa2-80c14339d801"
} | {
"account_age_days": 1723,
"account_id": "ACCT-8B34672ADB80",
"baseline_risk_score": 0.421,
"kyc_tier": "tier_1",
"session_entropy": 0.322
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 1137,
"timestamp": "2026-01-05T14:13:00Z",
"transaction_amount_usd": 1867843.24
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.553,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1219518.47,
"financial_exposure_usd": 2373444.92,
"recoverable_pct": 0.513
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109574",
"label": "benign",
"label_confidence": 0.629,
"severity": "critical",
"timestamp": "2026-01-07T15:34:00Z",
"trace_id": "a7689401-cebb-4331-309d-b08d2d6179ad"
} | {
"account_age_days": 878,
"account_id": "ACCT-E8E6FF8460FC",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.103
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 1167,
"timestamp": "2026-01-07T15:34:00Z",
"transaction_amount_usd": 13833.27
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.656,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3632.69,
"financial_exposure_usd": 6651.9,
"recoverable_pct": 0.987
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108013",
"label": "benign",
"label_confidence": 0.519,
"severity": "high",
"timestamp": "2026-01-06T13:33:00Z",
"trace_id": "231fc093-416a-324a-f3dd-5eb5402517f3"
} | {
"account_age_days": 398,
"account_id": "ACCT-B3CD770833EF",
"baseline_risk_score": 0.078,
"kyc_tier": "tier_3",
"session_entropy": 0.415
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 300,
"timestamp": "2026-01-06T11:32:00Z",
"transaction_amount_usd": 11.68
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.598,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1354.22,
"financial_exposure_usd": 2552.73,
"recoverable_pct": 0.943
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105190",
"label": "fraudulent",
"label_confidence": 0.887,
"severity": "medium",
"timestamp": "2026-01-04T14:30:00Z",
"trace_id": "17280c53-1275-dc80-f5f6-137cbf5b4eb7"
} | {
"account_age_days": 883,
"account_id": "ACCT-470D0284606E",
"baseline_risk_score": 0.286,
"kyc_tier": "tier_3",
"session_entropy": 0.564
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 296,
"timestamp": "2026-01-04T12:04:00Z",
"transaction_amount_usd": 17.03
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.74,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 9",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 1717562.45,
"financial_exposure_usd": 3337027.63,
"recoverable_pct": 0.986
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109844",
"label": "benign",
"label_confidence": 0.619,
"severity": "high",
"timestamp": "2026-01-07T20:04:00Z",
"trace_id": "be3064ac-64ba-fa87-080d-488bc4a29f00"
} | {
"account_age_days": 1214,
"account_id": "ACCT-4ED08781FB9E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.609
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 184,
"timestamp": "2026-01-07T12:23:00Z",
"transaction_amount_usd": 14.57
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.587,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2186.53,
"financial_exposure_usd": 2894.33,
"recoverable_pct": 0.413
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100724",
"label": "fraudulent",
"label_confidence": 0.817,
"severity": "critical",
"timestamp": "2026-01-01T12:04:00Z",
"trace_id": "b08a695d-c4f1-81a5-5a6a-515de0427c03"
} | {
"account_age_days": 1168,
"account_id": "ACCT-372B0B95FB3A",
"baseline_risk_score": 0.329,
"kyc_tier": "tier_3",
"session_entropy": 0.87
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 318,
"timestamp": "2026-01-01T02:18:00Z",
"transaction_amount_usd": 20.57
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.589,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 770111.68,
"financial_exposure_usd": 836823.17,
"recoverable_pct": 0.611
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107961",
"label": "benign",
"label_confidence": 0.453,
"severity": "low",
"timestamp": "2026-01-06T12:41:00Z",
"trace_id": "d48b6018-1eae-7096-dd86-77b31a2c8b3d"
} | {
"account_age_days": 1995,
"account_id": "ACCT-6BF60C49B33F",
"baseline_risk_score": 0.097,
"kyc_tier": "tier_1",
"session_entropy": 0.797
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 744,
"timestamp": "2026-01-06T12:41:00Z",
"transaction_amount_usd": 1781.13
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.643,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1132.61,
"financial_exposure_usd": 1223.69,
"recoverable_pct": 0.521
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107277",
"label": "benign",
"label_confidence": 0.65,
"severity": "medium",
"timestamp": "2026-01-06T01:17:00Z",
"trace_id": "62349102-c0db-da4a-fe1d-a4632f1b8a18"
} | {
"account_age_days": 1865,
"account_id": "ACCT-CDAF21BF41FC",
"baseline_risk_score": 0.102,
"kyc_tier": "tier_3",
"session_entropy": 0.486
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 1038,
"timestamp": "2026-01-06T01:17:00Z",
"transaction_amount_usd": 10071.84
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.645,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1247.03,
"financial_exposure_usd": 1867.65,
"recoverable_pct": 0.951
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100447",
"label": "fraudulent",
"label_confidence": 0.869,
"severity": "medium",
"timestamp": "2026-01-01T07:27:00Z",
"trace_id": "6374911b-0996-71b7-656b-0e9939d1ec1c"
} | {
"account_age_days": 1898,
"account_id": "ACCT-683B729ABAFC",
"baseline_risk_score": 0.516,
"kyc_tier": "tier_2",
"session_entropy": 0.937
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 386,
"timestamp": "2026-01-01T01:50:00Z",
"transaction_amount_usd": 13.03
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.914,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 463297.51,
"financial_exposure_usd": 625631.2,
"recoverable_pct": 0.093
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107940",
"label": "benign",
"label_confidence": 0.636,
"severity": "medium",
"timestamp": "2026-01-06T12:20:00Z",
"trace_id": "d5385d87-ba2d-3433-4890-ec57fb1c9f24"
} | {
"account_age_days": 1611,
"account_id": "ACCT-7B52DC11D6CE",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.527
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 232,
"timestamp": "2026-01-06T08:51:00Z",
"transaction_amount_usd": 22.34
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.796,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 568.97,
"financial_exposure_usd": 573.74,
"recoverable_pct": 0.517
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104060",
"label": "fraudulent",
"label_confidence": 0.65,
"severity": "high",
"timestamp": "2026-01-03T19:40:00Z",
"trace_id": "42122323-7de1-6c79-a7f0-a745dceefa96"
} | {
"account_age_days": 649,
"account_id": "ACCT-7C10FB7B8E93",
"baseline_risk_score": 0.4,
"kyc_tier": "tier_1",
"session_entropy": 0.732
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 427,
"timestamp": "2026-01-03T19:40:00Z",
"transaction_amount_usd": 1968674.47
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.606,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2105878.99,
"financial_exposure_usd": 2531087.43,
"recoverable_pct": 0.553
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109660",
"label": "benign",
"label_confidence": 0.652,
"severity": "medium",
"timestamp": "2026-01-07T17:00:00Z",
"trace_id": "e607ba36-3218-4b93-139d-4c279d721588"
} | {
"account_age_days": 114,
"account_id": "ACCT-452438AA802A",
"baseline_risk_score": 0.164,
"kyc_tier": "tier_3",
"session_entropy": 0.489
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 116,
"timestamp": "2026-01-07T09:50:00Z",
"transaction_amount_usd": 5.82
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.592,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 0, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 0,
"financial_exposure_usd": 0,
"recoverable_pct": 0.714
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108888",
"label": "benign",
"label_confidence": 0.64,
"severity": "low",
"timestamp": "2026-01-07T04:08:00Z",
"trace_id": "25dfbb8a-09be-ba78-74dc-8ef9189df6e6"
} | {
"account_age_days": 1513,
"account_id": "ACCT-ADFBBFD951B9",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.423
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 585,
"timestamp": "2026-01-07T04:08:00Z",
"transaction_amount_usd": 2246.76
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.613,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 4939.57,
"financial_exposure_usd": 6655.14,
"recoverable_pct": 0.676
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105571",
"label": "fraudulent",
"label_confidence": 0.853,
"severity": "high",
"timestamp": "2026-01-04T20:51:00Z",
"trace_id": "299fe404-0d73-629b-47d9-a2ea5881c2ab"
} | {
"account_age_days": 1568,
"account_id": "ACCT-CE82C4E4CEC5",
"baseline_risk_score": 0.16,
"kyc_tier": "tier_1",
"session_entropy": 0.705
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 441,
"timestamp": "2026-01-04T20:51:00Z",
"transaction_amount_usd": 375270.13
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.825,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2972713.15,
"financial_exposure_usd": 3037592.72,
"recoverable_pct": 0.457
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106980",
"label": "benign",
"label_confidence": 0.593,
"severity": "high",
"timestamp": "2026-01-05T20:20:00Z",
"trace_id": "731c20de-d58a-2692-7d05-dc113ac8252e"
} | {
"account_age_days": 602,
"account_id": "ACCT-2FC389E7B67F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.279
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 378,
"timestamp": "2026-01-05T14:54:00Z",
"transaction_amount_usd": 8.91
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.59,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 1784.24,
"financial_exposure_usd": 4459.06,
"recoverable_pct": 0.44
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105762",
"label": "fraudulent",
"label_confidence": 0.869,
"severity": "critical",
"timestamp": "2026-01-05T00:02:00Z",
"trace_id": "f2003c67-e287-5019-766a-6f66b84dbffa"
} | {
"account_age_days": 886,
"account_id": "ACCT-A6C61B84D875",
"baseline_risk_score": 0.152,
"kyc_tier": "tier_1",
"session_entropy": 0.207
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 381,
"timestamp": "2026-01-05T00:02:00Z",
"transaction_amount_usd": 851864.61
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.513,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2427417.78,
"financial_exposure_usd": 4151493.14,
"recoverable_pct": 0.994
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107777",
"label": "benign",
"label_confidence": 0.523,
"severity": "low",
"timestamp": "2026-01-06T09:37:00Z",
"trace_id": "61d6fa9c-9977-cecd-4373-ca4458028fa3"
} | {
"account_age_days": 481,
"account_id": "ACCT-B720C5407AE5",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.113
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 604,
"timestamp": "2026-01-06T09:37:00Z",
"transaction_amount_usd": 6524.94
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.736,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1982.19,
"financial_exposure_usd": 2992.83,
"recoverable_pct": 0.622
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109657",
"label": "benign",
"label_confidence": 0.546,
"severity": "high",
"timestamp": "2026-01-07T16:57:00Z",
"trace_id": "e92c4cd7-60b4-f8a2-22ab-4f0e41c8b609"
} | {
"account_age_days": 1318,
"account_id": "ACCT-1B57F4985AB7",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.734
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 382,
"timestamp": "2026-01-07T15:07:00Z",
"transaction_amount_usd": 1.54
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.591,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3900.79,
"financial_exposure_usd": 4931.94,
"recoverable_pct": 0.917
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100018",
"label": "fraudulent",
"label_confidence": 0.825,
"severity": "medium",
"timestamp": "2026-01-01T00:18:00Z",
"trace_id": "175a81ec-112f-a612-7969-9ed2ec48bf55"
} | {
"account_age_days": 321,
"account_id": "ACCT-15BFBE9798A2",
"baseline_risk_score": 0.375,
"kyc_tier": "tier_1",
"session_entropy": 0.851
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 110,
"timestamp": "2025-12-31T22:28:00Z",
"transaction_amount_usd": 20.29
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.38,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 262078.35,
"financial_exposure_usd": 465287,
"recoverable_pct": 0.563
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109573",
"label": "benign",
"label_confidence": 0.559,
"severity": "medium",
"timestamp": "2026-01-07T15:33:00Z",
"trace_id": "8d80468b-5376-02d6-1896-910a5be45e96"
} | {
"account_age_days": 530,
"account_id": "ACCT-005837D3315A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.466
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 1134,
"timestamp": "2026-01-07T15:33:00Z",
"transaction_amount_usd": 2984.01
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.611,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1296.02,
"financial_exposure_usd": 1435.46,
"recoverable_pct": 0.714
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106903",
"label": "benign",
"label_confidence": 0.529,
"severity": "medium",
"timestamp": "2026-01-05T19:03:00Z",
"trace_id": "9fb3eb97-ed84-4efd-edbd-6e701ec3053b"
} | {
"account_age_days": 397,
"account_id": "ACCT-40E8E23B942E",
"baseline_risk_score": 0.103,
"kyc_tier": "tier_1",
"session_entropy": 0.924
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 225,
"timestamp": "2026-01-05T08:01:00Z",
"transaction_amount_usd": 14.36
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.699,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 503.76,
"financial_exposure_usd": 580.5,
"recoverable_pct": 0.953
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108671",
"label": "benign",
"label_confidence": 0.624,
"severity": "medium",
"timestamp": "2026-01-07T00:31:00Z",
"trace_id": "e37faacf-eb55-6246-c7a8-932f44a15a9d"
} | {
"account_age_days": 1169,
"account_id": "ACCT-15D97D6C4F83",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.52
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 170,
"timestamp": "2026-01-07T00:31:00Z",
"transaction_amount_usd": 3882.89
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.681,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2697.14,
"financial_exposure_usd": 3728.44,
"recoverable_pct": 0.725
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105625",
"label": "fraudulent",
"label_confidence": 0.858,
"severity": "medium",
"timestamp": "2026-01-04T21:45:00Z",
"trace_id": "dc133a37-9589-7609-7bb2-51c0c7af5468"
} | {
"account_age_days": 1649,
"account_id": "ACCT-D25209CFA231",
"baseline_risk_score": 0.344,
"kyc_tier": "tier_2",
"session_entropy": 0.794
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 372,
"timestamp": "2026-01-04T12:28:00Z",
"transaction_amount_usd": 0.25
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.542,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 9",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1748468.6,
"financial_exposure_usd": 3805651.47,
"recoverable_pct": 0.729
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100764",
"label": "fraudulent",
"label_confidence": 0.812,
"severity": "critical",
"timestamp": "2026-01-01T12:44:00Z",
"trace_id": "99a26957-ef3e-0952-6e82-3445968a89d4"
} | {
"account_age_days": 189,
"account_id": "ACCT-A38E5B68F8B6",
"baseline_risk_score": 0.345,
"kyc_tier": "tier_3",
"session_entropy": 0.794
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 321,
"timestamp": "2026-01-01T11:09:00Z",
"transaction_amount_usd": 24.73
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.512,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 435039.64,
"financial_exposure_usd": 619933.63,
"recoverable_pct": 0.736
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101465",
"label": "fraudulent",
"label_confidence": 0.898,
"severity": "high",
"timestamp": "2026-01-02T00:25:00Z",
"trace_id": "74008e77-b825-743f-a8f0-b4d0dda9bbf3"
} | {
"account_age_days": 670,
"account_id": "ACCT-6042E882F58B",
"baseline_risk_score": 0.394,
"kyc_tier": "tier_3",
"session_entropy": 0.225
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 742,
"timestamp": "2026-01-02T00:25:00Z",
"transaction_amount_usd": 52277.58
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.397,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 1015027.94,
"financial_exposure_usd": 1197269.65,
"recoverable_pct": 0.788
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102295",
"label": "fraudulent",
"label_confidence": 0.827,
"severity": "low",
"timestamp": "2026-01-02T14:15:00Z",
"trace_id": "c61c64a7-cedf-100a-40e4-af57cec0d840"
} | {
"account_age_days": 1255,
"account_id": "ACCT-E8693393F030",
"baseline_risk_score": 0.576,
"kyc_tier": "tier_1",
"session_entropy": 0.362
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 1146,
"timestamp": "2026-01-02T14:15:00Z",
"transaction_amount_usd": 52059.33
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.914,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 338553.69,
"financial_exposure_usd": 409694.5,
"recoverable_pct": 0.523
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107114",
"label": "benign",
"label_confidence": 0.626,
"severity": "low",
"timestamp": "2026-01-05T22:34:00Z",
"trace_id": "9b677519-7468-0e5e-dcb4-c6defabc4eff"
} | {
"account_age_days": 1054,
"account_id": "ACCT-09988ED45EC3",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.23
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 294,
"timestamp": "2026-01-05T18:25:00Z",
"transaction_amount_usd": 20.55
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.57,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 1208.89,
"financial_exposure_usd": 3005.78,
"recoverable_pct": 0.732
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108746",
"label": "benign",
"label_confidence": 0.718,
"severity": "low",
"timestamp": "2026-01-07T01:46:00Z",
"trace_id": "542d4db8-705e-4749-5259-c7660fedecfc"
} | {
"account_age_days": 384,
"account_id": "ACCT-C55EB1320DC4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.555
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 307,
"timestamp": "2026-01-07T00:00:00Z",
"transaction_amount_usd": 17.51
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.457,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1469.06,
"financial_exposure_usd": 2466.67,
"recoverable_pct": 0.858
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102434",
"label": "fraudulent",
"label_confidence": 0.89,
"severity": "medium",
"timestamp": "2026-01-02T16:34:00Z",
"trace_id": "d35dcaca-acbb-50ba-d9b0-e6d8f4f24cd0"
} | {
"account_age_days": 867,
"account_id": "ACCT-D95F7C053B52",
"baseline_risk_score": 0.353,
"kyc_tier": "tier_2",
"session_entropy": 0.368
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 177,
"timestamp": "2026-01-02T16:34:00Z",
"transaction_amount_usd": 103824.58
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.89,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 353402.37,
"financial_exposure_usd": 581091.31,
"recoverable_pct": 0.688
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102967",
"label": "fraudulent",
"label_confidence": 0.872,
"severity": "low",
"timestamp": "2026-01-03T01:27:00Z",
"trace_id": "958ecdf7-6785-9608-dd58-f4e4837dcba3"
} | {
"account_age_days": 124,
"account_id": "ACCT-DCF549AFE98F",
"baseline_risk_score": 0.409,
"kyc_tier": "tier_2",
"session_entropy": 0.269
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "MY",
"latency_ms": 812,
"timestamp": "2026-01-03T01:27:00Z",
"transaction_amount_usd": 6675.25
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.512,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 580545.06,
"financial_exposure_usd": 1180253.87,
"recoverable_pct": 0.516
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101662",
"label": "fraudulent",
"label_confidence": 0.807,
"severity": "medium",
"timestamp": "2026-01-02T03:42:00Z",
"trace_id": "b37994db-e604-b1c1-d266-faf9c47f6026"
} | {
"account_age_days": 1490,
"account_id": "ACCT-9D226676ABEF",
"baseline_risk_score": 0.612,
"kyc_tier": "tier_2",
"session_entropy": 0.156
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 225,
"timestamp": "2026-01-02T03:42:00Z",
"transaction_amount_usd": 70635.74
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.44,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 507337.07,
"financial_exposure_usd": 735533.07,
"recoverable_pct": 0.143
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106960",
"label": "benign",
"label_confidence": 0.624,
"severity": "medium",
"timestamp": "2026-01-05T20:00:00Z",
"trace_id": "e48dad78-9c94-8831-d5a5-7701635d4422"
} | {
"account_age_days": 1974,
"account_id": "ACCT-B41440E12BC8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.931
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 1066,
"timestamp": "2026-01-05T20:00:00Z",
"transaction_amount_usd": 11008.97
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.485,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2476.25,
"financial_exposure_usd": 3253.18,
"recoverable_pct": 0.83
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101520",
"label": "fraudulent",
"label_confidence": 0.878,
"severity": "critical",
"timestamp": "2026-01-02T01:20:00Z",
"trace_id": "f7ac0626-7d55-8003-2679-791b051e65a5"
} | {
"account_age_days": 941,
"account_id": "ACCT-E5CB932FEFF7",
"baseline_risk_score": 0.404,
"kyc_tier": "tier_1",
"session_entropy": 0.923
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 535,
"timestamp": "2026-01-02T01:20:00Z",
"transaction_amount_usd": 51740.45
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.438,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 190590.34,
"financial_exposure_usd": 355780.54,
"recoverable_pct": 0.118
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100640",
"label": "fraudulent",
"label_confidence": 0.958,
"severity": "medium",
"timestamp": "2026-01-01T10:40:00Z",
"trace_id": "bd1d6a46-1b1b-daf4-e13b-39fc4202a016"
} | {
"account_age_days": 163,
"account_id": "ACCT-61D4B227F9D1",
"baseline_risk_score": 0.31,
"kyc_tier": "tier_2",
"session_entropy": 0.661
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 129,
"timestamp": "2026-01-01T00:46:00Z",
"transaction_amount_usd": 7.5
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.376,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 601028.59,
"financial_exposure_usd": 638709.73,
"recoverable_pct": 0.187
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104719",
"label": "fraudulent",
"label_confidence": 0.854,
"severity": "critical",
"timestamp": "2026-01-04T06:39:00Z",
"trace_id": "786b0441-9d13-afee-906c-2af3878ae779"
} | {
"account_age_days": 1679,
"account_id": "ACCT-A09175716792",
"baseline_risk_score": 0.438,
"kyc_tier": "tier_2",
"session_entropy": 0.475
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 767,
"timestamp": "2026-01-04T06:39:00Z",
"transaction_amount_usd": 2099203.51
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.507,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2343892.97,
"financial_exposure_usd": 4711539.36,
"recoverable_pct": 0.591
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108195",
"label": "benign",
"label_confidence": 0.499,
"severity": "medium",
"timestamp": "2026-01-06T16:35:00Z",
"trace_id": "40a72a54-d8af-00c1-87c3-15ad4ccefab2"
} | {
"account_age_days": 1558,
"account_id": "ACCT-BEA59FF1FD4F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.664
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 189,
"timestamp": "2026-01-06T16:35:00Z",
"transaction_amount_usd": 5946.92
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.543,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2602.43,
"financial_exposure_usd": 2866.67,
"recoverable_pct": 0.696
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102327",
"label": "fraudulent",
"label_confidence": 0.837,
"severity": "critical",
"timestamp": "2026-01-02T14:47:00Z",
"trace_id": "67341818-c5da-58bf-4f23-3c354fb6b00d"
} | {
"account_age_days": 344,
"account_id": "ACCT-B9AA0913D7AB",
"baseline_risk_score": 0.529,
"kyc_tier": "tier_1",
"session_entropy": 0.501
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 338,
"timestamp": "2026-01-02T14:47:00Z",
"transaction_amount_usd": 54750.19
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.792,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 260557.55,
"financial_exposure_usd": 431411.41,
"recoverable_pct": 0.656
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109610",
"label": "benign",
"label_confidence": 0.586,
"severity": "medium",
"timestamp": "2026-01-07T16:10:00Z",
"trace_id": "6fcdd592-1b23-1bdb-3310-1fdc9a679143"
} | {
"account_age_days": 800,
"account_id": "ACCT-5EBA0C5D683D",
"baseline_risk_score": 0.094,
"kyc_tier": "tier_1",
"session_entropy": 0.536
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 915,
"timestamp": "2026-01-07T16:10:00Z",
"transaction_amount_usd": 2481.15
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.521,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2665.36,
"financial_exposure_usd": 2744.64,
"recoverable_pct": 0.971
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107115",
"label": "benign",
"label_confidence": 0.53,
"severity": "low",
"timestamp": "2026-01-05T22:35:00Z",
"trace_id": "9a12447b-07ed-97c4-8a86-9684d436a98a"
} | {
"account_age_days": 1523,
"account_id": "ACCT-470DEED2EA80",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.609
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 157,
"timestamp": "2026-01-05T11:16:00Z",
"transaction_amount_usd": 3.36
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.475,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 727.74,
"financial_exposure_usd": 1120.93,
"recoverable_pct": 0.44
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101496",
"label": "fraudulent",
"label_confidence": 0.804,
"severity": "critical",
"timestamp": "2026-01-02T00:56:00Z",
"trace_id": "81145dff-da0f-5e1b-ba50-9e3959002fd6"
} | {
"account_age_days": 304,
"account_id": "ACCT-C0E016715E2D",
"baseline_risk_score": 0.611,
"kyc_tier": "tier_2",
"session_entropy": 0.646
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 425,
"timestamp": "2026-01-02T00:56:00Z",
"transaction_amount_usd": 3683.58
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.943,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 846946.68,
"financial_exposure_usd": 1292043.42,
"recoverable_pct": 0.847
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100632",
"label": "fraudulent",
"label_confidence": 0.97,
"severity": "high",
"timestamp": "2026-01-01T10:32:00Z",
"trace_id": "2e155a39-c254-cb40-e70e-695a9b605d6f"
} | {
"account_age_days": 1382,
"account_id": "ACCT-65B5451E7A79",
"baseline_risk_score": 0.257,
"kyc_tier": "tier_2",
"session_entropy": 0.666
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "JP",
"latency_ms": 217,
"timestamp": "2026-01-01T10:32:00Z",
"transaction_amount_usd": 10537.71
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.832,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 503528.53,
"financial_exposure_usd": 527177.74,
"recoverable_pct": 0.385
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107487",
"label": "benign",
"label_confidence": 0.649,
"severity": "low",
"timestamp": "2026-01-06T04:47:00Z",
"trace_id": "e8bd6120-447f-6903-1e2a-1212e6681a47"
} | {
"account_age_days": 795,
"account_id": "ACCT-3362BC10A014",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.141
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 425,
"timestamp": "2026-01-06T04:47:00Z",
"transaction_amount_usd": 7022.23
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.626,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 949.31,
"financial_exposure_usd": 1845.89,
"recoverable_pct": 0.647
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104671",
"label": "fraudulent",
"label_confidence": 0.704,
"severity": "high",
"timestamp": "2026-01-04T05:51:00Z",
"trace_id": "0d3d42e2-1d08-af01-367f-a40b3b7d3733"
} | {
"account_age_days": 1769,
"account_id": "ACCT-D2E0B25BE5DC",
"baseline_risk_score": 0.234,
"kyc_tier": "tier_1",
"session_entropy": 0.245
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 939,
"timestamp": "2026-01-04T05:51:00Z",
"transaction_amount_usd": 730639.21
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.935,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3402942.03,
"financial_exposure_usd": 5840371.92,
"recoverable_pct": 0.439
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109836",
"label": "benign",
"label_confidence": 0.579,
"severity": "medium",
"timestamp": "2026-01-07T19:56:00Z",
"trace_id": "c4dee4cf-32bd-e583-d734-e9d6fe47a0de"
} | {
"account_age_days": 363,
"account_id": "ACCT-AA6307A5CFE4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.619
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 98,
"timestamp": "2026-01-07T15:09:00Z",
"transaction_amount_usd": 22.55
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.64,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 182.78,
"financial_exposure_usd": 428.51,
"recoverable_pct": 0.93
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102948",
"label": "fraudulent",
"label_confidence": 0.866,
"severity": "critical",
"timestamp": "2026-01-03T01:08:00Z",
"trace_id": "64f4b100-9f3f-5c15-f395-2ba21d7a7403"
} | {
"account_age_days": 628,
"account_id": "ACCT-B87C34BDC1DF",
"baseline_risk_score": 0.509,
"kyc_tier": "tier_2",
"session_entropy": 0.223
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 188,
"timestamp": "2026-01-02T14:22:00Z",
"transaction_amount_usd": 12.54
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.704,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 316408.1,
"financial_exposure_usd": 478635.83,
"recoverable_pct": 0.59
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104642",
"label": "fraudulent",
"label_confidence": 0.868,
"severity": "high",
"timestamp": "2026-01-04T05:22:00Z",
"trace_id": "38badc3f-7923-df9b-d5d2-a33165156dcf"
} | {
"account_age_days": 1787,
"account_id": "ACCT-5AC719DF3023",
"baseline_risk_score": 0.148,
"kyc_tier": "tier_1",
"session_entropy": 0.826
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 267,
"timestamp": "2026-01-04T05:22:00Z",
"transaction_amount_usd": 1605172.78
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.452,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4517841.87,
"financial_exposure_usd": 6497090.39,
"recoverable_pct": 0.706
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106082",
"label": "fraudulent",
"label_confidence": 0.822,
"severity": "medium",
"timestamp": "2026-01-05T05:22:00Z",
"trace_id": "8e94824f-be6e-6150-eb3f-d20eb669ad56"
} | {
"account_age_days": 1049,
"account_id": "ACCT-3124F2C78619",
"baseline_risk_score": 0.449,
"kyc_tier": "tier_2",
"session_entropy": 0.741
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 380,
"timestamp": "2026-01-05T04:18:00Z",
"transaction_amount_usd": 12.14
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.82,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2313809.79,
"financial_exposure_usd": 4462314.68,
"recoverable_pct": 0.966
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108471",
"label": "benign",
"label_confidence": 0.538,
"severity": "low",
"timestamp": "2026-01-06T21:11:00Z",
"trace_id": "763f317f-131e-5bfa-5ac6-d79ac9f20fd9"
} | {
"account_age_days": 609,
"account_id": "ACCT-2F333642AA4E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.143
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 763,
"timestamp": "2026-01-06T21:11:00Z",
"transaction_amount_usd": 9549.26
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.754,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1477.09,
"financial_exposure_usd": 2599.31,
"recoverable_pct": 0.92
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101392",
"label": "fraudulent",
"label_confidence": 0.92,
"severity": "high",
"timestamp": "2026-01-01T23:12:00Z",
"trace_id": "377acbde-adf6-21f2-131c-5301f7767dd2"
} | {
"account_age_days": 1953,
"account_id": "ACCT-A1471BE7C348",
"baseline_risk_score": 0.359,
"kyc_tier": "tier_3",
"session_entropy": 0.762
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "LU",
"latency_ms": 201,
"timestamp": "2026-01-01T23:12:00Z",
"transaction_amount_usd": 116855.84
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.751,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 327004.76,
"financial_exposure_usd": 445484.54,
"recoverable_pct": 0.709
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104733",
"label": "fraudulent",
"label_confidence": 0.648,
"severity": "critical",
"timestamp": "2026-01-04T06:53:00Z",
"trace_id": "aa9e8cf2-cefb-f8a6-aec9-efe43cfe51d8"
} | {
"account_age_days": 1731,
"account_id": "ACCT-89647D666863",
"baseline_risk_score": 0.127,
"kyc_tier": "tier_1",
"session_entropy": 0.387
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 90,
"timestamp": "2026-01-03T20:43:00Z",
"transaction_amount_usd": 4.28
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.426,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3887141.39,
"financial_exposure_usd": 4849316.47,
"recoverable_pct": 0.966
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101379",
"label": "fraudulent",
"label_confidence": 0.955,
"severity": "high",
"timestamp": "2026-01-01T22:59:00Z",
"trace_id": "6350ad5b-0179-2925-a30f-bce80220a69b"
} | {
"account_age_days": 944,
"account_id": "ACCT-6CF78D41942D",
"baseline_risk_score": 0.285,
"kyc_tier": "tier_1",
"session_entropy": 0.87
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 151,
"timestamp": "2026-01-01T18:53:00Z",
"transaction_amount_usd": 22.63
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.676,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 337111.05,
"financial_exposure_usd": 571412.83,
"recoverable_pct": 0.074
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107663",
"label": "benign",
"label_confidence": 0.565,
"severity": "medium",
"timestamp": "2026-01-06T07:43:00Z",
"trace_id": "ba0c7279-2179-0dbd-dc3a-2b7c02f7ed01"
} | {
"account_age_days": 1457,
"account_id": "ACCT-3EAB6D486F9C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.24
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 626,
"timestamp": "2026-01-06T07:43:00Z",
"transaction_amount_usd": 4945.64
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.457,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3560.66,
"financial_exposure_usd": 6399.14,
"recoverable_pct": 0.912
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106958",
"label": "benign",
"label_confidence": 0.684,
"severity": "medium",
"timestamp": "2026-01-05T19:58:00Z",
"trace_id": "dfd1cc08-74b7-a0a4-6a63-21c01a24ee04"
} | {
"account_age_days": 602,
"account_id": "ACCT-492FC64A9316",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.243
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 102,
"timestamp": "2026-01-05T09:51:00Z",
"transaction_amount_usd": 14.68
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.474,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1628.45,
"financial_exposure_usd": 2035.29,
"recoverable_pct": 0.607
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108837",
"label": "benign",
"label_confidence": 0.574,
"severity": "low",
"timestamp": "2026-01-07T03:17:00Z",
"trace_id": "62bbea07-7a84-a040-89d5-3e120e463989"
} | {
"account_age_days": 684,
"account_id": "ACCT-5ECF9A38070A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.759
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 194,
"timestamp": "2026-01-06T21:56:00Z",
"transaction_amount_usd": 0.95
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.466,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2225.68,
"financial_exposure_usd": 2380.55,
"recoverable_pct": 0.861
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108721",
"label": "benign",
"label_confidence": 0.714,
"severity": "high",
"timestamp": "2026-01-07T01:21:00Z",
"trace_id": "8cbcf86c-0f5a-13eb-03f3-bec2168f8389"
} | {
"account_age_days": 1572,
"account_id": "ACCT-56270D2D162D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.311
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 523,
"timestamp": "2026-01-07T01:21:00Z",
"transaction_amount_usd": 2770.26
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.701,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 214.69,
"financial_exposure_usd": 515.02,
"recoverable_pct": 0.979
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102156",
"label": "fraudulent",
"label_confidence": 0.915,
"severity": "low",
"timestamp": "2026-01-02T11:56:00Z",
"trace_id": "c2fc7439-e250-7fab-ea7a-8db4257d7ff5"
} | {
"account_age_days": 1733,
"account_id": "ACCT-7B8F306A06EC",
"baseline_risk_score": 0.34,
"kyc_tier": "tier_3",
"session_entropy": 0.391
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 106,
"timestamp": "2026-01-02T11:01:00Z",
"transaction_amount_usd": 2.25
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.786,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 284208.95,
"financial_exposure_usd": 532795.5,
"recoverable_pct": 0.816
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.