schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105880",
"label": "fraudulent",
"label_confidence": 0.803,
"severity": "high",
"timestamp": "2026-01-05T02:00:00Z",
"trace_id": "d3cba997-df27-d62e-3736-2eff4e2a060a"
} | {
"account_age_days": 1766,
"account_id": "ACCT-4477A973569F",
"baseline_risk_score": 0.402,
"kyc_tier": "tier_2",
"session_entropy": 0.852
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 830,
"timestamp": "2026-01-05T02:00:00Z",
"transaction_amount_usd": 2335704.11
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.55,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 317101.19,
"financial_exposure_usd": 599467.6,
"recoverable_pct": 0.749
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105303",
"label": "fraudulent",
"label_confidence": 0.815,
"severity": "medium",
"timestamp": "2026-01-04T16:23:00Z",
"trace_id": "5f919b7e-06d1-c3a7-5ee2-6b2e0a8c3d0f"
} | {
"account_age_days": 836,
"account_id": "ACCT-821D1CDE66DA",
"baseline_risk_score": 0.393,
"kyc_tier": "tier_3",
"session_entropy": 0.244
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 561,
"timestamp": "2026-01-04T16:23:00Z",
"transaction_amount_usd": 2558167.53
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.569,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3944735.67,
"financial_exposure_usd": 4519392.14,
"recoverable_pct": 0.599
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103813",
"label": "fraudulent",
"label_confidence": 0.811,
"severity": "critical",
"timestamp": "2026-01-03T15:33:00Z",
"trace_id": "9cf0b61d-9f96-d92a-236e-303d2a388d90"
} | {
"account_age_days": 1179,
"account_id": "ACCT-3D86847543A5",
"baseline_risk_score": 0.224,
"kyc_tier": "tier_2",
"session_entropy": 0.692
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 379,
"timestamp": "2026-01-03T04:11:00Z",
"transaction_amount_usd": 19.29
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.574,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1239706.52,
"financial_exposure_usd": 1405900.9,
"recoverable_pct": 0.619
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106951",
"label": "benign",
"label_confidence": 0.54,
"severity": "high",
"timestamp": "2026-01-05T19:51:00Z",
"trace_id": "7994acb1-fb9e-f756-dc38-0a6db3ce9d3e"
} | {
"account_age_days": 1428,
"account_id": "ACCT-9ADBECDC9E44",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.48
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 125,
"timestamp": "2026-01-05T19:51:00Z",
"transaction_amount_usd": 7929.69
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.725,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 397.69,
"financial_exposure_usd": 427.76,
"recoverable_pct": 0.547
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104155",
"label": "fraudulent",
"label_confidence": 0.668,
"severity": "low",
"timestamp": "2026-01-03T21:15:00Z",
"trace_id": "dcd2cab8-1ad5-af2e-7aca-c9313daeffe4"
} | {
"account_age_days": 1327,
"account_id": "ACCT-692600399DB7",
"baseline_risk_score": 0.119,
"kyc_tier": "tier_2",
"session_entropy": 0.428
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 451,
"timestamp": "2026-01-03T21:15:00Z",
"transaction_amount_usd": 735387.73
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.633,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4219429.19,
"financial_exposure_usd": 6774688.82,
"recoverable_pct": 0.477
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109298",
"label": "benign",
"label_confidence": 0.51,
"severity": "low",
"timestamp": "2026-01-07T10:58:00Z",
"trace_id": "b60c0382-8f98-e427-3129-395390829f22"
} | {
"account_age_days": 280,
"account_id": "ACCT-87560AD2976F",
"baseline_risk_score": 0.089,
"kyc_tier": "tier_1",
"session_entropy": 0.808
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 165,
"timestamp": "2026-01-07T10:58:00Z",
"transaction_amount_usd": 5559.43
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.679,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 354.29,
"financial_exposure_usd": 683.84,
"recoverable_pct": 0.998
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106087",
"label": "fraudulent",
"label_confidence": 0.657,
"severity": "medium",
"timestamp": "2026-01-05T05:27:00Z",
"trace_id": "d077725a-fa7e-13e1-2801-d85f0c7efa00"
} | {
"account_age_days": 1743,
"account_id": "ACCT-E31C9AA713A7",
"baseline_risk_score": 0.134,
"kyc_tier": "tier_2",
"session_entropy": 0.218
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 724,
"timestamp": "2026-01-05T05:27:00Z",
"transaction_amount_usd": 900633.35
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.45,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 2105740.55,
"financial_exposure_usd": 3652906.79,
"recoverable_pct": 0.575
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103343",
"label": "fraudulent",
"label_confidence": 0.867,
"severity": "high",
"timestamp": "2026-01-03T07:43:00Z",
"trace_id": "fd56c7f8-bbf0-4f15-2515-ae8cc9746b04"
} | {
"account_age_days": 713,
"account_id": "ACCT-F70B2A6C4074",
"baseline_risk_score": 0.327,
"kyc_tier": "tier_2",
"session_entropy": 0.619
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 167,
"timestamp": "2026-01-03T07:43:00Z",
"transaction_amount_usd": 699860.91
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.587,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3089244.37,
"financial_exposure_usd": 3598056.19,
"recoverable_pct": 0.981
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102905",
"label": "fraudulent",
"label_confidence": 0.834,
"severity": "medium",
"timestamp": "2026-01-03T00:25:00Z",
"trace_id": "adf5bcf4-7d65-1d98-278c-f501a256321d"
} | {
"account_age_days": 1024,
"account_id": "ACCT-7D94F2E6BC64",
"baseline_risk_score": 0.588,
"kyc_tier": "tier_2",
"session_entropy": 0.881
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 914,
"timestamp": "2026-01-03T00:25:00Z",
"transaction_amount_usd": 75164.84
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.875,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 220705.21,
"financial_exposure_usd": 337855.64,
"recoverable_pct": 0.002
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103446",
"label": "fraudulent",
"label_confidence": 0.602,
"severity": "critical",
"timestamp": "2026-01-03T09:26:00Z",
"trace_id": "4b1a5a6e-c560-a8fe-236c-f07f1a94ba3b"
} | {
"account_age_days": 205,
"account_id": "ACCT-D6EF056DB2F4",
"baseline_risk_score": 0.1,
"kyc_tier": "tier_2",
"session_entropy": 0.785
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 178,
"timestamp": "2026-01-03T06:24:00Z",
"transaction_amount_usd": 8.92
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.469,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3775856.35,
"financial_exposure_usd": 6114130.15,
"recoverable_pct": 0.47
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108451",
"label": "benign",
"label_confidence": 0.578,
"severity": "high",
"timestamp": "2026-01-06T20:51:00Z",
"trace_id": "37eb676f-f355-9d1e-a71d-6dbb419d49f4"
} | {
"account_age_days": 1316,
"account_id": "ACCT-F4E6059CA22F",
"baseline_risk_score": 0.098,
"kyc_tier": "tier_1",
"session_entropy": 0.28
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 376,
"timestamp": "2026-01-06T16:14:00Z",
"transaction_amount_usd": 13.86
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.511,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1203.87,
"financial_exposure_usd": 1772.19,
"recoverable_pct": 0.929
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107609",
"label": "benign",
"label_confidence": 0.507,
"severity": "medium",
"timestamp": "2026-01-06T06:49:00Z",
"trace_id": "8b6f61eb-be2c-c717-9926-eaf12f2b3cf4"
} | {
"account_age_days": 317,
"account_id": "ACCT-0B0AB3430EBF",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.109
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 237,
"timestamp": "2026-01-06T06:49:00Z",
"transaction_amount_usd": 8854.57
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.69,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 2948.41,
"financial_exposure_usd": 3219.42,
"recoverable_pct": 0.717
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105794",
"label": "fraudulent",
"label_confidence": 0.905,
"severity": "medium",
"timestamp": "2026-01-05T00:34:00Z",
"trace_id": "32967891-a5ed-4873-2f91-4555ca3b448f"
} | {
"account_age_days": 766,
"account_id": "ACCT-BE4E8AB1888C",
"baseline_risk_score": 0.188,
"kyc_tier": "tier_2",
"session_entropy": 0.413
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 301,
"timestamp": "2026-01-05T00:34:00Z",
"transaction_amount_usd": 2939341.68
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.448,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4736300.45,
"financial_exposure_usd": 6330865.02,
"recoverable_pct": 0.582
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101377",
"label": "fraudulent",
"label_confidence": 0.953,
"severity": "critical",
"timestamp": "2026-01-01T22:57:00Z",
"trace_id": "3667a70b-6f2f-2775-863e-4b7e704bea2e"
} | {
"account_age_days": 130,
"account_id": "ACCT-E6ACD413D0C4",
"baseline_risk_score": 0.254,
"kyc_tier": "tier_2",
"session_entropy": 0.166
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "SG",
"latency_ms": 333,
"timestamp": "2026-01-01T22:57:00Z",
"transaction_amount_usd": 7767.29
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.822,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 570725.43,
"financial_exposure_usd": 667523.63,
"recoverable_pct": 0.071
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109097",
"label": "benign",
"label_confidence": 0.726,
"severity": "high",
"timestamp": "2026-01-07T07:37:00Z",
"trace_id": "ef48c5ed-ad53-981d-883c-45ab18a08322"
} | {
"account_age_days": 114,
"account_id": "ACCT-C80E8576856B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.575
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 189,
"timestamp": "2026-01-06T23:50:00Z",
"transaction_amount_usd": 23.97
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.637,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2459.83,
"financial_exposure_usd": 2460.83,
"recoverable_pct": 0.492
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108144",
"label": "benign",
"label_confidence": 0.75,
"severity": "low",
"timestamp": "2026-01-06T15:44:00Z",
"trace_id": "8b2d1894-b6d3-92e2-9e70-883982904d74"
} | {
"account_age_days": 106,
"account_id": "ACCT-D1EE6E0497A6",
"baseline_risk_score": 0.103,
"kyc_tier": "tier_2",
"session_entropy": 0.19
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 508,
"timestamp": "2026-01-06T15:44:00Z",
"transaction_amount_usd": 10544.12
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.698,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2122.1,
"financial_exposure_usd": 3800.48,
"recoverable_pct": 0.634
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105096",
"label": "fraudulent",
"label_confidence": 0.83,
"severity": "high",
"timestamp": "2026-01-04T12:56:00Z",
"trace_id": "478a8cf1-fb88-86b4-4157-ef1eeb9b8bea"
} | {
"account_age_days": 705,
"account_id": "ACCT-F387528739C5",
"baseline_risk_score": 0.29,
"kyc_tier": "tier_2",
"session_entropy": 0.925
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 159,
"timestamp": "2026-01-04T03:17:00Z",
"transaction_amount_usd": 21.44
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.732,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 660308.01,
"financial_exposure_usd": 766410.71,
"recoverable_pct": 0.916
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104963",
"label": "fraudulent",
"label_confidence": 0.744,
"severity": "medium",
"timestamp": "2026-01-04T10:43:00Z",
"trace_id": "52bc05fe-7299-29c0-b312-744502c5d059"
} | {
"account_age_days": 850,
"account_id": "ACCT-DE4AA8163C57",
"baseline_risk_score": 0.385,
"kyc_tier": "tier_3",
"session_entropy": 0.585
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 274,
"timestamp": "2026-01-04T03:49:00Z",
"transaction_amount_usd": 13.9
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.495,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4842387.68,
"financial_exposure_usd": 6946698.94,
"recoverable_pct": 0.672
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103179",
"label": "fraudulent",
"label_confidence": 0.87,
"severity": "critical",
"timestamp": "2026-01-03T04:59:00Z",
"trace_id": "02fe5411-1234-7739-145b-4e6d06392344"
} | {
"account_age_days": 620,
"account_id": "ACCT-C8C7703EDB8D",
"baseline_risk_score": 0.487,
"kyc_tier": "tier_1",
"session_entropy": 0.18
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 851,
"timestamp": "2026-01-03T04:59:00Z",
"transaction_amount_usd": 45068.92
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.637,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 620895.08,
"financial_exposure_usd": 886258.52,
"recoverable_pct": 0.568
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109867",
"label": "benign",
"label_confidence": 0.717,
"severity": "low",
"timestamp": "2026-01-07T20:27:00Z",
"trace_id": "7c15719d-065d-930a-464a-11da4a7ae5a1"
} | {
"account_age_days": 1909,
"account_id": "ACCT-9A4BC8E97123",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.548
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 1163,
"timestamp": "2026-01-07T20:27:00Z",
"transaction_amount_usd": 13963
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.783,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1637.96,
"financial_exposure_usd": 1759.76,
"recoverable_pct": 0.866
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103290",
"label": "fraudulent",
"label_confidence": 0.892,
"severity": "medium",
"timestamp": "2026-01-03T06:50:00Z",
"trace_id": "fc570fdf-7063-508a-9cb7-612bbc6ee2c6"
} | {
"account_age_days": 48,
"account_id": "ACCT-200F465D6D10",
"baseline_risk_score": 0.616,
"kyc_tier": "tier_3",
"session_entropy": 0.721
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 652,
"timestamp": "2026-01-03T06:50:00Z",
"transaction_amount_usd": 44931.52
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.72,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 892878.09,
"financial_exposure_usd": 897633.9,
"recoverable_pct": 0.343
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105009",
"label": "fraudulent",
"label_confidence": 0.709,
"severity": "critical",
"timestamp": "2026-01-04T11:29:00Z",
"trace_id": "bafeb4cc-7537-8b26-9d13-f04b50ddb8a4"
} | {
"account_age_days": 1364,
"account_id": "ACCT-B52E550AAA1C",
"baseline_risk_score": 0.168,
"kyc_tier": "tier_3",
"session_entropy": 0.415
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 438,
"timestamp": "2026-01-04T11:29:00Z",
"transaction_amount_usd": 643439.65
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.368,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4000453.55,
"financial_exposure_usd": 5818662.74,
"recoverable_pct": 0.685
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105683",
"label": "fraudulent",
"label_confidence": 0.72,
"severity": "high",
"timestamp": "2026-01-04T22:43:00Z",
"trace_id": "45025d8a-a692-2311-a46e-56c2333f0591"
} | {
"account_age_days": 1015,
"account_id": "ACCT-5E575C5314A0",
"baseline_risk_score": 0.343,
"kyc_tier": "tier_2",
"session_entropy": 0.414
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 276,
"timestamp": "2026-01-04T13:34:00Z",
"transaction_amount_usd": 23.7
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.577,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3281400.82,
"financial_exposure_usd": 6479168.12,
"recoverable_pct": 0.77
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105652",
"label": "fraudulent",
"label_confidence": 0.801,
"severity": "high",
"timestamp": "2026-01-04T22:12:00Z",
"trace_id": "95ec8ebb-5bd7-fd00-fa3c-92cc4d78110d"
} | {
"account_age_days": 297,
"account_id": "ACCT-9FC632C0EC54",
"baseline_risk_score": 0.243,
"kyc_tier": "tier_3",
"session_entropy": 0.375
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 382,
"timestamp": "2026-01-04T22:12:00Z",
"transaction_amount_usd": 1510813.82
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.504,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 7338179.26,
"financial_exposure_usd": 7648097.06,
"recoverable_pct": 0.408
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100528",
"label": "fraudulent",
"label_confidence": 0.919,
"severity": "medium",
"timestamp": "2026-01-01T08:48:00Z",
"trace_id": "48555e78-90fb-d067-4c2b-1f6fe702cea2"
} | {
"account_age_days": 518,
"account_id": "ACCT-55CE011DDA7F",
"baseline_risk_score": 0.553,
"kyc_tier": "tier_1",
"session_entropy": 0.724
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "SG",
"latency_ms": 1014,
"timestamp": "2026-01-01T08:48:00Z",
"transaction_amount_usd": 73628.74
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.492,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 368668.03,
"financial_exposure_usd": 761081.69,
"recoverable_pct": 0.222
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100680",
"label": "fraudulent",
"label_confidence": 0.794,
"severity": "critical",
"timestamp": "2026-01-01T11:20:00Z",
"trace_id": "123ce770-8e24-79e7-2601-9167a275429a"
} | {
"account_age_days": 401,
"account_id": "ACCT-6AFCDF872E3F",
"baseline_risk_score": 0.404,
"kyc_tier": "tier_1",
"session_entropy": 0.118
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "US",
"latency_ms": 887,
"timestamp": "2026-01-01T11:20:00Z",
"transaction_amount_usd": 80123.58
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.678,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 387131,
"financial_exposure_usd": 506185.69,
"recoverable_pct": 0.5
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100799",
"label": "fraudulent",
"label_confidence": 0.798,
"severity": "medium",
"timestamp": "2026-01-01T13:19:00Z",
"trace_id": "d3e92b75-61f3-555d-118e-aee6e28938f4"
} | {
"account_age_days": 1348,
"account_id": "ACCT-6B17500A2A0F",
"baseline_risk_score": 0.344,
"kyc_tier": "tier_2",
"session_entropy": 0.744
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 127,
"timestamp": "2026-01-01T13:19:00Z",
"transaction_amount_usd": 17220.54
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.704,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 233576.32,
"financial_exposure_usd": 238538.07,
"recoverable_pct": 0.694
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105249",
"label": "fraudulent",
"label_confidence": 0.894,
"severity": "high",
"timestamp": "2026-01-04T15:29:00Z",
"trace_id": "6d9c37bb-224e-0f37-a88f-d09b9f79de13"
} | {
"account_age_days": 1285,
"account_id": "ACCT-769202CC75F8",
"baseline_risk_score": 0.441,
"kyc_tier": "tier_3",
"session_entropy": 0.349
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 137,
"timestamp": "2026-01-04T15:29:00Z",
"transaction_amount_usd": 568315.38
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.752,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3419970.42,
"financial_exposure_usd": 4246402.64,
"recoverable_pct": 0.698
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100137",
"label": "fraudulent",
"label_confidence": 0.763,
"severity": "critical",
"timestamp": "2026-01-01T02:17:00Z",
"trace_id": "1ae17565-f3a8-0aa0-60ee-0cbc38e3c67d"
} | {
"account_age_days": 1793,
"account_id": "ACCT-EDF98B8D8DDD",
"baseline_risk_score": 0.316,
"kyc_tier": "tier_1",
"session_entropy": 0.519
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 258,
"timestamp": "2025-12-31T23:38:00Z",
"transaction_amount_usd": 12.24
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.756,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 393087.92,
"financial_exposure_usd": 571520.21,
"recoverable_pct": 0.438
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102761",
"label": "fraudulent",
"label_confidence": 0.969,
"severity": "high",
"timestamp": "2026-01-02T22:01:00Z",
"trace_id": "57b0ad21-8157-d608-ccbf-33609af4bc6f"
} | {
"account_age_days": 1150,
"account_id": "ACCT-36B1E111F2C7",
"baseline_risk_score": 0.639,
"kyc_tier": "tier_3",
"session_entropy": 0.703
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 1032,
"timestamp": "2026-01-02T22:01:00Z",
"transaction_amount_usd": 24900.88
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.771,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 432345.44,
"financial_exposure_usd": 657545.76,
"recoverable_pct": 0.286
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106332",
"label": "fraudulent",
"label_confidence": 0.642,
"severity": "low",
"timestamp": "2026-01-05T09:32:00Z",
"trace_id": "8025f944-41e0-c9da-8a42-f6c2c71d389d"
} | {
"account_age_days": 791,
"account_id": "ACCT-CDA8503D6569",
"baseline_risk_score": 0.064,
"kyc_tier": "tier_3",
"session_entropy": 0.84
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 289,
"timestamp": "2026-01-05T05:01:00Z",
"transaction_amount_usd": 9.85
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.921,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2099501.4,
"financial_exposure_usd": 3548911.68,
"recoverable_pct": 0.849
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103283",
"label": "fraudulent",
"label_confidence": 0.817,
"severity": "critical",
"timestamp": "2026-01-03T06:43:00Z",
"trace_id": "1482fa30-bb53-852f-eda6-018f7bf65190"
} | {
"account_age_days": 1206,
"account_id": "ACCT-6720D21B9C15",
"baseline_risk_score": 0.591,
"kyc_tier": "tier_1",
"session_entropy": 0.682
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 1023,
"timestamp": "2026-01-03T06:43:00Z",
"transaction_amount_usd": 71001.37
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.587,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 326667.46,
"financial_exposure_usd": 482944.28,
"recoverable_pct": 0.447
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107484",
"label": "benign",
"label_confidence": 0.54,
"severity": "medium",
"timestamp": "2026-01-06T04:44:00Z",
"trace_id": "03f36b91-d333-fd33-224e-7d64b81ae974"
} | {
"account_age_days": 1481,
"account_id": "ACCT-DB66D30DB7AD",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.169
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 1133,
"timestamp": "2026-01-06T04:44:00Z",
"transaction_amount_usd": 9150.24
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.51,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 122.75,
"financial_exposure_usd": 132.24,
"recoverable_pct": 0.8
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106796",
"label": "benign",
"label_confidence": 0.66,
"severity": "medium",
"timestamp": "2026-01-05T17:16:00Z",
"trace_id": "087d4a62-e971-77f3-d692-9a253357b507"
} | {
"account_age_days": 718,
"account_id": "ACCT-21662F76F4E9",
"baseline_risk_score": 0.09,
"kyc_tier": "tier_2",
"session_entropy": 0.206
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 769,
"timestamp": "2026-01-05T17:16:00Z",
"transaction_amount_usd": 14739.39
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.796,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1166.09,
"financial_exposure_usd": 2002.11,
"recoverable_pct": 0.823
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100860",
"label": "fraudulent",
"label_confidence": 0.788,
"severity": "medium",
"timestamp": "2026-01-01T14:20:00Z",
"trace_id": "c464ef4a-2f9b-e194-9391-98fdcf753c1e"
} | {
"account_age_days": 1423,
"account_id": "ACCT-8E822794EF40",
"baseline_risk_score": 0.283,
"kyc_tier": "tier_1",
"session_entropy": 0.545
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 1015,
"timestamp": "2026-01-01T14:20:00Z",
"transaction_amount_usd": 56338.59
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.693,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 257029.31,
"financial_exposure_usd": 457415.85,
"recoverable_pct": 0.045
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104650",
"label": "fraudulent",
"label_confidence": 0.638,
"severity": "critical",
"timestamp": "2026-01-04T05:30:00Z",
"trace_id": "c3214c2b-46be-b04c-2d61-631a4671abce"
} | {
"account_age_days": 1026,
"account_id": "ACCT-4C3166593279",
"baseline_risk_score": 0.068,
"kyc_tier": "tier_2",
"session_entropy": 0.571
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 388,
"timestamp": "2026-01-04T03:14:00Z",
"transaction_amount_usd": 13.11
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.949,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2803745.49,
"financial_exposure_usd": 5733974.5,
"recoverable_pct": 0.448
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105336",
"label": "fraudulent",
"label_confidence": 0.618,
"severity": "high",
"timestamp": "2026-01-04T16:56:00Z",
"trace_id": "35aa8266-e642-8499-9574-acc839c38f96"
} | {
"account_age_days": 240,
"account_id": "ACCT-C57209DA762E",
"baseline_risk_score": 0.378,
"kyc_tier": "tier_2",
"session_entropy": 0.541
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 982,
"timestamp": "2026-01-04T16:56:00Z",
"transaction_amount_usd": 2826640.85
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.424,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2152955.32,
"financial_exposure_usd": 2386715.84,
"recoverable_pct": 0.433
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100737",
"label": "fraudulent",
"label_confidence": 0.952,
"severity": "medium",
"timestamp": "2026-01-01T12:17:00Z",
"trace_id": "46fc31db-55ca-982a-ca88-276436affc77"
} | {
"account_age_days": 1527,
"account_id": "ACCT-4ECC42857011",
"baseline_risk_score": 0.312,
"kyc_tier": "tier_1",
"session_entropy": 0.231
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 141,
"timestamp": "2026-01-01T12:17:00Z",
"transaction_amount_usd": 76135.58
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.364,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 371093.28,
"financial_exposure_usd": 861459.26,
"recoverable_pct": 0.062
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103084",
"label": "fraudulent",
"label_confidence": 0.899,
"severity": "low",
"timestamp": "2026-01-03T03:24:00Z",
"trace_id": "490604c5-3bec-4fa7-9726-71e58f2a7fe0"
} | {
"account_age_days": 638,
"account_id": "ACCT-367F621C1330",
"baseline_risk_score": 0.642,
"kyc_tier": "tier_1",
"session_entropy": 0.632
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "DE",
"latency_ms": 712,
"timestamp": "2026-01-03T03:24:00Z",
"transaction_amount_usd": 6130.13
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.892,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 612796.7,
"financial_exposure_usd": 676896.56,
"recoverable_pct": 0.644
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101909",
"label": "fraudulent",
"label_confidence": 0.899,
"severity": "medium",
"timestamp": "2026-01-02T07:49:00Z",
"trace_id": "1e46fe54-ea1c-3946-4afe-448411cacd0e"
} | {
"account_age_days": 129,
"account_id": "ACCT-DA35C3CEB1B7",
"baseline_risk_score": 0.51,
"kyc_tier": "tier_1",
"session_entropy": 0.931
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 981,
"timestamp": "2026-01-02T07:49:00Z",
"transaction_amount_usd": 85447.7
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.692,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 149085.88,
"financial_exposure_usd": 176159.21,
"recoverable_pct": 0.32
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102799",
"label": "fraudulent",
"label_confidence": 0.877,
"severity": "high",
"timestamp": "2026-01-02T22:39:00Z",
"trace_id": "2f9ee133-e698-33d5-5130-cda543d55d6c"
} | {
"account_age_days": 580,
"account_id": "ACCT-38615F940068",
"baseline_risk_score": 0.413,
"kyc_tier": "tier_1",
"session_entropy": 0.431
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NL",
"latency_ms": 223,
"timestamp": "2026-01-02T22:39:00Z",
"transaction_amount_usd": 106315.23
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.751,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 813762.65,
"financial_exposure_usd": 815000.14,
"recoverable_pct": 0.185
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106713",
"label": "benign",
"label_confidence": 0.554,
"severity": "low",
"timestamp": "2026-01-05T15:53:00Z",
"trace_id": "285503a6-9120-68b7-e0d5-a1970b193754"
} | {
"account_age_days": 1047,
"account_id": "ACCT-F1F8DF842D87",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.646
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 509,
"timestamp": "2026-01-05T15:53:00Z",
"transaction_amount_usd": 1140.92
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.762,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1787.73,
"financial_exposure_usd": 3148.96,
"recoverable_pct": 0.811
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101943",
"label": "fraudulent",
"label_confidence": 0.832,
"severity": "low",
"timestamp": "2026-01-02T08:23:00Z",
"trace_id": "282bb3ff-2646-9b50-f722-ee1f7a7cc8cd"
} | {
"account_age_days": 423,
"account_id": "ACCT-0360BD533DA1",
"baseline_risk_score": 0.359,
"kyc_tier": "tier_1",
"session_entropy": 0.237
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CH",
"latency_ms": 1042,
"timestamp": "2026-01-02T08:23:00Z",
"transaction_amount_usd": 66593.26
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.458,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 514772.38,
"financial_exposure_usd": 712874.46,
"recoverable_pct": 0.394
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107938",
"label": "benign",
"label_confidence": 0.63,
"severity": "high",
"timestamp": "2026-01-06T12:18:00Z",
"trace_id": "1e5ce5fd-4822-6bec-b9d3-04834f6398b1"
} | {
"account_age_days": 235,
"account_id": "ACCT-1860873DFD1E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.834
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 867,
"timestamp": "2026-01-06T12:18:00Z",
"transaction_amount_usd": 7741.66
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.783,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 518.42,
"financial_exposure_usd": 1192.05,
"recoverable_pct": 0.604
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104877",
"label": "fraudulent",
"label_confidence": 0.914,
"severity": "high",
"timestamp": "2026-01-04T09:17:00Z",
"trace_id": "fed100b5-d822-013b-3b1c-ddfa1595dcb0"
} | {
"account_age_days": 843,
"account_id": "ACCT-D5893A1ACCB5",
"baseline_risk_score": 0.223,
"kyc_tier": "tier_3",
"session_entropy": 0.129
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 1025,
"timestamp": "2026-01-04T09:17:00Z",
"transaction_amount_usd": 2942629.68
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.525,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2505875.64,
"financial_exposure_usd": 4035697.56,
"recoverable_pct": 0.868
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105537",
"label": "fraudulent",
"label_confidence": 0.696,
"severity": "critical",
"timestamp": "2026-01-04T20:17:00Z",
"trace_id": "dfee2caa-491b-152d-ca4b-d82cd54fbb78"
} | {
"account_age_days": 1925,
"account_id": "ACCT-001052DB996F",
"baseline_risk_score": 0.278,
"kyc_tier": "tier_3",
"session_entropy": 0.555
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 269,
"timestamp": "2026-01-04T16:10:00Z",
"transaction_amount_usd": 24.31
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.755,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 7243242.37,
"financial_exposure_usd": 9579788.07,
"recoverable_pct": 0.917
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101679",
"label": "fraudulent",
"label_confidence": 0.908,
"severity": "medium",
"timestamp": "2026-01-02T03:59:00Z",
"trace_id": "71e7ae26-938d-2668-0d85-89d275b20a3f"
} | {
"account_age_days": 788,
"account_id": "ACCT-C8D74BF83111",
"baseline_risk_score": 0.461,
"kyc_tier": "tier_3",
"session_entropy": 0.254
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 238,
"timestamp": "2026-01-01T21:08:00Z",
"transaction_amount_usd": 21.03
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.376,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 834606.36,
"financial_exposure_usd": 1227664.49,
"recoverable_pct": 0.548
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104794",
"label": "fraudulent",
"label_confidence": 0.723,
"severity": "medium",
"timestamp": "2026-01-04T07:54:00Z",
"trace_id": "f9189519-7a52-8589-898d-57da72676be1"
} | {
"account_age_days": 1259,
"account_id": "ACCT-45FA42AE96DE",
"baseline_risk_score": 0.259,
"kyc_tier": "tier_2",
"session_entropy": 0.529
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 771,
"timestamp": "2026-01-04T07:54:00Z",
"transaction_amount_usd": 1004933.36
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.37,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 6552647.98,
"financial_exposure_usd": 9601228.89,
"recoverable_pct": 0.482
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101219",
"label": "fraudulent",
"label_confidence": 0.9,
"severity": "high",
"timestamp": "2026-01-01T20:19:00Z",
"trace_id": "16793705-98e3-f82f-6fac-e07a7b070ecf"
} | {
"account_age_days": 509,
"account_id": "ACCT-B621ABAB8C24",
"baseline_risk_score": 0.431,
"kyc_tier": "tier_1",
"session_entropy": 0.607
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 223,
"timestamp": "2026-01-01T11:35:00Z",
"transaction_amount_usd": 1.69
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.405,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 298590.43,
"financial_exposure_usd": 408790.93,
"recoverable_pct": 0.308
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102686",
"label": "fraudulent",
"label_confidence": 0.926,
"severity": "low",
"timestamp": "2026-01-02T20:46:00Z",
"trace_id": "6cac8cf4-1cbd-064b-f048-0ccfaa211c7f"
} | {
"account_age_days": 54,
"account_id": "ACCT-2BA9B7F69DAE",
"baseline_risk_score": 0.619,
"kyc_tier": "tier_3",
"session_entropy": 0.78
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "HK",
"latency_ms": 617,
"timestamp": "2026-01-02T20:46:00Z",
"transaction_amount_usd": 34978.71
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.922,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 382344.72,
"financial_exposure_usd": 474285.1,
"recoverable_pct": 0.503
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103670",
"label": "fraudulent",
"label_confidence": 0.895,
"severity": "medium",
"timestamp": "2026-01-03T13:10:00Z",
"trace_id": "d94184b5-b9ec-792d-dd7c-634f59aedb6b"
} | {
"account_age_days": 184,
"account_id": "ACCT-F27A3C9EA899",
"baseline_risk_score": 0.1,
"kyc_tier": "tier_3",
"session_entropy": 0.363
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 141,
"timestamp": "2026-01-03T12:23:00Z",
"transaction_amount_usd": 18.8
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.788,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 908528.26,
"financial_exposure_usd": 1795858.08,
"recoverable_pct": 0.864
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105958",
"label": "fraudulent",
"label_confidence": 0.657,
"severity": "medium",
"timestamp": "2026-01-05T03:18:00Z",
"trace_id": "51672c8b-40a5-5b2b-4699-5153c127c261"
} | {
"account_age_days": 926,
"account_id": "ACCT-D8CDE0316F55",
"baseline_risk_score": 0.276,
"kyc_tier": "tier_1",
"session_entropy": 0.753
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 240,
"timestamp": "2026-01-04T21:42:00Z",
"transaction_amount_usd": 9.06
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.769,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3649060.6,
"financial_exposure_usd": 4349172.87,
"recoverable_pct": 0.783
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108337",
"label": "benign",
"label_confidence": 0.732,
"severity": "low",
"timestamp": "2026-01-06T18:57:00Z",
"trace_id": "0a49e4ea-22fa-825b-b7fd-4a230f1a2216"
} | {
"account_age_days": 418,
"account_id": "ACCT-906F5CCF0D9F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.902
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 369,
"timestamp": "2026-01-06T14:55:00Z",
"transaction_amount_usd": 9.03
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.745,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3707.91,
"financial_exposure_usd": 6227,
"recoverable_pct": 0.834
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104328",
"label": "fraudulent",
"label_confidence": 0.724,
"severity": "critical",
"timestamp": "2026-01-04T00:08:00Z",
"trace_id": "18525854-abd2-068e-0ac3-56b2049a4220"
} | {
"account_age_days": 739,
"account_id": "ACCT-8A3EB5802DBF",
"baseline_risk_score": 0.271,
"kyc_tier": "tier_2",
"session_entropy": 0.85
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 190,
"timestamp": "2026-01-03T16:14:00Z",
"transaction_amount_usd": 19.55
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POST... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.85,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1579789.88,
"financial_exposure_usd": 3818756.13,
"recoverable_pct": 0.87
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103544",
"label": "fraudulent",
"label_confidence": 0.727,
"severity": "critical",
"timestamp": "2026-01-03T11:04:00Z",
"trace_id": "f06a6ce4-322c-710f-025c-55ca5b0d9546"
} | {
"account_age_days": 252,
"account_id": "ACCT-364E47E93FF5",
"baseline_risk_score": 0.121,
"kyc_tier": "tier_1",
"session_entropy": 0.606
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 265,
"timestamp": "2026-01-03T01:44:00Z",
"transaction_amount_usd": 5.89
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.485,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2649824.06,
"financial_exposure_usd": 3683499.02,
"recoverable_pct": 0.741
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100444",
"label": "fraudulent",
"label_confidence": 0.768,
"severity": "critical",
"timestamp": "2026-01-01T07:24:00Z",
"trace_id": "a8c7916a-142d-0e7c-5c03-53172f384264"
} | {
"account_age_days": 1714,
"account_id": "ACCT-F169E2CE39F2",
"baseline_risk_score": 0.344,
"kyc_tier": "tier_1",
"session_entropy": 0.163
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "DE",
"latency_ms": 419,
"timestamp": "2026-01-01T07:24:00Z",
"transaction_amount_usd": 88521.17
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.369,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 401610.5,
"financial_exposure_usd": 639348.94,
"recoverable_pct": 0.324
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108663",
"label": "benign",
"label_confidence": 0.474,
"severity": "low",
"timestamp": "2026-01-07T00:23:00Z",
"trace_id": "0a726512-42d9-27fd-7200-a509976d79c0"
} | {
"account_age_days": 1034,
"account_id": "ACCT-C0C0A5729C7F",
"baseline_risk_score": 0.167,
"kyc_tier": "tier_1",
"session_entropy": 0.532
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 688,
"timestamp": "2026-01-07T00:23:00Z",
"transaction_amount_usd": 13645.25
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.555,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2913.51,
"financial_exposure_usd": 4677.78,
"recoverable_pct": 0.797
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100947",
"label": "fraudulent",
"label_confidence": 0.93,
"severity": "high",
"timestamp": "2026-01-01T15:47:00Z",
"trace_id": "330402d6-5c13-46dd-db40-ed808cbd46ae"
} | {
"account_age_days": 302,
"account_id": "ACCT-C1503DD944F7",
"baseline_risk_score": 0.496,
"kyc_tier": "tier_1",
"session_entropy": 0.874
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CA",
"latency_ms": 1028,
"timestamp": "2026-01-01T15:47:00Z",
"transaction_amount_usd": 15965.19
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.766,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 949269.4,
"financial_exposure_usd": 955529.64,
"recoverable_pct": 0.492
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102878",
"label": "fraudulent",
"label_confidence": 0.904,
"severity": "low",
"timestamp": "2026-01-02T23:58:00Z",
"trace_id": "8311440f-b7f4-f05b-e88d-2d99a4ccfa6c"
} | {
"account_age_days": 1420,
"account_id": "ACCT-CD394997F3D7",
"baseline_risk_score": 0.512,
"kyc_tier": "tier_3",
"session_entropy": 0.322
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CH",
"latency_ms": 795,
"timestamp": "2026-01-02T23:58:00Z",
"transaction_amount_usd": 4038.33
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.68,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 635877.83,
"financial_exposure_usd": 788700.06,
"recoverable_pct": 0.386
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109231",
"label": "benign",
"label_confidence": 0.655,
"severity": "low",
"timestamp": "2026-01-07T09:51:00Z",
"trace_id": "df1e9cab-5eae-577e-2776-02a6cdff7c65"
} | {
"account_age_days": 206,
"account_id": "ACCT-1A4172C8EE72",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.726
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 1046,
"timestamp": "2026-01-07T09:51:00Z",
"transaction_amount_usd": 11189.5
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.461,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3691,
"financial_exposure_usd": 5993.43,
"recoverable_pct": 0.403
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104945",
"label": "fraudulent",
"label_confidence": 0.882,
"severity": "high",
"timestamp": "2026-01-04T10:25:00Z",
"trace_id": "0c23bfcb-7747-259f-2dfb-18dc2d89cef1"
} | {
"account_age_days": 1659,
"account_id": "ACCT-0004DBB3CE51",
"baseline_risk_score": 0.43,
"kyc_tier": "tier_1",
"session_entropy": 0.649
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 334,
"timestamp": "2026-01-04T01:27:00Z",
"transaction_amount_usd": 23.25
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POST... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.728,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2052879.74,
"financial_exposure_usd": 2761223.72,
"recoverable_pct": 0.686
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106287",
"label": "fraudulent",
"label_confidence": 0.949,
"severity": "medium",
"timestamp": "2026-01-05T08:47:00Z",
"trace_id": "8096cb02-89d3-5281-11cf-7766f4d32b1a"
} | {
"account_age_days": 985,
"account_id": "ACCT-D369112B3C1B",
"baseline_risk_score": 0.403,
"kyc_tier": "tier_2",
"session_entropy": 0.469
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 82,
"timestamp": "2026-01-05T03:46:00Z",
"transaction_amount_usd": 23.37
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.692,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5495525.02,
"financial_exposure_usd": 8090789.72,
"recoverable_pct": 0.818
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100545",
"label": "fraudulent",
"label_confidence": 0.86,
"severity": "low",
"timestamp": "2026-01-01T09:05:00Z",
"trace_id": "66458972-d088-e438-c078-49f2733b08b8"
} | {
"account_age_days": 1199,
"account_id": "ACCT-F5C8A1C7DC60",
"baseline_risk_score": 0.402,
"kyc_tier": "tier_1",
"session_entropy": 0.467
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 887,
"timestamp": "2026-01-01T09:05:00Z",
"transaction_amount_usd": 86489.41
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.447,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 760017.3,
"financial_exposure_usd": 1371461.74,
"recoverable_pct": 0.047
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101210",
"label": "fraudulent",
"label_confidence": 0.891,
"severity": "medium",
"timestamp": "2026-01-01T20:10:00Z",
"trace_id": "9f04cdec-57d6-2fd6-0138-addecc71bf61"
} | {
"account_age_days": 402,
"account_id": "ACCT-EEA13BF79E12",
"baseline_risk_score": 0.565,
"kyc_tier": "tier_2",
"session_entropy": 0.682
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 674,
"timestamp": "2026-01-01T20:10:00Z",
"transaction_amount_usd": 20093.38
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.589,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 90118.33,
"financial_exposure_usd": 181781.51,
"recoverable_pct": 0.612
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101053",
"label": "fraudulent",
"label_confidence": 0.955,
"severity": "high",
"timestamp": "2026-01-01T17:33:00Z",
"trace_id": "e6d9011a-77af-791c-0d29-bcbe5cb8f9a2"
} | {
"account_age_days": 1922,
"account_id": "ACCT-90CF490D7138",
"baseline_risk_score": 0.6,
"kyc_tier": "tier_2",
"session_entropy": 0.794
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 109,
"timestamp": "2026-01-01T13:24:00Z",
"transaction_amount_usd": 4.62
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.683,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 637610.97,
"financial_exposure_usd": 1222090.02,
"recoverable_pct": 0.377
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106718",
"label": "benign",
"label_confidence": 0.733,
"severity": "medium",
"timestamp": "2026-01-05T15:58:00Z",
"trace_id": "c2b4007b-177e-af11-cc3d-37eaf2efbf42"
} | {
"account_age_days": 1500,
"account_id": "ACCT-1FAAECD54192",
"baseline_risk_score": 0.133,
"kyc_tier": "tier_3",
"session_entropy": 0.74
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 398,
"timestamp": "2026-01-05T09:35:00Z",
"transaction_amount_usd": 23.88
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.519,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2728.13,
"financial_exposure_usd": 4369.16,
"recoverable_pct": 0.475
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107797",
"label": "benign",
"label_confidence": 0.587,
"severity": "medium",
"timestamp": "2026-01-06T09:57:00Z",
"trace_id": "942a757a-073e-153f-28a8-30f10d932d42"
} | {
"account_age_days": 895,
"account_id": "ACCT-699070B454D6",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.436
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 487,
"timestamp": "2026-01-06T09:57:00Z",
"transaction_amount_usd": 3285.95
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.617,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1940.41,
"financial_exposure_usd": 2271.5,
"recoverable_pct": 0.954
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107370",
"label": "benign",
"label_confidence": 0.599,
"severity": "high",
"timestamp": "2026-01-06T02:50:00Z",
"trace_id": "507133a3-655a-4e2f-2496-975087d67b04"
} | {
"account_age_days": 412,
"account_id": "ACCT-B9180E2DE54F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.574
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 1158,
"timestamp": "2026-01-06T02:50:00Z",
"transaction_amount_usd": 11756.18
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.762,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 318.87,
"financial_exposure_usd": 688.43,
"recoverable_pct": 0.838
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105543",
"label": "fraudulent",
"label_confidence": 0.857,
"severity": "high",
"timestamp": "2026-01-04T20:23:00Z",
"trace_id": "4355ca78-d566-5f5c-ad99-0ac89f81b5c3"
} | {
"account_age_days": 1438,
"account_id": "ACCT-8C3165D1059C",
"baseline_risk_score": 0.286,
"kyc_tier": "tier_3",
"session_entropy": 0.713
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 395,
"timestamp": "2026-01-04T14:18:00Z",
"transaction_amount_usd": 23.54
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.774,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 9",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1363068.1,
"financial_exposure_usd": 1422924.04,
"recoverable_pct": 0.681
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105656",
"label": "fraudulent",
"label_confidence": 0.705,
"severity": "high",
"timestamp": "2026-01-04T22:16:00Z",
"trace_id": "c889c979-2d8b-eda7-d0d7-394b0f8b7794"
} | {
"account_age_days": 67,
"account_id": "ACCT-CFD3D40722B1",
"baseline_risk_score": 0.194,
"kyc_tier": "tier_2",
"session_entropy": 0.484
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 875,
"timestamp": "2026-01-04T22:16:00Z",
"transaction_amount_usd": 1993022.02
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.677,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3150460.61,
"financial_exposure_usd": 4472309.7,
"recoverable_pct": 0.683
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107064",
"label": "benign",
"label_confidence": 0.686,
"severity": "medium",
"timestamp": "2026-01-05T21:44:00Z",
"trace_id": "275d6ef4-271b-6ca0-bcb5-8bb69e79b6f1"
} | {
"account_age_days": 1204,
"account_id": "ACCT-3B2DC3EC0633",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.882
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 196,
"timestamp": "2026-01-05T21:44:00Z",
"transaction_amount_usd": 819.45
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.598,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3415.94,
"financial_exposure_usd": 3912.23,
"recoverable_pct": 0.698
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106704",
"label": "benign",
"label_confidence": 0.734,
"severity": "medium",
"timestamp": "2026-01-05T15:44:00Z",
"trace_id": "1cda5184-7e99-69a2-d896-9de8c3abaea8"
} | {
"account_age_days": 365,
"account_id": "ACCT-FDB422F60A49",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.152
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 208,
"timestamp": "2026-01-05T15:44:00Z",
"transaction_amount_usd": 3476.64
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.671,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2347.66,
"financial_exposure_usd": 2413.27,
"recoverable_pct": 0.471
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105130",
"label": "fraudulent",
"label_confidence": 0.705,
"severity": "critical",
"timestamp": "2026-01-04T13:30:00Z",
"trace_id": "7385252b-c724-9e3b-8515-3fe25e16a12b"
} | {
"account_age_days": 873,
"account_id": "ACCT-2DBF9E485D6A",
"baseline_risk_score": 0.059,
"kyc_tier": "tier_1",
"session_entropy": 0.163
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 91,
"timestamp": "2026-01-04T07:36:00Z",
"transaction_amount_usd": 18.6
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.925,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1942015.22,
"financial_exposure_usd": 4200142.98,
"recoverable_pct": 0.517
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107784",
"label": "benign",
"label_confidence": 0.643,
"severity": "medium",
"timestamp": "2026-01-06T09:44:00Z",
"trace_id": "68f61a23-fb4d-380a-432c-876569c14359"
} | {
"account_age_days": 1784,
"account_id": "ACCT-6A478733AA98",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.293
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 633,
"timestamp": "2026-01-06T09:44:00Z",
"transaction_amount_usd": 1974.28
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.525,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 939.32,
"financial_exposure_usd": 1550.96,
"recoverable_pct": 0.783
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102552",
"label": "fraudulent",
"label_confidence": 0.792,
"severity": "critical",
"timestamp": "2026-01-02T18:32:00Z",
"trace_id": "75c1db5a-21c7-c989-1da9-ab32baf78b6e"
} | {
"account_age_days": 109,
"account_id": "ACCT-4014B7B6E64D",
"baseline_risk_score": 0.623,
"kyc_tier": "tier_2",
"session_entropy": 0.242
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 110,
"timestamp": "2026-01-02T09:41:00Z",
"transaction_amount_usd": 11.75
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.466,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 370703.66,
"financial_exposure_usd": 468781.79,
"recoverable_pct": 0.246
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102638",
"label": "fraudulent",
"label_confidence": 0.928,
"severity": "medium",
"timestamp": "2026-01-02T19:58:00Z",
"trace_id": "a2cfb29e-b6a7-0d6a-b63e-b3702e181ff6"
} | {
"account_age_days": 1788,
"account_id": "ACCT-E404DFB4F7B4",
"baseline_risk_score": 0.616,
"kyc_tier": "tier_3",
"session_entropy": 0.703
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 1004,
"timestamp": "2026-01-02T19:58:00Z",
"transaction_amount_usd": 70322.22
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.351,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 517891.19,
"financial_exposure_usd": 566949.75,
"recoverable_pct": 0.131
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107997",
"label": "benign",
"label_confidence": 0.643,
"severity": "low",
"timestamp": "2026-01-06T13:17:00Z",
"trace_id": "f0c32e8c-ebe2-ce52-8d55-a14a905f1560"
} | {
"account_age_days": 962,
"account_id": "ACCT-97596D9EDFBD",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.812
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 394,
"timestamp": "2026-01-06T13:17:00Z",
"transaction_amount_usd": 13089.29
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.457,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2637.15,
"financial_exposure_usd": 3346.19,
"recoverable_pct": 0.87
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104973",
"label": "fraudulent",
"label_confidence": 0.889,
"severity": "critical",
"timestamp": "2026-01-04T10:53:00Z",
"trace_id": "d7c424d6-8b0d-7a51-639f-64106087bebe"
} | {
"account_age_days": 1654,
"account_id": "ACCT-318123304686",
"baseline_risk_score": 0.428,
"kyc_tier": "tier_1",
"session_entropy": 0.669
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 685,
"timestamp": "2026-01-04T10:53:00Z",
"transaction_amount_usd": 1588978.83
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.539,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2027269.69,
"financial_exposure_usd": 4640680.68,
"recoverable_pct": 0.923
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100743",
"label": "fraudulent",
"label_confidence": 0.848,
"severity": "medium",
"timestamp": "2026-01-01T12:23:00Z",
"trace_id": "aa2fe74b-1347-3e04-eb90-287e6a9c5812"
} | {
"account_age_days": 1698,
"account_id": "ACCT-BC463BFEF308",
"baseline_risk_score": 0.482,
"kyc_tier": "tier_2",
"session_entropy": 0.908
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 89,
"timestamp": "2026-01-01T03:18:00Z",
"transaction_amount_usd": 18.1
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.856,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 499511.49,
"financial_exposure_usd": 784077.02,
"recoverable_pct": 0.259
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105133",
"label": "fraudulent",
"label_confidence": 0.879,
"severity": "medium",
"timestamp": "2026-01-04T13:33:00Z",
"trace_id": "9a79fff2-3750-4856-c216-d7ebf997c8e1"
} | {
"account_age_days": 1030,
"account_id": "ACCT-E012BF17F02A",
"baseline_risk_score": 0.178,
"kyc_tier": "tier_1",
"session_entropy": 0.173
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 112,
"timestamp": "2026-01-04T05:15:00Z",
"transaction_amount_usd": 18.06
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.908,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2419477.16,
"financial_exposure_usd": 3787938.44,
"recoverable_pct": 0.841
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108796",
"label": "benign",
"label_confidence": 0.612,
"severity": "medium",
"timestamp": "2026-01-07T02:36:00Z",
"trace_id": "85654326-e6f9-d597-0aee-e42e0f3db362"
} | {
"account_age_days": 98,
"account_id": "ACCT-FE3ECA4A3201",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.848
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 170,
"timestamp": "2026-01-06T22:58:00Z",
"transaction_amount_usd": 4.42
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.765,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 597.64,
"financial_exposure_usd": 692.1,
"recoverable_pct": 0.473
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109489",
"label": "benign",
"label_confidence": 0.574,
"severity": "low",
"timestamp": "2026-01-07T14:09:00Z",
"trace_id": "33575ca8-e1be-0877-ceb0-79c48655497c"
} | {
"account_age_days": 495,
"account_id": "ACCT-12E6EB2EA98F",
"baseline_risk_score": 0.076,
"kyc_tier": "tier_1",
"session_entropy": 0.318
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 1076,
"timestamp": "2026-01-07T14:09:00Z",
"transaction_amount_usd": 5374.06
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.732,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1247.41,
"financial_exposure_usd": 2113.73,
"recoverable_pct": 0.635
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102038",
"label": "fraudulent",
"label_confidence": 0.781,
"severity": "high",
"timestamp": "2026-01-02T09:58:00Z",
"trace_id": "854fb162-5a22-5108-64fb-40ea13305707"
} | {
"account_age_days": 1267,
"account_id": "ACCT-00EF0A6A9972",
"baseline_risk_score": 0.588,
"kyc_tier": "tier_1",
"session_entropy": 0.469
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 913,
"timestamp": "2026-01-02T09:58:00Z",
"transaction_amount_usd": 44091.4
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.4,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 543206.12,
"financial_exposure_usd": 835515.41,
"recoverable_pct": 0.071
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104447",
"label": "fraudulent",
"label_confidence": 0.85,
"severity": "medium",
"timestamp": "2026-01-04T02:07:00Z",
"trace_id": "11f94278-ec0c-c21e-e7b9-a7f1527fcf92"
} | {
"account_age_days": 148,
"account_id": "ACCT-196B27112C97",
"baseline_risk_score": 0.445,
"kyc_tier": "tier_1",
"session_entropy": 0.694
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 903,
"timestamp": "2026-01-04T02:07:00Z",
"transaction_amount_usd": 1562978.66
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.922,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1889092.51,
"financial_exposure_usd": 3213186.31,
"recoverable_pct": 0.683
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108481",
"label": "benign",
"label_confidence": 0.633,
"severity": "low",
"timestamp": "2026-01-06T21:21:00Z",
"trace_id": "018a816b-c4cd-2997-b628-cee345700eed"
} | {
"account_age_days": 1185,
"account_id": "ACCT-9E793286B1B4",
"baseline_risk_score": 0.083,
"kyc_tier": "tier_1",
"session_entropy": 0.281
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 293,
"timestamp": "2026-01-06T17:51:00Z",
"transaction_amount_usd": 0.97
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.584,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1338.78,
"financial_exposure_usd": 2502.28,
"recoverable_pct": 0.575
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103600",
"label": "fraudulent",
"label_confidence": 0.651,
"severity": "medium",
"timestamp": "2026-01-03T12:00:00Z",
"trace_id": "2b15aff6-acac-c977-7cab-39e769f43516"
} | {
"account_age_days": 807,
"account_id": "ACCT-47F5AAAB6BD7",
"baseline_risk_score": 0.296,
"kyc_tier": "tier_1",
"session_entropy": 0.676
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 366,
"timestamp": "2026-01-03T06:11:00Z",
"transaction_amount_usd": 22.77
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.886,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 9",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1392565.92,
"financial_exposure_usd": 2302554.51,
"recoverable_pct": 0.719
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101336",
"label": "fraudulent",
"label_confidence": 0.858,
"severity": "medium",
"timestamp": "2026-01-01T22:16:00Z",
"trace_id": "8e37f746-b654-e7a5-922a-aec0e50cce94"
} | {
"account_age_days": 318,
"account_id": "ACCT-7BEAD72241D1",
"baseline_risk_score": 0.454,
"kyc_tier": "tier_3",
"session_entropy": 0.441
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "MY",
"latency_ms": 944,
"timestamp": "2026-01-01T22:16:00Z",
"transaction_amount_usd": 2588.17
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.408,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 379093.93,
"financial_exposure_usd": 803985.19,
"recoverable_pct": 0.622
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102087",
"label": "fraudulent",
"label_confidence": 0.784,
"severity": "low",
"timestamp": "2026-01-02T10:47:00Z",
"trace_id": "bf5d484f-4bb3-6135-a204-b32ff71320a2"
} | {
"account_age_days": 607,
"account_id": "ACCT-0DAD4A2954F9",
"baseline_risk_score": 0.595,
"kyc_tier": "tier_1",
"session_entropy": 0.941
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 391,
"timestamp": "2026-01-02T10:47:00Z",
"transaction_amount_usd": 46894.69
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.662,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 191696.75,
"financial_exposure_usd": 473055.57,
"recoverable_pct": 0.474
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101767",
"label": "fraudulent",
"label_confidence": 0.88,
"severity": "low",
"timestamp": "2026-01-02T05:27:00Z",
"trace_id": "3b0ef840-2161-8dcd-c094-31b044a28396"
} | {
"account_age_days": 383,
"account_id": "ACCT-D99F966DA1F6",
"baseline_risk_score": 0.646,
"kyc_tier": "tier_2",
"session_entropy": 0.873
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 159,
"timestamp": "2026-01-01T19:09:00Z",
"transaction_amount_usd": 14.17
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.681,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 317558.82,
"financial_exposure_usd": 658873.82,
"recoverable_pct": 0.73
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106043",
"label": "fraudulent",
"label_confidence": 0.809,
"severity": "low",
"timestamp": "2026-01-05T04:43:00Z",
"trace_id": "afbf3109-068f-c76e-f5c7-8daa43670f5f"
} | {
"account_age_days": 128,
"account_id": "ACCT-E4D0CFA05110",
"baseline_risk_score": 0.141,
"kyc_tier": "tier_2",
"session_entropy": 0.504
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 253,
"timestamp": "2026-01-05T00:12:00Z",
"transaction_amount_usd": 0.83
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.729,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1837377.52,
"financial_exposure_usd": 2681462.01,
"recoverable_pct": 0.51
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107310",
"label": "benign",
"label_confidence": 0.655,
"severity": "medium",
"timestamp": "2026-01-06T01:50:00Z",
"trace_id": "e65761f2-e208-7fdf-e183-d414f84993b4"
} | {
"account_age_days": 977,
"account_id": "ACCT-1BF090AB4B51",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.679
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 124,
"timestamp": "2026-01-05T19:28:00Z",
"transaction_amount_usd": 11.8
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.757,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2416.66,
"financial_exposure_usd": 2780.36,
"recoverable_pct": 0.886
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103885",
"label": "fraudulent",
"label_confidence": 0.646,
"severity": "critical",
"timestamp": "2026-01-03T16:45:00Z",
"trace_id": "5e5bdd31-ab2c-a781-d31f-f942e94102b5"
} | {
"account_age_days": 1727,
"account_id": "ACCT-447590BEC90D",
"baseline_risk_score": 0.38,
"kyc_tier": "tier_2",
"session_entropy": 0.407
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 310,
"timestamp": "2026-01-03T11:40:00Z",
"transaction_amount_usd": 2.87
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.918,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 6917466.36,
"financial_exposure_usd": 7552967.91,
"recoverable_pct": 0.771
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109591",
"label": "benign",
"label_confidence": 0.468,
"severity": "high",
"timestamp": "2026-01-07T15:51:00Z",
"trace_id": "b25cfbf9-4cc8-ce25-96b2-82dd3ade608d"
} | {
"account_age_days": 1759,
"account_id": "ACCT-702DEF3D661F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.687
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 82,
"timestamp": "2026-01-07T15:51:00Z",
"transaction_amount_usd": 1166.73
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.673,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1762.86,
"financial_exposure_usd": 2924.11,
"recoverable_pct": 0.718
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106436",
"label": "fraudulent",
"label_confidence": 0.644,
"severity": "high",
"timestamp": "2026-01-05T11:16:00Z",
"trace_id": "df35466a-c349-134b-30b4-e66c81bb4b8b"
} | {
"account_age_days": 570,
"account_id": "ACCT-9225660EC207",
"baseline_risk_score": 0.094,
"kyc_tier": "tier_1",
"session_entropy": 0.866
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 162,
"timestamp": "2026-01-04T23:59:00Z",
"transaction_amount_usd": 21.03
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.453,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4247992.48,
"financial_exposure_usd": 5441093.63,
"recoverable_pct": 0.861
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105280",
"label": "fraudulent",
"label_confidence": 0.664,
"severity": "medium",
"timestamp": "2026-01-04T16:00:00Z",
"trace_id": "82d5b963-bad3-ab9f-69eb-c7d5793a7604"
} | {
"account_age_days": 1523,
"account_id": "ACCT-CC972DFD0E02",
"baseline_risk_score": 0.436,
"kyc_tier": "tier_3",
"session_entropy": 0.509
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 508,
"timestamp": "2026-01-04T16:00:00Z",
"transaction_amount_usd": 2791429.79
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.871,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3093981.82,
"financial_exposure_usd": 5735991.91,
"recoverable_pct": 0.858
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107912",
"label": "benign",
"label_confidence": 0.701,
"severity": "medium",
"timestamp": "2026-01-06T11:52:00Z",
"trace_id": "24fa4c12-3b2d-c721-f7a2-8be86858f54e"
} | {
"account_age_days": 1150,
"account_id": "ACCT-6486613C0951",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.424
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 390,
"timestamp": "2026-01-06T11:52:00Z",
"transaction_amount_usd": 4241.45
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.718,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1670.44,
"financial_exposure_usd": 3988.72,
"recoverable_pct": 0.625
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100862",
"label": "fraudulent",
"label_confidence": 0.956,
"severity": "critical",
"timestamp": "2026-01-01T14:22:00Z",
"trace_id": "823ef811-0684-dfaa-f9f2-3492700b6ef6"
} | {
"account_age_days": 1062,
"account_id": "ACCT-21111D39DD36",
"baseline_risk_score": 0.423,
"kyc_tier": "tier_1",
"session_entropy": 0.312
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 646,
"timestamp": "2026-01-01T14:22:00Z",
"transaction_amount_usd": 29279.2
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.925,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 386213.25,
"financial_exposure_usd": 945965.84,
"recoverable_pct": 0.541
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105179",
"label": "fraudulent",
"label_confidence": 0.855,
"severity": "high",
"timestamp": "2026-01-04T14:19:00Z",
"trace_id": "f294285c-0339-36b7-a70d-cac7a5fdbd0b"
} | {
"account_age_days": 1894,
"account_id": "ACCT-41A036011A6D",
"baseline_risk_score": 0.365,
"kyc_tier": "tier_3",
"session_entropy": 0.487
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 406,
"timestamp": "2026-01-04T14:19:00Z",
"transaction_amount_usd": 978668.16
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.537,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3275445.44,
"financial_exposure_usd": 6239786.43,
"recoverable_pct": 0.544
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101214",
"label": "fraudulent",
"label_confidence": 0.954,
"severity": "critical",
"timestamp": "2026-01-01T20:14:00Z",
"trace_id": "553d10d0-f409-336a-e1f1-6016ec1f9067"
} | {
"account_age_days": 782,
"account_id": "ACCT-AA758D546C64",
"baseline_risk_score": 0.37,
"kyc_tier": "tier_3",
"session_entropy": 0.737
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 891,
"timestamp": "2026-01-01T20:14:00Z",
"transaction_amount_usd": 9663.49
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.402,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 204837.09,
"financial_exposure_usd": 390592.31,
"recoverable_pct": 0.018
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101491",
"label": "fraudulent",
"label_confidence": 0.843,
"severity": "high",
"timestamp": "2026-01-02T00:51:00Z",
"trace_id": "41b63091-612f-17ab-1355-0d402865cb3a"
} | {
"account_age_days": 628,
"account_id": "ACCT-4BE1702A0423",
"baseline_risk_score": 0.273,
"kyc_tier": "tier_2",
"session_entropy": 0.126
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 386,
"timestamp": "2026-01-02T00:51:00Z",
"transaction_amount_usd": 115741.94
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.459,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 384930.95,
"financial_exposure_usd": 404696.19,
"recoverable_pct": 0.348
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.