schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107830",
"label": "benign",
"label_confidence": 0.535,
"severity": "low",
"timestamp": "2026-01-06T10:30:00Z",
"trace_id": "5ad5684f-ac0c-e56b-9dcc-cb2112b51b85"
} | {
"account_age_days": 336,
"account_id": "ACCT-321071F248D8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.139
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 234,
"timestamp": "2026-01-06T10:30:00Z",
"transaction_amount_usd": 2469.92
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.73,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 5672.11,
"financial_exposure_usd": 7362.06,
"recoverable_pct": 0.898
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107742",
"label": "benign",
"label_confidence": 0.624,
"severity": "medium",
"timestamp": "2026-01-06T09:02:00Z",
"trace_id": "7b9b2258-97e4-61d2-b439-cccc68520374"
} | {
"account_age_days": 1670,
"account_id": "ACCT-4245A3F29475",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.92
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 388,
"timestamp": "2026-01-06T09:02:00Z",
"transaction_amount_usd": 11056.09
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.769,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 4379.4,
"financial_exposure_usd": 6642.81,
"recoverable_pct": 0.592
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106739",
"label": "benign",
"label_confidence": 0.582,
"severity": "low",
"timestamp": "2026-01-05T16:19:00Z",
"trace_id": "660a1ef8-c0ed-3c44-9db7-e1b687af8f2c"
} | {
"account_age_days": 1564,
"account_id": "ACCT-BF2E555B3D47",
"baseline_risk_score": 0.071,
"kyc_tier": "tier_3",
"session_entropy": 0.698
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 225,
"timestamp": "2026-01-05T06:26:00Z",
"transaction_amount_usd": 11.61
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.521,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1632.49,
"financial_exposure_usd": 1956.64,
"recoverable_pct": 0.634
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109118",
"label": "benign",
"label_confidence": 0.489,
"severity": "low",
"timestamp": "2026-01-07T07:58:00Z",
"trace_id": "3b084e25-b0ac-3497-c1d8-17f6b101dc7b"
} | {
"account_age_days": 1033,
"account_id": "ACCT-4D58F2F0B8DB",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.186
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 336,
"timestamp": "2026-01-07T07:58:00Z",
"transaction_amount_usd": 6610.12
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.603,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 0, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 0,
"financial_exposure_usd": 0,
"recoverable_pct": 0.865
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101571",
"label": "fraudulent",
"label_confidence": 0.813,
"severity": "critical",
"timestamp": "2026-01-02T02:11:00Z",
"trace_id": "5c239922-1c81-2ddb-4745-283bc3286f06"
} | {
"account_age_days": 1371,
"account_id": "ACCT-D79E5352651B",
"baseline_risk_score": 0.484,
"kyc_tier": "tier_2",
"session_entropy": 0.154
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "HK",
"latency_ms": 530,
"timestamp": "2026-01-02T02:11:00Z",
"transaction_amount_usd": 78080.21
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.903,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 309142.44,
"financial_exposure_usd": 646860.62,
"recoverable_pct": 0.005
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100366",
"label": "fraudulent",
"label_confidence": 0.825,
"severity": "critical",
"timestamp": "2026-01-01T06:06:00Z",
"trace_id": "95116c5f-34c4-f6ad-4fe0-887115f54aa0"
} | {
"account_age_days": 199,
"account_id": "ACCT-49CE76952B0F",
"baseline_risk_score": 0.258,
"kyc_tier": "tier_2",
"session_entropy": 0.73
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 924,
"timestamp": "2026-01-01T06:06:00Z",
"transaction_amount_usd": 112629.09
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.366,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 543676.17,
"financial_exposure_usd": 789951.69,
"recoverable_pct": 0.088
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108163",
"label": "benign",
"label_confidence": 0.474,
"severity": "high",
"timestamp": "2026-01-06T16:03:00Z",
"trace_id": "ad1a294a-2cf0-be27-4ff9-134420d8bd17"
} | {
"account_age_days": 1146,
"account_id": "ACCT-EFE4CCD27E47",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.413
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 672,
"timestamp": "2026-01-06T16:03:00Z",
"transaction_amount_usd": 5343.67
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.491,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1439.65,
"financial_exposure_usd": 2634.65,
"recoverable_pct": 0.492
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104000",
"label": "fraudulent",
"label_confidence": 0.824,
"severity": "low",
"timestamp": "2026-01-03T18:40:00Z",
"trace_id": "d6027404-8926-1523-0918-6c37ac9d3ff8"
} | {
"account_age_days": 13,
"account_id": "ACCT-CBF41DB6B120",
"baseline_risk_score": 0.092,
"kyc_tier": "tier_3",
"session_entropy": 0.527
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 915,
"timestamp": "2026-01-03T18:40:00Z",
"transaction_amount_usd": 1760674.78
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.873,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4866113.36,
"financial_exposure_usd": 5792101.15,
"recoverable_pct": 0.784
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102622",
"label": "fraudulent",
"label_confidence": 0.782,
"severity": "critical",
"timestamp": "2026-01-02T19:42:00Z",
"trace_id": "8c96f63e-c2ad-90fc-4959-fe749feac03c"
} | {
"account_age_days": 718,
"account_id": "ACCT-5267418611D9",
"baseline_risk_score": 0.549,
"kyc_tier": "tier_3",
"session_entropy": 0.412
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 272,
"timestamp": "2026-01-02T19:42:00Z",
"transaction_amount_usd": 84199.37
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.397,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 325472.09,
"financial_exposure_usd": 333602.13,
"recoverable_pct": 0.044
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100974",
"label": "fraudulent",
"label_confidence": 0.847,
"severity": "high",
"timestamp": "2026-01-01T16:14:00Z",
"trace_id": "bf7ac4b9-708b-9fd1-52b8-741a48c2b3b3"
} | {
"account_age_days": 483,
"account_id": "ACCT-FABFAC208040",
"baseline_risk_score": 0.499,
"kyc_tier": "tier_3",
"session_entropy": 0.531
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 968,
"timestamp": "2026-01-01T16:14:00Z",
"transaction_amount_usd": 63029.78
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.362,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 517399.97,
"financial_exposure_usd": 815146.84,
"recoverable_pct": 0.106
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104097",
"label": "fraudulent",
"label_confidence": 0.936,
"severity": "low",
"timestamp": "2026-01-03T20:17:00Z",
"trace_id": "de327200-a24b-ca7b-7113-62eeb310e99f"
} | {
"account_age_days": 109,
"account_id": "ACCT-9036A359A7BE",
"baseline_risk_score": 0.388,
"kyc_tier": "tier_2",
"session_entropy": 0.827
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 287,
"timestamp": "2026-01-03T08:03:00Z",
"transaction_amount_usd": 14.89
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.356,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3755346.31,
"financial_exposure_usd": 5353889.04,
"recoverable_pct": 0.571
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100508",
"label": "fraudulent",
"label_confidence": 0.852,
"severity": "medium",
"timestamp": "2026-01-01T08:28:00Z",
"trace_id": "15ab577d-dba7-48a7-5fef-77a41adfd612"
} | {
"account_age_days": 1608,
"account_id": "ACCT-EE26E2BC987D",
"baseline_risk_score": 0.383,
"kyc_tier": "tier_2",
"session_entropy": 0.407
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 303,
"timestamp": "2025-12-31T23:05:00Z",
"transaction_amount_usd": 19.12
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.769,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 261587.01,
"financial_exposure_usd": 421262,
"recoverable_pct": 0.283
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108189",
"label": "benign",
"label_confidence": 0.688,
"severity": "low",
"timestamp": "2026-01-06T16:29:00Z",
"trace_id": "488ff26f-abfb-d6a2-9df3-749829ffda03"
} | {
"account_age_days": 714,
"account_id": "ACCT-A300ABDA8301",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.446
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 578,
"timestamp": "2026-01-06T16:29:00Z",
"transaction_amount_usd": 3070.78
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.586,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2816.55,
"financial_exposure_usd": 3645.03,
"recoverable_pct": 0.907
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101948",
"label": "fraudulent",
"label_confidence": 0.923,
"severity": "low",
"timestamp": "2026-01-02T08:28:00Z",
"trace_id": "9090681e-a248-279f-a2a7-cf48d5310e26"
} | {
"account_age_days": 1406,
"account_id": "ACCT-AD421C4C1B47",
"baseline_risk_score": 0.491,
"kyc_tier": "tier_2",
"session_entropy": 0.174
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 891,
"timestamp": "2026-01-02T08:28:00Z",
"transaction_amount_usd": 99666.65
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.678,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 124529.96,
"financial_exposure_usd": 173748.63,
"recoverable_pct": 0.093
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104172",
"label": "fraudulent",
"label_confidence": 0.679,
"severity": "high",
"timestamp": "2026-01-03T21:32:00Z",
"trace_id": "4a94718b-625c-e655-df99-4b7bb0fe356c"
} | {
"account_age_days": 1346,
"account_id": "ACCT-51A42C329D45",
"baseline_risk_score": 0.191,
"kyc_tier": "tier_1",
"session_entropy": 0.478
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 886,
"timestamp": "2026-01-03T21:32:00Z",
"transaction_amount_usd": 57868.05
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.575,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4217378.85,
"financial_exposure_usd": 7228452.92,
"recoverable_pct": 0.565
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109605",
"label": "benign",
"label_confidence": 0.694,
"severity": "medium",
"timestamp": "2026-01-07T16:05:00Z",
"trace_id": "52014bfa-5fa6-3eb0-5598-0935933d6c75"
} | {
"account_age_days": 1522,
"account_id": "ACCT-2EEE68F2032D",
"baseline_risk_score": 0.086,
"kyc_tier": "tier_1",
"session_entropy": 0.174
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 948,
"timestamp": "2026-01-07T16:05:00Z",
"transaction_amount_usd": 10946.18
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.673,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1857.84,
"financial_exposure_usd": 2119.96,
"recoverable_pct": 0.702
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105502",
"label": "fraudulent",
"label_confidence": 0.836,
"severity": "medium",
"timestamp": "2026-01-04T19:42:00Z",
"trace_id": "b90c1b12-ec7c-7595-2572-761b8f3a39d7"
} | {
"account_age_days": 472,
"account_id": "ACCT-754BF03B650B",
"baseline_risk_score": 0.303,
"kyc_tier": "tier_1",
"session_entropy": 0.865
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 844,
"timestamp": "2026-01-04T19:42:00Z",
"transaction_amount_usd": 2960663.97
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.408,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2381710.43,
"financial_exposure_usd": 4188575.59,
"recoverable_pct": 0.435
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106828",
"label": "benign",
"label_confidence": 0.637,
"severity": "medium",
"timestamp": "2026-01-05T17:48:00Z",
"trace_id": "a27a2856-2115-f10d-3403-1657e3fdb92a"
} | {
"account_age_days": 860,
"account_id": "ACCT-070436788E30",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.424
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 97,
"timestamp": "2026-01-05T17:48:00Z",
"transaction_amount_usd": 3265.28
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.58,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 861.64,
"financial_exposure_usd": 1232.18,
"recoverable_pct": 0.45
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105368",
"label": "fraudulent",
"label_confidence": 0.722,
"severity": "high",
"timestamp": "2026-01-04T17:28:00Z",
"trace_id": "846e6466-edb2-830c-90be-e0034c094683"
} | {
"account_age_days": 1696,
"account_id": "ACCT-0AF14BFF0299",
"baseline_risk_score": 0.236,
"kyc_tier": "tier_2",
"session_entropy": 0.692
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 298,
"timestamp": "2026-01-04T17:28:00Z",
"transaction_amount_usd": 2689526.06
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.939,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5203951.48,
"financial_exposure_usd": 7619314.04,
"recoverable_pct": 0.887
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104332",
"label": "fraudulent",
"label_confidence": 0.902,
"severity": "high",
"timestamp": "2026-01-04T00:12:00Z",
"trace_id": "db3e5663-098c-934b-bc48-370e6857e4e6"
} | {
"account_age_days": 237,
"account_id": "ACCT-3CDF47F82F21",
"baseline_risk_score": 0.424,
"kyc_tier": "tier_3",
"session_entropy": 0.233
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 1011,
"timestamp": "2026-01-04T00:12:00Z",
"transaction_amount_usd": 1593678.28
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.535,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 565477.15,
"financial_exposure_usd": 906497.8,
"recoverable_pct": 0.501
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109851",
"label": "benign",
"label_confidence": 0.513,
"severity": "medium",
"timestamp": "2026-01-07T20:11:00Z",
"trace_id": "f3c5b248-29c0-4175-7914-b6d97936581e"
} | {
"account_age_days": 614,
"account_id": "ACCT-0B5F511019C9",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.149
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 130,
"timestamp": "2026-01-07T17:10:00Z",
"transaction_amount_usd": 14.66
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.478,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1313.22,
"financial_exposure_usd": 1846.8,
"recoverable_pct": 0.536
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105940",
"label": "fraudulent",
"label_confidence": 0.926,
"severity": "medium",
"timestamp": "2026-01-05T03:00:00Z",
"trace_id": "2c338f92-7695-d707-9b45-5bf61b1195d6"
} | {
"account_age_days": 1602,
"account_id": "ACCT-12A54EE95CCA",
"baseline_risk_score": 0.227,
"kyc_tier": "tier_3",
"session_entropy": 0.227
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 412,
"timestamp": "2026-01-05T03:00:00Z",
"transaction_amount_usd": 1254534.11
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.574,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2071568.7,
"financial_exposure_usd": 2499193.29,
"recoverable_pct": 0.441
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109013",
"label": "benign",
"label_confidence": 0.615,
"severity": "low",
"timestamp": "2026-01-07T06:13:00Z",
"trace_id": "69807635-e4b3-5b9c-27da-fba99f233e43"
} | {
"account_age_days": 1498,
"account_id": "ACCT-11DB916C482F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.774
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 918,
"timestamp": "2026-01-07T06:13:00Z",
"transaction_amount_usd": 5560.11
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.644,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 900.88,
"financial_exposure_usd": 1289.97,
"recoverable_pct": 0.92
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103651",
"label": "fraudulent",
"label_confidence": 0.817,
"severity": "medium",
"timestamp": "2026-01-03T12:51:00Z",
"trace_id": "90c5ca04-a608-e488-f1cc-8c1f155fcb04"
} | {
"account_age_days": 307,
"account_id": "ACCT-6AE3BF982961",
"baseline_risk_score": 0.224,
"kyc_tier": "tier_2",
"session_entropy": 0.791
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 83,
"timestamp": "2026-01-03T12:51:00Z",
"transaction_amount_usd": 2189008.86
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.77,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 688141.03,
"financial_exposure_usd": 950365.82,
"recoverable_pct": 0.777
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105956",
"label": "fraudulent",
"label_confidence": 0.615,
"severity": "medium",
"timestamp": "2026-01-05T03:16:00Z",
"trace_id": "71f3a462-1d94-dc36-431b-5a6988afba2e"
} | {
"account_age_days": 1236,
"account_id": "ACCT-17F590E602E2",
"baseline_risk_score": 0.4,
"kyc_tier": "tier_3",
"session_entropy": 0.381
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 1010,
"timestamp": "2026-01-05T03:16:00Z",
"transaction_amount_usd": 2230919.96
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.379,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1551671.99,
"financial_exposure_usd": 2342141.45,
"recoverable_pct": 0.785
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108243",
"label": "benign",
"label_confidence": 0.453,
"severity": "medium",
"timestamp": "2026-01-06T17:23:00Z",
"trace_id": "8b72c1ea-c30b-5af5-2003-17a29765ee5d"
} | {
"account_age_days": 1186,
"account_id": "ACCT-8366A06EEA57",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.866
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 530,
"timestamp": "2026-01-06T17:23:00Z",
"transaction_amount_usd": 4414.36
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.561,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 947.64,
"financial_exposure_usd": 1390.17,
"recoverable_pct": 0.602
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106809",
"label": "benign",
"label_confidence": 0.652,
"severity": "high",
"timestamp": "2026-01-05T17:29:00Z",
"trace_id": "ad0eb4c5-7bdd-af92-3130-72cc4487bae3"
} | {
"account_age_days": 1984,
"account_id": "ACCT-771E20B3C93D",
"baseline_risk_score": 0.159,
"kyc_tier": "tier_1",
"session_entropy": 0.902
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 954,
"timestamp": "2026-01-05T17:29:00Z",
"transaction_amount_usd": 9967.02
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.795,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1640.27,
"financial_exposure_usd": 1879.49,
"recoverable_pct": 0.416
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102775",
"label": "fraudulent",
"label_confidence": 0.772,
"severity": "critical",
"timestamp": "2026-01-02T22:15:00Z",
"trace_id": "f84e2411-94e7-6d2a-7bbe-7634191a11b9"
} | {
"account_age_days": 1390,
"account_id": "ACCT-14016798262F",
"baseline_risk_score": 0.282,
"kyc_tier": "tier_1",
"session_entropy": 0.177
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 574,
"timestamp": "2026-01-02T22:15:00Z",
"transaction_amount_usd": 115732.51
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.774,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 97880.55,
"financial_exposure_usd": 149901.94,
"recoverable_pct": 0.603
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108786",
"label": "benign",
"label_confidence": 0.669,
"severity": "low",
"timestamp": "2026-01-07T02:26:00Z",
"trace_id": "d6dfb0d5-f33d-cc35-65dd-d5bd4eb7875d"
} | {
"account_age_days": 1052,
"account_id": "ACCT-2C96B6F8B027",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.604
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 396,
"timestamp": "2026-01-06T19:39:00Z",
"transaction_amount_usd": 2.19
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.554,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1290.76,
"financial_exposure_usd": 1816.25,
"recoverable_pct": 0.996
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103507",
"label": "fraudulent",
"label_confidence": 0.864,
"severity": "medium",
"timestamp": "2026-01-03T10:27:00Z",
"trace_id": "f1afc891-534a-7c49-525a-b040af3a21f3"
} | {
"account_age_days": 1222,
"account_id": "ACCT-A02F35598FBB",
"baseline_risk_score": 0.3,
"kyc_tier": "tier_1",
"session_entropy": 0.799
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 609,
"timestamp": "2026-01-03T10:27:00Z",
"transaction_amount_usd": 1847411.75
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.93,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 3886823.91,
"financial_exposure_usd": 7052188.99,
"recoverable_pct": 0.499
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109921",
"label": "benign",
"label_confidence": 0.519,
"severity": "medium",
"timestamp": "2026-01-07T21:21:00Z",
"trace_id": "380328d2-0306-d651-e262-1aebeb2c459c"
} | {
"account_age_days": 1816,
"account_id": "ACCT-A3AB1501FB35",
"baseline_risk_score": 0.158,
"kyc_tier": "tier_1",
"session_entropy": 0.892
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 1176,
"timestamp": "2026-01-07T21:21:00Z",
"transaction_amount_usd": 7282.58
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.612,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1570.88,
"financial_exposure_usd": 2894.64,
"recoverable_pct": 0.632
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105366",
"label": "fraudulent",
"label_confidence": 0.895,
"severity": "low",
"timestamp": "2026-01-04T17:26:00Z",
"trace_id": "4fec4309-8630-a8ae-074a-12a782552c51"
} | {
"account_age_days": 273,
"account_id": "ACCT-CA162925E778",
"baseline_risk_score": 0.109,
"kyc_tier": "tier_3",
"session_entropy": 0.472
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 245,
"timestamp": "2026-01-04T17:26:00Z",
"transaction_amount_usd": 950151.54
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.687,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3407409.83,
"financial_exposure_usd": 5947314.99,
"recoverable_pct": 0.716
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105085",
"label": "fraudulent",
"label_confidence": 0.67,
"severity": "medium",
"timestamp": "2026-01-04T12:45:00Z",
"trace_id": "f920056f-2dd0-90ab-f539-0887ee0da562"
} | {
"account_age_days": 828,
"account_id": "ACCT-94E6D2D38D9D",
"baseline_risk_score": 0.077,
"kyc_tier": "tier_3",
"session_entropy": 0.575
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 1073,
"timestamp": "2026-01-04T12:45:00Z",
"transaction_amount_usd": 1146525.49
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.805,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 6470728.74,
"financial_exposure_usd": 6478583.48,
"recoverable_pct": 0.442
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101402",
"label": "fraudulent",
"label_confidence": 0.957,
"severity": "medium",
"timestamp": "2026-01-01T23:22:00Z",
"trace_id": "cce2ce13-fc06-0bcd-9834-52a690894cf0"
} | {
"account_age_days": 1647,
"account_id": "ACCT-DFB5478C5A3F",
"baseline_risk_score": 0.28,
"kyc_tier": "tier_2",
"session_entropy": 0.853
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "SG",
"latency_ms": 353,
"timestamp": "2026-01-01T23:22:00Z",
"transaction_amount_usd": 73262.54
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.411,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 993843.19,
"financial_exposure_usd": 1234831.51,
"recoverable_pct": 0.512
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107476",
"label": "benign",
"label_confidence": 0.51,
"severity": "low",
"timestamp": "2026-01-06T04:36:00Z",
"trace_id": "10169f97-5372-9963-3787-fe319a672b01"
} | {
"account_age_days": 1434,
"account_id": "ACCT-5152A8A14599",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.11
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 263,
"timestamp": "2026-01-05T22:06:00Z",
"transaction_amount_usd": 9.44
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.58,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 2096.15,
"financial_exposure_usd": 3385.19,
"recoverable_pct": 0.437
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102367",
"label": "fraudulent",
"label_confidence": 0.979,
"severity": "medium",
"timestamp": "2026-01-02T15:27:00Z",
"trace_id": "204a8eee-857b-6aa7-f151-8b630b345ee1"
} | {
"account_age_days": 740,
"account_id": "ACCT-B77AF220A4BD",
"baseline_risk_score": 0.506,
"kyc_tier": "tier_2",
"session_entropy": 0.823
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 336,
"timestamp": "2026-01-02T03:50:00Z",
"transaction_amount_usd": 11.31
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.496,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 742343.41,
"financial_exposure_usd": 789488.48,
"recoverable_pct": 0.163
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103982",
"label": "fraudulent",
"label_confidence": 0.874,
"severity": "critical",
"timestamp": "2026-01-03T18:22:00Z",
"trace_id": "e20d67b5-6b2c-b6f2-36dd-1ae464245a61"
} | {
"account_age_days": 743,
"account_id": "ACCT-D74ABC12B0A9",
"baseline_risk_score": 0.17,
"kyc_tier": "tier_1",
"session_entropy": 0.311
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 508,
"timestamp": "2026-01-03T18:22:00Z",
"transaction_amount_usd": 1595603.53
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.43,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 5897411.63,
"financial_exposure_usd": 6638292.7,
"recoverable_pct": 0.515
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106939",
"label": "benign",
"label_confidence": 0.743,
"severity": "critical",
"timestamp": "2026-01-05T19:39:00Z",
"trace_id": "ae9718f3-117d-f380-c6d9-4232892b65b9"
} | {
"account_age_days": 761,
"account_id": "ACCT-91F75F26B585",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.446
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 360,
"timestamp": "2026-01-05T15:44:00Z",
"transaction_amount_usd": 2.55
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.643,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1086.98,
"financial_exposure_usd": 2351.4,
"recoverable_pct": 0.758
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106948",
"label": "benign",
"label_confidence": 0.469,
"severity": "medium",
"timestamp": "2026-01-05T19:48:00Z",
"trace_id": "b428cb86-b7a3-d130-80e8-5c25ea4d073e"
} | {
"account_age_days": 834,
"account_id": "ACCT-4D1BC4B4989E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.338
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 112,
"timestamp": "2026-01-05T19:48:00Z",
"transaction_amount_usd": 13628.87
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.47,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2049.46,
"financial_exposure_usd": 3010.8,
"recoverable_pct": 0.52
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101791",
"label": "fraudulent",
"label_confidence": 0.93,
"severity": "high",
"timestamp": "2026-01-02T05:51:00Z",
"trace_id": "6c7f9d86-006c-cbcf-2abf-fbb3766457a9"
} | {
"account_age_days": 1203,
"account_id": "ACCT-D7B2909AA08B",
"baseline_risk_score": 0.537,
"kyc_tier": "tier_3",
"session_entropy": 0.919
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 217,
"timestamp": "2026-01-02T02:35:00Z",
"transaction_amount_usd": 12.04
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.364,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 498188.79,
"financial_exposure_usd": 542620.69,
"recoverable_pct": 0.466
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102274",
"label": "fraudulent",
"label_confidence": 0.854,
"severity": "high",
"timestamp": "2026-01-02T13:54:00Z",
"trace_id": "8b635a8e-a135-9414-1b02-ced91e3eac7e"
} | {
"account_age_days": 821,
"account_id": "ACCT-BB137C2D6345",
"baseline_risk_score": 0.537,
"kyc_tier": "tier_3",
"session_entropy": 0.759
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 312,
"timestamp": "2026-01-02T13:54:00Z",
"transaction_amount_usd": 36122.24
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.592,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 1010831.88,
"financial_exposure_usd": 1038454.02,
"recoverable_pct": 0.504
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107429",
"label": "benign",
"label_confidence": 0.628,
"severity": "medium",
"timestamp": "2026-01-06T03:49:00Z",
"trace_id": "65a6bc79-bb40-dca5-0f70-ed8122267a33"
} | {
"account_age_days": 850,
"account_id": "ACCT-48781292867F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.39
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 810,
"timestamp": "2026-01-06T03:49:00Z",
"transaction_amount_usd": 324.44
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.562,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2233.38,
"financial_exposure_usd": 3548.53,
"recoverable_pct": 0.992
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107822",
"label": "benign",
"label_confidence": 0.5,
"severity": "high",
"timestamp": "2026-01-06T10:22:00Z",
"trace_id": "eba69380-406d-8a7c-4008-03996735f2aa"
} | {
"account_age_days": 50,
"account_id": "ACCT-7BE41860DBED",
"baseline_risk_score": 0.123,
"kyc_tier": "tier_2",
"session_entropy": 0.581
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 705,
"timestamp": "2026-01-06T10:22:00Z",
"transaction_amount_usd": 4586.19
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.608,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2713.09,
"financial_exposure_usd": 2714.06,
"recoverable_pct": 0.446
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109747",
"label": "benign",
"label_confidence": 0.716,
"severity": "medium",
"timestamp": "2026-01-07T18:27:00Z",
"trace_id": "c46c14de-0e82-0196-1241-4df1a6c7ed52"
} | {
"account_age_days": 1821,
"account_id": "ACCT-349CD83EF9A6",
"baseline_risk_score": 0.187,
"kyc_tier": "tier_2",
"session_entropy": 0.232
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 477,
"timestamp": "2026-01-07T18:27:00Z",
"transaction_amount_usd": 2427.35
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.656,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 609.18,
"financial_exposure_usd": 1304.06,
"recoverable_pct": 0.491
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109201",
"label": "benign",
"label_confidence": 0.735,
"severity": "low",
"timestamp": "2026-01-07T09:21:00Z",
"trace_id": "9e967515-5404-a6b6-23ec-2da96a09394a"
} | {
"account_age_days": 1620,
"account_id": "ACCT-54DED541F548",
"baseline_risk_score": 0.118,
"kyc_tier": "tier_3",
"session_entropy": 0.174
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 168,
"timestamp": "2026-01-07T07:49:00Z",
"transaction_amount_usd": 20.22
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.659,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2036.49,
"financial_exposure_usd": 2312.16,
"recoverable_pct": 0.567
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104380",
"label": "fraudulent",
"label_confidence": 0.842,
"severity": "high",
"timestamp": "2026-01-04T01:00:00Z",
"trace_id": "d0d04fbd-0c91-906d-9ccd-035040053195"
} | {
"account_age_days": 1158,
"account_id": "ACCT-8296051BE0DB",
"baseline_risk_score": 0.266,
"kyc_tier": "tier_3",
"session_entropy": 0.271
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 392,
"timestamp": "2026-01-03T17:37:00Z",
"transaction_amount_usd": 17.74
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POST... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.714,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2776176.72,
"financial_exposure_usd": 4748420.55,
"recoverable_pct": 0.625
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102460",
"label": "fraudulent",
"label_confidence": 0.921,
"severity": "high",
"timestamp": "2026-01-02T17:00:00Z",
"trace_id": "84346a76-f005-23f6-9b21-cc686bab73b2"
} | {
"account_age_days": 432,
"account_id": "ACCT-CB45D242F50A",
"baseline_risk_score": 0.492,
"kyc_tier": "tier_1",
"session_entropy": 0.614
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "SG",
"latency_ms": 581,
"timestamp": "2026-01-02T17:00:00Z",
"transaction_amount_usd": 16795.5
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.676,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 600203.89,
"financial_exposure_usd": 681165.03,
"recoverable_pct": 0.285
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102994",
"label": "fraudulent",
"label_confidence": 0.903,
"severity": "critical",
"timestamp": "2026-01-03T01:54:00Z",
"trace_id": "3e995d4f-20c3-a6c9-a019-004216479b88"
} | {
"account_age_days": 798,
"account_id": "ACCT-4ED72248AFB4",
"baseline_risk_score": 0.583,
"kyc_tier": "tier_1",
"session_entropy": 0.392
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 391,
"timestamp": "2026-01-03T01:54:00Z",
"transaction_amount_usd": 60069.81
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.787,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 930429.79,
"financial_exposure_usd": 937479.04,
"recoverable_pct": 0.281
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101867",
"label": "fraudulent",
"label_confidence": 0.764,
"severity": "critical",
"timestamp": "2026-01-02T07:07:00Z",
"trace_id": "634e8d98-4d36-56d2-8988-3b8a1a25520f"
} | {
"account_age_days": 301,
"account_id": "ACCT-263F139009D3",
"baseline_risk_score": 0.332,
"kyc_tier": "tier_2",
"session_entropy": 0.609
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 395,
"timestamp": "2026-01-01T21:16:00Z",
"transaction_amount_usd": 19.77
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.802,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 572276.2,
"financial_exposure_usd": 1232212.31,
"recoverable_pct": 0.321
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103054",
"label": "fraudulent",
"label_confidence": 0.782,
"severity": "critical",
"timestamp": "2026-01-03T02:54:00Z",
"trace_id": "8ab093ca-586e-e36b-dd9b-156e8e6f00df"
} | {
"account_age_days": 1334,
"account_id": "ACCT-D0441EFFB7C4",
"baseline_risk_score": 0.367,
"kyc_tier": "tier_1",
"session_entropy": 0.671
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 550,
"timestamp": "2026-01-03T02:54:00Z",
"transaction_amount_usd": 81567.82
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.628,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 579995.25,
"financial_exposure_usd": 1038316.16,
"recoverable_pct": 0.73
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104554",
"label": "fraudulent",
"label_confidence": 0.693,
"severity": "high",
"timestamp": "2026-01-04T03:54:00Z",
"trace_id": "02be5c52-5f49-9429-4cc8-670a60791267"
} | {
"account_age_days": 406,
"account_id": "ACCT-BE96EF3B7402",
"baseline_risk_score": 0.436,
"kyc_tier": "tier_3",
"session_entropy": 0.483
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 1109,
"timestamp": "2026-01-04T03:54:00Z",
"transaction_amount_usd": 2036122.28
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.618,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 629135.94,
"financial_exposure_usd": 1420533.65,
"recoverable_pct": 0.609
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105365",
"label": "fraudulent",
"label_confidence": 0.824,
"severity": "low",
"timestamp": "2026-01-04T17:25:00Z",
"trace_id": "dff42bd1-8032-0c0e-c82a-b4c12d260a0e"
} | {
"account_age_days": 1436,
"account_id": "ACCT-2792009C4D73",
"baseline_risk_score": 0.268,
"kyc_tier": "tier_2",
"session_entropy": 0.548
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 1078,
"timestamp": "2026-01-04T17:25:00Z",
"transaction_amount_usd": 895795.34
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.796,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3805731.03,
"financial_exposure_usd": 8260016.1,
"recoverable_pct": 0.864
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105563",
"label": "fraudulent",
"label_confidence": 0.675,
"severity": "high",
"timestamp": "2026-01-04T20:43:00Z",
"trace_id": "a68ea93a-73bc-7ff9-007f-bbab8a2da38c"
} | {
"account_age_days": 247,
"account_id": "ACCT-0430DB381E47",
"baseline_risk_score": 0.276,
"kyc_tier": "tier_2",
"session_entropy": 0.256
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 502,
"timestamp": "2026-01-04T20:43:00Z",
"transaction_amount_usd": 504561.93
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.911,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4759118.85,
"financial_exposure_usd": 5356937.41,
"recoverable_pct": 0.646
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101034",
"label": "fraudulent",
"label_confidence": 0.91,
"severity": "high",
"timestamp": "2026-01-01T17:14:00Z",
"trace_id": "45fb0dcf-d08d-2a30-ba39-fd6ffbd3bfcb"
} | {
"account_age_days": 1618,
"account_id": "ACCT-03252BDCB5B9",
"baseline_risk_score": 0.382,
"kyc_tier": "tier_2",
"session_entropy": 0.899
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 469,
"timestamp": "2026-01-01T17:14:00Z",
"transaction_amount_usd": 52187.9
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.877,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 323179.66,
"financial_exposure_usd": 611463.12,
"recoverable_pct": 0.363
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100763",
"label": "fraudulent",
"label_confidence": 0.805,
"severity": "medium",
"timestamp": "2026-01-01T12:43:00Z",
"trace_id": "2e6c8fb7-4530-5525-9ecf-92529a05150a"
} | {
"account_age_days": 1837,
"account_id": "ACCT-EC3C10A50745",
"baseline_risk_score": 0.442,
"kyc_tier": "tier_1",
"session_entropy": 0.513
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 210,
"timestamp": "2026-01-01T02:17:00Z",
"transaction_amount_usd": 16.06
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.896,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 341216.16,
"financial_exposure_usd": 550808.31,
"recoverable_pct": 0.527
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101376",
"label": "fraudulent",
"label_confidence": 0.891,
"severity": "high",
"timestamp": "2026-01-01T22:56:00Z",
"trace_id": "2ad1675a-f5cb-edfe-7d03-8c3959376ab7"
} | {
"account_age_days": 1844,
"account_id": "ACCT-157B49C915D3",
"baseline_risk_score": 0.314,
"kyc_tier": "tier_2",
"session_entropy": 0.844
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 622,
"timestamp": "2026-01-01T22:56:00Z",
"transaction_amount_usd": 19070.56
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.81,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 244922.71,
"financial_exposure_usd": 387060.43,
"recoverable_pct": 0.655
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108102",
"label": "benign",
"label_confidence": 0.686,
"severity": "medium",
"timestamp": "2026-01-06T15:02:00Z",
"trace_id": "53a9ee77-7f4f-0707-4b8e-dc2cd498bd50"
} | {
"account_age_days": 947,
"account_id": "ACCT-2D251FDD8B04",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.769
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 121,
"timestamp": "2026-01-06T12:39:00Z",
"transaction_amount_usd": 23.5
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.765,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1574.26,
"financial_exposure_usd": 1600.93,
"recoverable_pct": 0.829
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101110",
"label": "fraudulent",
"label_confidence": 0.84,
"severity": "medium",
"timestamp": "2026-01-01T18:30:00Z",
"trace_id": "979a5da2-5c1d-4ad6-132b-0887c6a18d2b"
} | {
"account_age_days": 1744,
"account_id": "ACCT-28C6A33D1836",
"baseline_risk_score": 0.594,
"kyc_tier": "tier_1",
"session_entropy": 0.74
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "FR",
"latency_ms": 1192,
"timestamp": "2026-01-01T18:30:00Z",
"transaction_amount_usd": 74710.74
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.452,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 723812.57,
"financial_exposure_usd": 981016.89,
"recoverable_pct": 0.457
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103662",
"label": "fraudulent",
"label_confidence": 0.603,
"severity": "high",
"timestamp": "2026-01-03T13:02:00Z",
"trace_id": "e47d40b8-6638-a994-9bb9-1d97c2c248bd"
} | {
"account_age_days": 1916,
"account_id": "ACCT-8CD88E72D1C1",
"baseline_risk_score": 0.157,
"kyc_tier": "tier_2",
"session_entropy": 0.395
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 800,
"timestamp": "2026-01-03T13:02:00Z",
"transaction_amount_usd": 483677.91
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.883,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 6394429.57,
"financial_exposure_usd": 6567396.16,
"recoverable_pct": 0.991
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107707",
"label": "benign",
"label_confidence": 0.66,
"severity": "low",
"timestamp": "2026-01-06T08:27:00Z",
"trace_id": "cfc999b3-f193-5a9d-0c91-a783255229a8"
} | {
"account_age_days": 900,
"account_id": "ACCT-2E7C97C98AA3",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.831
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 722,
"timestamp": "2026-01-06T08:27:00Z",
"transaction_amount_usd": 11375.39
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.707,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2259.83,
"financial_exposure_usd": 2889.6,
"recoverable_pct": 0.926
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106671",
"label": "benign",
"label_confidence": 0.588,
"severity": "high",
"timestamp": "2026-01-05T15:11:00Z",
"trace_id": "a2d9fcd9-f442-4d33-a529-ece3d14df624"
} | {
"account_age_days": 1182,
"account_id": "ACCT-FC67E89E6CB4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.216
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 369,
"timestamp": "2026-01-05T15:11:00Z",
"transaction_amount_usd": 9928.05
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.74,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 848.16,
"financial_exposure_usd": 1148.45,
"recoverable_pct": 0.704
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108328",
"label": "benign",
"label_confidence": 0.695,
"severity": "low",
"timestamp": "2026-01-06T18:48:00Z",
"trace_id": "889e6e58-b874-4932-bc4e-fa928fe1aeeb"
} | {
"account_age_days": 1829,
"account_id": "ACCT-4A37C1DAE91D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.429
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 180,
"timestamp": "2026-01-06T18:48:00Z",
"transaction_amount_usd": 2941.97
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.495,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 898.45,
"financial_exposure_usd": 1236.1,
"recoverable_pct": 0.542
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109252",
"label": "benign",
"label_confidence": 0.486,
"severity": "low",
"timestamp": "2026-01-07T10:12:00Z",
"trace_id": "e0879387-ac7d-1612-30fd-70e1b3d1f874"
} | {
"account_age_days": 1429,
"account_id": "ACCT-DE40B9CD4BB3",
"baseline_risk_score": 0.174,
"kyc_tier": "tier_2",
"session_entropy": 0.882
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 304,
"timestamp": "2026-01-07T01:38:00Z",
"transaction_amount_usd": 21.23
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.688,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2350.48,
"financial_exposure_usd": 2752.32,
"recoverable_pct": 0.952
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100452",
"label": "fraudulent",
"label_confidence": 0.849,
"severity": "critical",
"timestamp": "2026-01-01T07:32:00Z",
"trace_id": "5b387e32-ec1b-7b76-2bf6-868a0d586c75"
} | {
"account_age_days": 1498,
"account_id": "ACCT-F2B505705D61",
"baseline_risk_score": 0.435,
"kyc_tier": "tier_1",
"session_entropy": 0.572
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 200,
"timestamp": "2025-12-31T20:33:00Z",
"transaction_amount_usd": 6.66
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.475,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 377558.1,
"financial_exposure_usd": 520178.39,
"recoverable_pct": 0.307
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108660",
"label": "benign",
"label_confidence": 0.567,
"severity": "low",
"timestamp": "2026-01-07T00:20:00Z",
"trace_id": "30105d62-dd61-5215-b254-e65238cc7015"
} | {
"account_age_days": 1310,
"account_id": "ACCT-22D74578E74B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.9
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 1199,
"timestamp": "2026-01-07T00:20:00Z",
"transaction_amount_usd": 5401.37
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.562,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2814.58,
"financial_exposure_usd": 3813.64,
"recoverable_pct": 0.469
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105965",
"label": "fraudulent",
"label_confidence": 0.686,
"severity": "low",
"timestamp": "2026-01-05T03:25:00Z",
"trace_id": "367bea46-0267-e5f1-3d49-2b34d4e5ac8f"
} | {
"account_age_days": 784,
"account_id": "ACCT-51DDEAAADC9F",
"baseline_risk_score": 0.353,
"kyc_tier": "tier_1",
"session_entropy": 0.663
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 299,
"timestamp": "2026-01-04T16:03:00Z",
"transaction_amount_usd": 20.06
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.732,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5476335.35,
"financial_exposure_usd": 5592740.76,
"recoverable_pct": 0.855
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105559",
"label": "fraudulent",
"label_confidence": 0.627,
"severity": "high",
"timestamp": "2026-01-04T20:39:00Z",
"trace_id": "c8003a3b-13ff-e2fc-22b8-04a2fd5f1bdd"
} | {
"account_age_days": 1546,
"account_id": "ACCT-7A4FD9494F83",
"baseline_risk_score": 0.254,
"kyc_tier": "tier_2",
"session_entropy": 0.205
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 1148,
"timestamp": "2026-01-04T20:39:00Z",
"transaction_amount_usd": 2073468.85
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.385,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 6675981.66,
"financial_exposure_usd": 7617194.57,
"recoverable_pct": 0.527
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102847",
"label": "fraudulent",
"label_confidence": 0.945,
"severity": "medium",
"timestamp": "2026-01-02T23:27:00Z",
"trace_id": "c03c076b-5bed-6283-51b9-a519fb447999"
} | {
"account_age_days": 935,
"account_id": "ACCT-F6327AC9457E",
"baseline_risk_score": 0.567,
"kyc_tier": "tier_3",
"session_entropy": 0.775
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 569,
"timestamp": "2026-01-02T23:27:00Z",
"transaction_amount_usd": 47715.08
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.451,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 409358.85,
"financial_exposure_usd": 501717.09,
"recoverable_pct": 0.039
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105775",
"label": "fraudulent",
"label_confidence": 0.728,
"severity": "medium",
"timestamp": "2026-01-05T00:15:00Z",
"trace_id": "2a231243-ac76-aace-072e-74755c47e28b"
} | {
"account_age_days": 1366,
"account_id": "ACCT-35F42E235201",
"baseline_risk_score": 0.224,
"kyc_tier": "tier_1",
"session_entropy": 0.611
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 443,
"timestamp": "2026-01-05T00:15:00Z",
"transaction_amount_usd": 2619615.94
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.389,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2153218.25,
"financial_exposure_usd": 3197953.3,
"recoverable_pct": 0.903
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109693",
"label": "benign",
"label_confidence": 0.624,
"severity": "high",
"timestamp": "2026-01-07T17:33:00Z",
"trace_id": "6d4067c9-338d-94d9-8581-e5dcc19ef2f8"
} | {
"account_age_days": 438,
"account_id": "ACCT-D725FECAF197",
"baseline_risk_score": 0.152,
"kyc_tier": "tier_3",
"session_entropy": 0.416
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 363,
"timestamp": "2026-01-07T17:33:00Z",
"transaction_amount_usd": 6917.2
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.674,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2890.79,
"financial_exposure_usd": 4360.27,
"recoverable_pct": 0.41
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108126",
"label": "benign",
"label_confidence": 0.64,
"severity": "high",
"timestamp": "2026-01-06T15:26:00Z",
"trace_id": "2ce819f9-0c09-829f-d0b0-6509a6e85863"
} | {
"account_age_days": 1925,
"account_id": "ACCT-95DFBCBFC6D6",
"baseline_risk_score": 0.152,
"kyc_tier": "tier_3",
"session_entropy": 0.68
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 377,
"timestamp": "2026-01-06T12:04:00Z",
"transaction_amount_usd": 15.8
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.489,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2700.1,
"financial_exposure_usd": 5081.44,
"recoverable_pct": 0.705
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102913",
"label": "fraudulent",
"label_confidence": 0.899,
"severity": "high",
"timestamp": "2026-01-03T00:33:00Z",
"trace_id": "791a05f2-ef26-b73f-e98b-1389cd43a2b6"
} | {
"account_age_days": 828,
"account_id": "ACCT-B63A5A16374E",
"baseline_risk_score": 0.337,
"kyc_tier": "tier_2",
"session_entropy": 0.19
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 310,
"timestamp": "2026-01-02T23:20:00Z",
"transaction_amount_usd": 8.4
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.642,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 449426.09,
"financial_exposure_usd": 509592.83,
"recoverable_pct": 0.622
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106267",
"label": "fraudulent",
"label_confidence": 0.834,
"severity": "low",
"timestamp": "2026-01-05T08:27:00Z",
"trace_id": "4f47845f-4de0-d9fa-385c-77b12327ab77"
} | {
"account_age_days": 1141,
"account_id": "ACCT-B4CE09EC3B15",
"baseline_risk_score": 0.362,
"kyc_tier": "tier_3",
"session_entropy": 0.447
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 315,
"timestamp": "2026-01-04T21:16:00Z",
"transaction_amount_usd": 12.8
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.869,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 5626509.25,
"financial_exposure_usd": 6279295.81,
"recoverable_pct": 0.663
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104418",
"label": "fraudulent",
"label_confidence": 0.7,
"severity": "high",
"timestamp": "2026-01-04T01:38:00Z",
"trace_id": "357f3f38-d0fa-1f6b-bf04-7525425fb643"
} | {
"account_age_days": 1626,
"account_id": "ACCT-2DE6E2BCC5A6",
"baseline_risk_score": 0.392,
"kyc_tier": "tier_3",
"session_entropy": 0.143
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 363,
"timestamp": "2026-01-04T01:38:00Z",
"transaction_amount_usd": 1369578.77
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.73,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 2488589.72,
"financial_exposure_usd": 3187615.64,
"recoverable_pct": 0.784
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107847",
"label": "benign",
"label_confidence": 0.541,
"severity": "high",
"timestamp": "2026-01-06T10:47:00Z",
"trace_id": "b9bac898-7552-d941-63aa-9bf479fb8341"
} | {
"account_age_days": 308,
"account_id": "ACCT-7F8A3BC8E76C",
"baseline_risk_score": 0.171,
"kyc_tier": "tier_2",
"session_entropy": 0.862
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 310,
"timestamp": "2026-01-06T10:47:00Z",
"transaction_amount_usd": 5125.51
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.457,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3723.71,
"financial_exposure_usd": 3725.55,
"recoverable_pct": 0.57
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100045",
"label": "fraudulent",
"label_confidence": 0.832,
"severity": "medium",
"timestamp": "2026-01-01T00:45:00Z",
"trace_id": "55c3b2db-f374-190d-0274-ce40e09016b6"
} | {
"account_age_days": 1748,
"account_id": "ACCT-4EED412473B0",
"baseline_risk_score": 0.298,
"kyc_tier": "tier_1",
"session_entropy": 0.494
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 1165,
"timestamp": "2026-01-01T00:45:00Z",
"transaction_amount_usd": 45464.84
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.445,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 449528.91,
"financial_exposure_usd": 501800.45,
"recoverable_pct": 0.592
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102044",
"label": "fraudulent",
"label_confidence": 0.949,
"severity": "high",
"timestamp": "2026-01-02T10:04:00Z",
"trace_id": "6ccaa025-8cb8-f0e4-6e89-70448f89ff68"
} | {
"account_age_days": 1238,
"account_id": "ACCT-5E23B6A10D0D",
"baseline_risk_score": 0.556,
"kyc_tier": "tier_3",
"session_entropy": 0.243
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 193,
"timestamp": "2026-01-02T09:25:00Z",
"transaction_amount_usd": 2.01
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.592,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 649220.01,
"financial_exposure_usd": 787709.26,
"recoverable_pct": 0.779
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102916",
"label": "fraudulent",
"label_confidence": 0.765,
"severity": "critical",
"timestamp": "2026-01-03T00:36:00Z",
"trace_id": "e16bc099-2f4e-9c29-cbd9-6aff16a587b0"
} | {
"account_age_days": 1057,
"account_id": "ACCT-8585E337A615",
"baseline_risk_score": 0.318,
"kyc_tier": "tier_3",
"session_entropy": 0.169
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 752,
"timestamp": "2026-01-03T00:36:00Z",
"transaction_amount_usd": 47367.05
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.839,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 524225.97,
"financial_exposure_usd": 661642.98,
"recoverable_pct": 0.351
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108462",
"label": "benign",
"label_confidence": 0.583,
"severity": "high",
"timestamp": "2026-01-06T21:02:00Z",
"trace_id": "41f9406c-b012-2d4b-3f0d-93ef74951a21"
} | {
"account_age_days": 308,
"account_id": "ACCT-0D8381254C42",
"baseline_risk_score": 0.066,
"kyc_tier": "tier_1",
"session_entropy": 0.163
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 948,
"timestamp": "2026-01-06T21:02:00Z",
"transaction_amount_usd": 10610.75
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.658,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1787.49,
"financial_exposure_usd": 2885.86,
"recoverable_pct": 0.581
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109004",
"label": "benign",
"label_confidence": 0.744,
"severity": "critical",
"timestamp": "2026-01-07T06:04:00Z",
"trace_id": "62af285c-967e-9830-4002-82eb247f83ca"
} | {
"account_age_days": 1681,
"account_id": "ACCT-EC8C2592E111",
"baseline_risk_score": 0.197,
"kyc_tier": "tier_3",
"session_entropy": 0.823
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 1153,
"timestamp": "2026-01-07T06:04:00Z",
"transaction_amount_usd": 1315.45
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.642,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2137.37,
"financial_exposure_usd": 2726.84,
"recoverable_pct": 0.913
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107645",
"label": "benign",
"label_confidence": 0.589,
"severity": "medium",
"timestamp": "2026-01-06T07:25:00Z",
"trace_id": "4a4597a6-607f-30ac-3f80-e119f22d826e"
} | {
"account_age_days": 131,
"account_id": "ACCT-A2972960AB22",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.216
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 96,
"timestamp": "2026-01-05T18:57:00Z",
"transaction_amount_usd": 10.55
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.675,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2994.15,
"financial_exposure_usd": 4798.66,
"recoverable_pct": 0.753
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109598",
"label": "benign",
"label_confidence": 0.5,
"severity": "medium",
"timestamp": "2026-01-07T15:58:00Z",
"trace_id": "a20d7179-9e4f-001a-9365-10e391115a8e"
} | {
"account_age_days": 160,
"account_id": "ACCT-0CD719E15424",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.504
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 1026,
"timestamp": "2026-01-07T15:58:00Z",
"transaction_amount_usd": 8366.03
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.555,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1857.71,
"financial_exposure_usd": 2101.52,
"recoverable_pct": 0.661
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104569",
"label": "fraudulent",
"label_confidence": 0.719,
"severity": "high",
"timestamp": "2026-01-04T04:09:00Z",
"trace_id": "c10061e7-1213-ef6a-6cf7-9e56a1bd720c"
} | {
"account_age_days": 1295,
"account_id": "ACCT-EE356491A5C7",
"baseline_risk_score": 0.182,
"kyc_tier": "tier_2",
"session_entropy": 0.884
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 316,
"timestamp": "2026-01-03T18:24:00Z",
"transaction_amount_usd": 18.28
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.602,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1215518.29,
"financial_exposure_usd": 2969588.34,
"recoverable_pct": 0.585
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109545",
"label": "benign",
"label_confidence": 0.717,
"severity": "high",
"timestamp": "2026-01-07T15:05:00Z",
"trace_id": "bb830389-eabc-7ddc-9946-c28232b07d39"
} | {
"account_age_days": 665,
"account_id": "ACCT-121D004E520F",
"baseline_risk_score": 0.111,
"kyc_tier": "tier_1",
"session_entropy": 0.908
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 954,
"timestamp": "2026-01-07T15:05:00Z",
"transaction_amount_usd": 658.92
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.7,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 4294.36,
"financial_exposure_usd": 5571.21,
"recoverable_pct": 0.711
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102843",
"label": "fraudulent",
"label_confidence": 0.908,
"severity": "high",
"timestamp": "2026-01-02T23:23:00Z",
"trace_id": "fb8ec2e3-fc0d-b87f-54d7-8e847acccfb0"
} | {
"account_age_days": 561,
"account_id": "ACCT-037B9535B15A",
"baseline_risk_score": 0.484,
"kyc_tier": "tier_2",
"session_entropy": 0.371
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 251,
"timestamp": "2026-01-02T22:29:00Z",
"transaction_amount_usd": 24.52
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.418,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 1086303.54,
"financial_exposure_usd": 1199939.4,
"recoverable_pct": 0.546
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105637",
"label": "fraudulent",
"label_confidence": 0.837,
"severity": "critical",
"timestamp": "2026-01-04T21:57:00Z",
"trace_id": "09302ae4-2082-aff0-e78d-20dfd9ff3bff"
} | {
"account_age_days": 1817,
"account_id": "ACCT-2506BA79270A",
"baseline_risk_score": 0.068,
"kyc_tier": "tier_2",
"session_entropy": 0.581
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 127,
"timestamp": "2026-01-04T21:57:00Z",
"transaction_amount_usd": 2251679.6
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.854,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2426041.44,
"financial_exposure_usd": 4223770.93,
"recoverable_pct": 0.501
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101973",
"label": "fraudulent",
"label_confidence": 0.824,
"severity": "critical",
"timestamp": "2026-01-02T08:53:00Z",
"trace_id": "9fea2b73-68c0-7f73-e8bf-7e1edbbaf82e"
} | {
"account_age_days": 108,
"account_id": "ACCT-6CC8E86184A4",
"baseline_risk_score": 0.528,
"kyc_tier": "tier_2",
"session_entropy": 0.199
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 143,
"timestamp": "2026-01-02T08:53:00Z",
"transaction_amount_usd": 105819.64
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.629,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 398098.31,
"financial_exposure_usd": 594511.27,
"recoverable_pct": 0.815
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106347",
"label": "fraudulent",
"label_confidence": 0.899,
"severity": "high",
"timestamp": "2026-01-05T09:47:00Z",
"trace_id": "f9d76ec1-01c8-f4c5-bc7e-3afd631f0a98"
} | {
"account_age_days": 1876,
"account_id": "ACCT-59B17F3DBE24",
"baseline_risk_score": 0.101,
"kyc_tier": "tier_3",
"session_entropy": 0.278
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 253,
"timestamp": "2026-01-05T03:04:00Z",
"transaction_amount_usd": 8.63
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.804,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 3",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1500811,
"financial_exposure_usd": 2349842.37,
"recoverable_pct": 0.643
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104967",
"label": "fraudulent",
"label_confidence": 0.664,
"severity": "high",
"timestamp": "2026-01-04T10:47:00Z",
"trace_id": "b874ce75-c641-2cea-76da-5826e5512280"
} | {
"account_age_days": 1490,
"account_id": "ACCT-8BCE1D40720A",
"baseline_risk_score": 0.31,
"kyc_tier": "tier_2",
"session_entropy": 0.462
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 883,
"timestamp": "2026-01-04T10:47:00Z",
"transaction_amount_usd": 1059752.81
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.354,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2951563.32,
"financial_exposure_usd": 4811827.23,
"recoverable_pct": 0.69
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107242",
"label": "benign",
"label_confidence": 0.692,
"severity": "medium",
"timestamp": "2026-01-06T00:42:00Z",
"trace_id": "c2e92174-66c9-c625-466b-1226b200c405"
} | {
"account_age_days": 1233,
"account_id": "ACCT-613360BA49FB",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.33
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 1161,
"timestamp": "2026-01-06T00:42:00Z",
"transaction_amount_usd": 10921.76
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.783,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3202.08,
"financial_exposure_usd": 4364.25,
"recoverable_pct": 0.97
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104439",
"label": "fraudulent",
"label_confidence": 0.838,
"severity": "medium",
"timestamp": "2026-01-04T01:59:00Z",
"trace_id": "70ae47e1-eb66-86e2-7962-4645466a1d38"
} | {
"account_age_days": 1454,
"account_id": "ACCT-80AC13001513",
"baseline_risk_score": 0.259,
"kyc_tier": "tier_2",
"session_entropy": 0.404
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 1164,
"timestamp": "2026-01-04T01:59:00Z",
"transaction_amount_usd": 1580230.32
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.481,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 6538269.5,
"financial_exposure_usd": 8225684.14,
"recoverable_pct": 0.997
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102437",
"label": "fraudulent",
"label_confidence": 0.878,
"severity": "high",
"timestamp": "2026-01-02T16:37:00Z",
"trace_id": "43bfda75-71c1-6134-7312-ca655649bc0b"
} | {
"account_age_days": 1755,
"account_id": "ACCT-19C928129F6D",
"baseline_risk_score": 0.5,
"kyc_tier": "tier_2",
"session_entropy": 0.664
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 370,
"timestamp": "2026-01-02T08:50:00Z",
"transaction_amount_usd": 20.51
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.896,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 284031.67,
"financial_exposure_usd": 619435.45,
"recoverable_pct": 0.077
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108809",
"label": "benign",
"label_confidence": 0.574,
"severity": "medium",
"timestamp": "2026-01-07T02:49:00Z",
"trace_id": "e1d34953-97e6-268c-eb3c-8553907bd235"
} | {
"account_age_days": 640,
"account_id": "ACCT-CAFABC5218D7",
"baseline_risk_score": 0.18,
"kyc_tier": "tier_1",
"session_entropy": 0.194
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 782,
"timestamp": "2026-01-07T02:49:00Z",
"transaction_amount_usd": 10733.33
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.757,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2993.64,
"financial_exposure_usd": 5071.31,
"recoverable_pct": 0.978
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103881",
"label": "fraudulent",
"label_confidence": 0.79,
"severity": "medium",
"timestamp": "2026-01-03T16:41:00Z",
"trace_id": "d693686a-a33f-73ba-495a-3220c14aba01"
} | {
"account_age_days": 1653,
"account_id": "ACCT-40335ADDF46E",
"baseline_risk_score": 0.434,
"kyc_tier": "tier_2",
"session_entropy": 0.388
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 1099,
"timestamp": "2026-01-03T16:41:00Z",
"transaction_amount_usd": 878477.26
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.464,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3167260.13,
"financial_exposure_usd": 5841375.26,
"recoverable_pct": 0.48
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102205",
"label": "fraudulent",
"label_confidence": 0.945,
"severity": "critical",
"timestamp": "2026-01-02T12:45:00Z",
"trace_id": "71576d32-0ae0-e7a8-1f5a-d953d99196ad"
} | {
"account_age_days": 843,
"account_id": "ACCT-F9319F4A2DB5",
"baseline_risk_score": 0.262,
"kyc_tier": "tier_1",
"session_entropy": 0.93
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 699,
"timestamp": "2026-01-02T12:45:00Z",
"transaction_amount_usd": 26465.06
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.413,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 3",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 601103.83,
"financial_exposure_usd": 708781.71,
"recoverable_pct": 0.482
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101879",
"label": "fraudulent",
"label_confidence": 0.915,
"severity": "critical",
"timestamp": "2026-01-02T07:19:00Z",
"trace_id": "ddb5e40b-3f66-3f9d-2780-7b54012f1228"
} | {
"account_age_days": 1427,
"account_id": "ACCT-D44814641E8A",
"baseline_risk_score": 0.64,
"kyc_tier": "tier_2",
"session_entropy": 0.802
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 978,
"timestamp": "2026-01-02T07:19:00Z",
"transaction_amount_usd": 93175.17
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.886,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 276310.16,
"financial_exposure_usd": 568068.06,
"recoverable_pct": 0.289
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104036",
"label": "fraudulent",
"label_confidence": 0.878,
"severity": "low",
"timestamp": "2026-01-03T19:16:00Z",
"trace_id": "22d5f5a7-372c-f6f0-a0ad-3ed65221aea4"
} | {
"account_age_days": 1678,
"account_id": "ACCT-2C669B91DAA0",
"baseline_risk_score": 0.092,
"kyc_tier": "tier_3",
"session_entropy": 0.285
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 321,
"timestamp": "2026-01-03T19:16:00Z",
"transaction_amount_usd": 1722031.04
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.891,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1215709.93,
"financial_exposure_usd": 1460187.32,
"recoverable_pct": 0.5
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102917",
"label": "fraudulent",
"label_confidence": 0.885,
"severity": "low",
"timestamp": "2026-01-03T00:37:00Z",
"trace_id": "6beb9b4d-2bd0-8156-8a6e-0fe28b9d9fd3"
} | {
"account_age_days": 157,
"account_id": "ACCT-AFBD1C75C5CC",
"baseline_risk_score": 0.416,
"kyc_tier": "tier_1",
"session_entropy": 0.82
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 1129,
"timestamp": "2026-01-03T00:37:00Z",
"transaction_amount_usd": 113927.23
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.924,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 372077.04,
"financial_exposure_usd": 800640.86,
"recoverable_pct": 0.409
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102814",
"label": "fraudulent",
"label_confidence": 0.786,
"severity": "critical",
"timestamp": "2026-01-02T22:54:00Z",
"trace_id": "5d18a5d1-0c02-56bf-1e87-2c49eafd522b"
} | {
"account_age_days": 89,
"account_id": "ACCT-65F68E1EEF81",
"baseline_risk_score": 0.403,
"kyc_tier": "tier_3",
"session_entropy": 0.645
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 1068,
"timestamp": "2026-01-02T22:54:00Z",
"transaction_amount_usd": 57739.39
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.921,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 559424.68,
"financial_exposure_usd": 819883.45,
"recoverable_pct": 0.352
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103092",
"label": "fraudulent",
"label_confidence": 0.81,
"severity": "low",
"timestamp": "2026-01-03T03:32:00Z",
"trace_id": "57fa9009-eb4c-8e81-903d-64f16857dbe3"
} | {
"account_age_days": 1199,
"account_id": "ACCT-56B8DA566664",
"baseline_risk_score": 0.455,
"kyc_tier": "tier_1",
"session_entropy": 0.38
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 705,
"timestamp": "2026-01-03T03:32:00Z",
"transaction_amount_usd": 16193.59
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.461,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 463182.66,
"financial_exposure_usd": 649658.13,
"recoverable_pct": 0.749
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.