schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105317",
"label": "fraudulent",
"label_confidence": 0.848,
"severity": "high",
"timestamp": "2026-01-04T16:37:00Z",
"trace_id": "25aa7be6-daa1-080d-c0e7-ebf4e5779832"
} | {
"account_age_days": 1390,
"account_id": "ACCT-FB69C761AF7F",
"baseline_risk_score": 0.098,
"kyc_tier": "tier_2",
"session_entropy": 0.473
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 159,
"timestamp": "2026-01-04T14:55:00Z",
"transaction_amount_usd": 11
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.691,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4143239.67,
"financial_exposure_usd": 8323391.52,
"recoverable_pct": 0.871
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100687",
"label": "fraudulent",
"label_confidence": 0.812,
"severity": "critical",
"timestamp": "2026-01-01T11:27:00Z",
"trace_id": "44f9b23b-c4d2-db6b-50b5-66a5ef0b9584"
} | {
"account_age_days": 1530,
"account_id": "ACCT-358C1677A1E8",
"baseline_risk_score": 0.346,
"kyc_tier": "tier_3",
"session_entropy": 0.904
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 962,
"timestamp": "2026-01-01T11:27:00Z",
"transaction_amount_usd": 9830.54
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.878,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 243365.66,
"financial_exposure_usd": 586331.56,
"recoverable_pct": 0.281
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104818",
"label": "fraudulent",
"label_confidence": 0.74,
"severity": "high",
"timestamp": "2026-01-04T08:18:00Z",
"trace_id": "a9fae246-e3b8-a4a3-01c2-f0e95dda3a08"
} | {
"account_age_days": 1921,
"account_id": "ACCT-E905A25922D7",
"baseline_risk_score": 0.056,
"kyc_tier": "tier_3",
"session_entropy": 0.53
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 459,
"timestamp": "2026-01-04T08:18:00Z",
"transaction_amount_usd": 1092014.84
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.777,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 447493.78,
"financial_exposure_usd": 766322.47,
"recoverable_pct": 0.988
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103694",
"label": "fraudulent",
"label_confidence": 0.676,
"severity": "medium",
"timestamp": "2026-01-03T13:34:00Z",
"trace_id": "e3bb1ef8-d12a-8912-0266-0aa7e3fe8171"
} | {
"account_age_days": 1715,
"account_id": "ACCT-DF84917032CB",
"baseline_risk_score": 0.411,
"kyc_tier": "tier_3",
"session_entropy": 0.274
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 287,
"timestamp": "2026-01-03T08:41:00Z",
"transaction_amount_usd": 4.29
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.733,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1948081.41,
"financial_exposure_usd": 2569596.08,
"recoverable_pct": 0.9
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105910",
"label": "fraudulent",
"label_confidence": 0.921,
"severity": "medium",
"timestamp": "2026-01-05T02:30:00Z",
"trace_id": "e7996c69-fc6b-f7ed-f4a1-c8094964d4b7"
} | {
"account_age_days": 204,
"account_id": "ACCT-B0FF81E2499F",
"baseline_risk_score": 0.41,
"kyc_tier": "tier_1",
"session_entropy": 0.595
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 310,
"timestamp": "2026-01-04T16:02:00Z",
"transaction_amount_usd": 20.74
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.716,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1288882.04,
"financial_exposure_usd": 3009459.8,
"recoverable_pct": 0.781
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108282",
"label": "benign",
"label_confidence": 0.629,
"severity": "medium",
"timestamp": "2026-01-06T18:02:00Z",
"trace_id": "687bb52a-796d-cefd-b6d4-68c248a8aba4"
} | {
"account_age_days": 106,
"account_id": "ACCT-2579570852CE",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.217
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 550,
"timestamp": "2026-01-06T18:02:00Z",
"transaction_amount_usd": 6114.49
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.645,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1222.57,
"financial_exposure_usd": 1564.18,
"recoverable_pct": 0.522
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100153",
"label": "fraudulent",
"label_confidence": 0.887,
"severity": "high",
"timestamp": "2026-01-01T02:33:00Z",
"trace_id": "f9d59f7f-1e01-4975-080d-2370dad4c20f"
} | {
"account_age_days": 787,
"account_id": "ACCT-9F7717CA5199",
"baseline_risk_score": 0.428,
"kyc_tier": "tier_2",
"session_entropy": 0.191
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CH",
"latency_ms": 1148,
"timestamp": "2026-01-01T02:33:00Z",
"transaction_amount_usd": 58327.36
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.69,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 342200.34,
"financial_exposure_usd": 364532.78,
"recoverable_pct": 0.696
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100845",
"label": "fraudulent",
"label_confidence": 0.776,
"severity": "critical",
"timestamp": "2026-01-01T14:05:00Z",
"trace_id": "78a2bbc2-3f83-c0da-7d04-681eb87d4b50"
} | {
"account_age_days": 1964,
"account_id": "ACCT-33B5F5132DF6",
"baseline_risk_score": 0.5,
"kyc_tier": "tier_2",
"session_entropy": 0.326
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "US",
"latency_ms": 378,
"timestamp": "2026-01-01T14:05:00Z",
"transaction_amount_usd": 73833.34
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.574,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 701013.52,
"financial_exposure_usd": 1074714.33,
"recoverable_pct": 0.695
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107164",
"label": "benign",
"label_confidence": 0.707,
"severity": "low",
"timestamp": "2026-01-05T23:24:00Z",
"trace_id": "a11acf29-4907-4c85-819d-8c98d5d3f8ac"
} | {
"account_age_days": 970,
"account_id": "ACCT-A3E9A13D2F24",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.205
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 1111,
"timestamp": "2026-01-05T23:24:00Z",
"transaction_amount_usd": 9264.13
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.601,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2903.57,
"financial_exposure_usd": 3177.66,
"recoverable_pct": 0.953
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101164",
"label": "fraudulent",
"label_confidence": 0.771,
"severity": "critical",
"timestamp": "2026-01-01T19:24:00Z",
"trace_id": "a5b5fc5e-9b27-2454-a924-ead5439412db"
} | {
"account_age_days": 1052,
"account_id": "ACCT-76F6C1A6E71E",
"baseline_risk_score": 0.642,
"kyc_tier": "tier_3",
"session_entropy": 0.321
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 176,
"timestamp": "2026-01-01T19:24:00Z",
"transaction_amount_usd": 48181
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.58,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 594817.85,
"financial_exposure_usd": 702194.39,
"recoverable_pct": 0.531
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107010",
"label": "benign",
"label_confidence": 0.701,
"severity": "low",
"timestamp": "2026-01-05T20:50:00Z",
"trace_id": "7dd05a13-596e-aced-c22f-2808e6e1c908"
} | {
"account_age_days": 215,
"account_id": "ACCT-2791C98A8844",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.573
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 338,
"timestamp": "2026-01-05T14:02:00Z",
"transaction_amount_usd": 23.08
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.715,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2045.33,
"financial_exposure_usd": 4900.34,
"recoverable_pct": 0.864
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103527",
"label": "fraudulent",
"label_confidence": 0.916,
"severity": "high",
"timestamp": "2026-01-03T10:47:00Z",
"trace_id": "423b00ef-de67-6166-d4bf-485ff8329d08"
} | {
"account_age_days": 1538,
"account_id": "ACCT-C580FA681137",
"baseline_risk_score": 0.318,
"kyc_tier": "tier_2",
"session_entropy": 0.33
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 774,
"timestamp": "2026-01-03T10:47:00Z",
"transaction_amount_usd": 540179.49
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.415,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3522023.35,
"financial_exposure_usd": 5119010.67,
"recoverable_pct": 0.674
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102696",
"label": "fraudulent",
"label_confidence": 0.971,
"severity": "high",
"timestamp": "2026-01-02T20:56:00Z",
"trace_id": "0035c9b0-79e3-5a96-42fc-8011238ae54a"
} | {
"account_age_days": 724,
"account_id": "ACCT-3BD8645790EE",
"baseline_risk_score": 0.497,
"kyc_tier": "tier_1",
"session_entropy": 0.627
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 287,
"timestamp": "2026-01-02T14:36:00Z",
"transaction_amount_usd": 22.37
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.889,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 468884.01,
"financial_exposure_usd": 1139002.91,
"recoverable_pct": 0.039
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107821",
"label": "benign",
"label_confidence": 0.726,
"severity": "high",
"timestamp": "2026-01-06T10:21:00Z",
"trace_id": "9a811be3-8203-4582-0456-0d81730f766f"
} | {
"account_age_days": 927,
"account_id": "ACCT-50EF969F2648",
"baseline_risk_score": 0.098,
"kyc_tier": "tier_2",
"session_entropy": 0.405
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 233,
"timestamp": "2026-01-06T10:21:00Z",
"transaction_amount_usd": 14230.56
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.634,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2584.89,
"financial_exposure_usd": 5147.39,
"recoverable_pct": 0.626
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103540",
"label": "fraudulent",
"label_confidence": 0.795,
"severity": "high",
"timestamp": "2026-01-03T11:00:00Z",
"trace_id": "fc93faad-7866-36a6-c0ea-96de49427a1b"
} | {
"account_age_days": 1359,
"account_id": "ACCT-8BE7E213FA5F",
"baseline_risk_score": 0.249,
"kyc_tier": "tier_3",
"session_entropy": 0.662
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 765,
"timestamp": "2026-01-03T11:00:00Z",
"transaction_amount_usd": 173451.44
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.529,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3064630.59,
"financial_exposure_usd": 4732611.31,
"recoverable_pct": 0.471
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107211",
"label": "benign",
"label_confidence": 0.661,
"severity": "low",
"timestamp": "2026-01-06T00:11:00Z",
"trace_id": "721cfe6b-7c70-56f4-37a6-340a3a915dc3"
} | {
"account_age_days": 842,
"account_id": "ACCT-5B9AB3AF8BF4",
"baseline_risk_score": 0.101,
"kyc_tier": "tier_3",
"session_entropy": 0.662
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 256,
"timestamp": "2026-01-05T18:48:00Z",
"transaction_amount_usd": 21.5
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.533,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1116.12,
"financial_exposure_usd": 1712.26,
"recoverable_pct": 0.908
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101690",
"label": "fraudulent",
"label_confidence": 0.971,
"severity": "low",
"timestamp": "2026-01-02T04:10:00Z",
"trace_id": "dbadbf57-09ac-9f48-11d6-d51699f480d3"
} | {
"account_age_days": 644,
"account_id": "ACCT-36394339C373",
"baseline_risk_score": 0.529,
"kyc_tier": "tier_1",
"session_entropy": 0.534
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 580,
"timestamp": "2026-01-02T04:10:00Z",
"transaction_amount_usd": 73904.14
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.885,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 51268.78,
"financial_exposure_usd": 88104.15,
"recoverable_pct": 0.32
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108740",
"label": "benign",
"label_confidence": 0.499,
"severity": "low",
"timestamp": "2026-01-07T01:40:00Z",
"trace_id": "2c1e15e4-3313-0941-98ed-c1fb3f1721e8"
} | {
"account_age_days": 262,
"account_id": "ACCT-0A5B5E71C422",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.492
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 554,
"timestamp": "2026-01-07T01:40:00Z",
"transaction_amount_usd": 12385.99
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.645,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1671.41,
"financial_exposure_usd": 2100.74,
"recoverable_pct": 0.617
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106393",
"label": "fraudulent",
"label_confidence": 0.919,
"severity": "high",
"timestamp": "2026-01-05T10:33:00Z",
"trace_id": "766c0338-d6f3-038b-dc14-02fbd8869c73"
} | {
"account_age_days": 1705,
"account_id": "ACCT-D5753F614F23",
"baseline_risk_score": 0.156,
"kyc_tier": "tier_1",
"session_entropy": 0.322
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 351,
"timestamp": "2026-01-05T10:33:00Z",
"transaction_amount_usd": 2869696.29
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.905,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2660970.21,
"financial_exposure_usd": 4477024.45,
"recoverable_pct": 0.643
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103351",
"label": "fraudulent",
"label_confidence": 0.667,
"severity": "critical",
"timestamp": "2026-01-03T07:51:00Z",
"trace_id": "34992b07-dee6-aa90-b8a7-bb0c5f2166a4"
} | {
"account_age_days": 702,
"account_id": "ACCT-465A13C98201",
"baseline_risk_score": 0.423,
"kyc_tier": "tier_3",
"session_entropy": 0.24
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 990,
"timestamp": "2026-01-03T07:51:00Z",
"transaction_amount_usd": 645367.39
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.948,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1447368.01,
"financial_exposure_usd": 2473954.31,
"recoverable_pct": 0.994
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103553",
"label": "fraudulent",
"label_confidence": 0.711,
"severity": "medium",
"timestamp": "2026-01-03T11:13:00Z",
"trace_id": "b310bf08-2dfc-7bfa-3345-1b02bda29f0b"
} | {
"account_age_days": 742,
"account_id": "ACCT-EB5529362E9F",
"baseline_risk_score": 0.314,
"kyc_tier": "tier_1",
"session_entropy": 0.496
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 661,
"timestamp": "2026-01-03T11:13:00Z",
"transaction_amount_usd": 2812798.43
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.612,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1234700.38,
"financial_exposure_usd": 1783141.16,
"recoverable_pct": 0.572
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107350",
"label": "benign",
"label_confidence": 0.605,
"severity": "low",
"timestamp": "2026-01-06T02:30:00Z",
"trace_id": "7970b41a-81f1-8e5e-344d-9cce6938c7c0"
} | {
"account_age_days": 406,
"account_id": "ACCT-7E705921FAC3",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.845
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 942,
"timestamp": "2026-01-06T02:30:00Z",
"transaction_amount_usd": 5152.6
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.463,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1567.59,
"financial_exposure_usd": 3528.02,
"recoverable_pct": 0.626
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103491",
"label": "fraudulent",
"label_confidence": 0.678,
"severity": "high",
"timestamp": "2026-01-03T10:11:00Z",
"trace_id": "6d3c8436-c3eb-93d0-f6f4-26385bca49c8"
} | {
"account_age_days": 232,
"account_id": "ACCT-233359E7630C",
"baseline_risk_score": 0.084,
"kyc_tier": "tier_2",
"session_entropy": 0.179
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 178,
"timestamp": "2026-01-03T08:30:00Z",
"transaction_amount_usd": 14.87
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.731,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4847715.12,
"financial_exposure_usd": 6422470.28,
"recoverable_pct": 0.535
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108947",
"label": "benign",
"label_confidence": 0.541,
"severity": "high",
"timestamp": "2026-01-07T05:07:00Z",
"trace_id": "5c7fbc8f-7869-c5ed-f166-ac67748f041a"
} | {
"account_age_days": 1582,
"account_id": "ACCT-B64FAEF5BBD8",
"baseline_risk_score": 0.071,
"kyc_tier": "tier_1",
"session_entropy": 0.367
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 329,
"timestamp": "2026-01-07T05:07:00Z",
"transaction_amount_usd": 2824.14
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.452,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2651.32,
"financial_exposure_usd": 4056.36,
"recoverable_pct": 0.584
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104645",
"label": "fraudulent",
"label_confidence": 0.818,
"severity": "high",
"timestamp": "2026-01-04T05:25:00Z",
"trace_id": "7279d87c-9329-0547-6dd5-5ad317b452cb"
} | {
"account_age_days": 525,
"account_id": "ACCT-E80CF98341C6",
"baseline_risk_score": 0.315,
"kyc_tier": "tier_1",
"session_entropy": 0.573
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 958,
"timestamp": "2026-01-04T05:25:00Z",
"transaction_amount_usd": 2355916.2
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.905,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2226996.19,
"financial_exposure_usd": 3411379.59,
"recoverable_pct": 0.858
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101136",
"label": "fraudulent",
"label_confidence": 0.949,
"severity": "critical",
"timestamp": "2026-01-01T18:56:00Z",
"trace_id": "59740ae7-0bd0-4798-0953-0dfa33b40e68"
} | {
"account_age_days": 1015,
"account_id": "ACCT-E89573CBBB89",
"baseline_risk_score": 0.49,
"kyc_tier": "tier_3",
"session_entropy": 0.114
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 339,
"timestamp": "2026-01-01T10:06:00Z",
"transaction_amount_usd": 24.4
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.41,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 446185.51,
"financial_exposure_usd": 447278.9,
"recoverable_pct": 0.401
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104017",
"label": "fraudulent",
"label_confidence": 0.613,
"severity": "high",
"timestamp": "2026-01-03T18:57:00Z",
"trace_id": "fde7d8df-1573-821d-902d-73b88f947f51"
} | {
"account_age_days": 320,
"account_id": "ACCT-856234C8BF88",
"baseline_risk_score": 0.15,
"kyc_tier": "tier_1",
"session_entropy": 0.925
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 666,
"timestamp": "2026-01-03T18:57:00Z",
"transaction_amount_usd": 2074061.29
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.507,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3158440.18,
"financial_exposure_usd": 6667485.5,
"recoverable_pct": 0.485
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109846",
"label": "benign",
"label_confidence": 0.54,
"severity": "medium",
"timestamp": "2026-01-07T20:06:00Z",
"trace_id": "1d50e09b-35ec-912d-f9d7-8d2e2164669b"
} | {
"account_age_days": 897,
"account_id": "ACCT-1D3FCDD9EC99",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.204
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 280,
"timestamp": "2026-01-07T08:01:00Z",
"transaction_amount_usd": 5.2
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.595,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2229.42,
"financial_exposure_usd": 2492.49,
"recoverable_pct": 0.675
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109272",
"label": "benign",
"label_confidence": 0.565,
"severity": "low",
"timestamp": "2026-01-07T10:32:00Z",
"trace_id": "be9ec7e3-33c5-679d-1f6f-5839ebe0ccf6"
} | {
"account_age_days": 1385,
"account_id": "ACCT-242E5421FE01",
"baseline_risk_score": 0.177,
"kyc_tier": "tier_3",
"session_entropy": 0.539
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 1153,
"timestamp": "2026-01-07T10:32:00Z",
"transaction_amount_usd": 11910.57
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.68,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 3563.97,
"financial_exposure_usd": 5174.11,
"recoverable_pct": 0.714
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107009",
"label": "benign",
"label_confidence": 0.599,
"severity": "high",
"timestamp": "2026-01-05T20:49:00Z",
"trace_id": "e26dcb8f-7602-43cb-94ab-cf6b407db826"
} | {
"account_age_days": 594,
"account_id": "ACCT-25DC0DFD64CD",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.807
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 342,
"timestamp": "2026-01-05T08:40:00Z",
"transaction_amount_usd": 11.3
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.747,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1774.16,
"financial_exposure_usd": 3480.43,
"recoverable_pct": 0.63
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105091",
"label": "fraudulent",
"label_confidence": 0.713,
"severity": "high",
"timestamp": "2026-01-04T12:51:00Z",
"trace_id": "e7c218c4-bbb9-ae44-a4b5-cc6ba394488c"
} | {
"account_age_days": 671,
"account_id": "ACCT-91A9DC9CA351",
"baseline_risk_score": 0.285,
"kyc_tier": "tier_2",
"session_entropy": 0.343
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 394,
"timestamp": "2026-01-04T00:31:00Z",
"transaction_amount_usd": 7.29
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.849,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1213318.37,
"financial_exposure_usd": 2329953.31,
"recoverable_pct": 0.549
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108402",
"label": "benign",
"label_confidence": 0.715,
"severity": "high",
"timestamp": "2026-01-06T20:02:00Z",
"trace_id": "2abb27ef-34c2-0c95-5191-7c151e222df7"
} | {
"account_age_days": 30,
"account_id": "ACCT-1DD4CA7BC731",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.279
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 382,
"timestamp": "2026-01-06T10:21:00Z",
"transaction_amount_usd": 14.91
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.765,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2742.42,
"financial_exposure_usd": 3100.98,
"recoverable_pct": 0.59
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100931",
"label": "fraudulent",
"label_confidence": 0.958,
"severity": "medium",
"timestamp": "2026-01-01T15:31:00Z",
"trace_id": "49e1850c-6071-5481-b0e6-88bb996ab5f7"
} | {
"account_age_days": 552,
"account_id": "ACCT-98FCAD7BBE29",
"baseline_risk_score": 0.341,
"kyc_tier": "tier_1",
"session_entropy": 0.417
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 213,
"timestamp": "2026-01-01T15:31:00Z",
"transaction_amount_usd": 29030.15
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.497,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 541081.66,
"financial_exposure_usd": 833487.61,
"recoverable_pct": 0.186
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104720",
"label": "fraudulent",
"label_confidence": 0.647,
"severity": "low",
"timestamp": "2026-01-04T06:40:00Z",
"trace_id": "fb655994-d116-cf22-92e4-7787cb2e3f51"
} | {
"account_age_days": 1322,
"account_id": "ACCT-E033EDA13163",
"baseline_risk_score": 0.132,
"kyc_tier": "tier_3",
"session_entropy": 0.772
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 983,
"timestamp": "2026-01-04T06:40:00Z",
"transaction_amount_usd": 2634652
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.745,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 6767942.38,
"financial_exposure_usd": 9007109.61,
"recoverable_pct": 0.872
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100304",
"label": "fraudulent",
"label_confidence": 0.835,
"severity": "critical",
"timestamp": "2026-01-01T05:04:00Z",
"trace_id": "50e7ceb8-4a3e-7903-43e5-87b9072804aa"
} | {
"account_age_days": 709,
"account_id": "ACCT-367D9AAD0029",
"baseline_risk_score": 0.429,
"kyc_tier": "tier_3",
"session_entropy": 0.139
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 749,
"timestamp": "2026-01-01T05:04:00Z",
"transaction_amount_usd": 20416.5
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.806,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 322546.28,
"financial_exposure_usd": 699524.65,
"recoverable_pct": 0.755
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100274",
"label": "fraudulent",
"label_confidence": 0.791,
"severity": "critical",
"timestamp": "2026-01-01T04:34:00Z",
"trace_id": "2e3c7679-6dc2-d7db-9763-7e6ccd87a06a"
} | {
"account_age_days": 1206,
"account_id": "ACCT-7A3F4573F16A",
"baseline_risk_score": 0.424,
"kyc_tier": "tier_1",
"session_entropy": 0.384
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 564,
"timestamp": "2026-01-01T04:34:00Z",
"transaction_amount_usd": 9765.36
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.382,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 766383.01,
"financial_exposure_usd": 920465.58,
"recoverable_pct": 0.311
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101041",
"label": "fraudulent",
"label_confidence": 0.957,
"severity": "medium",
"timestamp": "2026-01-01T17:21:00Z",
"trace_id": "669d4e54-05f8-9735-b553-7adc14622316"
} | {
"account_age_days": 1221,
"account_id": "ACCT-73B1519DF394",
"baseline_risk_score": 0.272,
"kyc_tier": "tier_3",
"session_entropy": 0.792
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 1095,
"timestamp": "2026-01-01T17:21:00Z",
"transaction_amount_usd": 93528.13
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.78,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 1105844.15,
"financial_exposure_usd": 1217006.61,
"recoverable_pct": 0.046
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106627",
"label": "fraudulent",
"label_confidence": 0.795,
"severity": "medium",
"timestamp": "2026-01-05T14:27:00Z",
"trace_id": "766e7b43-a99f-fab1-b863-173810645a6f"
} | {
"account_age_days": 613,
"account_id": "ACCT-A13C342189E9",
"baseline_risk_score": 0.366,
"kyc_tier": "tier_1",
"session_entropy": 0.283
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 137,
"timestamp": "2026-01-05T07:57:00Z",
"transaction_amount_usd": 11.9
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.782,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3229590.17,
"financial_exposure_usd": 3795713.57,
"recoverable_pct": 0.73
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102450",
"label": "fraudulent",
"label_confidence": 0.928,
"severity": "high",
"timestamp": "2026-01-02T16:50:00Z",
"trace_id": "d2ad5044-67d5-f454-15e4-71e816da2f1b"
} | {
"account_age_days": 1696,
"account_id": "ACCT-E1DBD253843E",
"baseline_risk_score": 0.268,
"kyc_tier": "tier_3",
"session_entropy": 0.106
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 416,
"timestamp": "2026-01-02T16:50:00Z",
"transaction_amount_usd": 69235.29
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.624,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 812428.62,
"financial_exposure_usd": 1201401.06,
"recoverable_pct": 0.572
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103473",
"label": "fraudulent",
"label_confidence": 0.8,
"severity": "medium",
"timestamp": "2026-01-03T09:53:00Z",
"trace_id": "20f021d0-8350-9867-8731-975da1e68cdc"
} | {
"account_age_days": 536,
"account_id": "ACCT-08B30CE24C90",
"baseline_risk_score": 0.4,
"kyc_tier": "tier_3",
"session_entropy": 0.759
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 92,
"timestamp": "2026-01-03T09:53:00Z",
"transaction_amount_usd": 859504.78
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.354,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 6543242.2,
"financial_exposure_usd": 7352458.54,
"recoverable_pct": 0.907
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106409",
"label": "fraudulent",
"label_confidence": 0.648,
"severity": "low",
"timestamp": "2026-01-05T10:49:00Z",
"trace_id": "9e3c0719-3898-bfff-0f14-7742d381d444"
} | {
"account_age_days": 750,
"account_id": "ACCT-8D3CF7132627",
"baseline_risk_score": 0.333,
"kyc_tier": "tier_2",
"session_entropy": 0.149
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 114,
"timestamp": "2026-01-05T09:15:00Z",
"transaction_amount_usd": 12.6
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.833,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4948086.12,
"financial_exposure_usd": 7102704.67,
"recoverable_pct": 0.84
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105758",
"label": "fraudulent",
"label_confidence": 0.61,
"severity": "medium",
"timestamp": "2026-01-04T23:58:00Z",
"trace_id": "43bfbee9-fe31-950c-0989-a7e01ac02dcd"
} | {
"account_age_days": 1952,
"account_id": "ACCT-08A5E16B9F76",
"baseline_risk_score": 0.39,
"kyc_tier": "tier_1",
"session_entropy": 0.518
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 673,
"timestamp": "2026-01-04T23:58:00Z",
"transaction_amount_usd": 2933860.73
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.494,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5312992.04,
"financial_exposure_usd": 5348506.83,
"recoverable_pct": 0.961
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104757",
"label": "fraudulent",
"label_confidence": 0.839,
"severity": "high",
"timestamp": "2026-01-04T07:17:00Z",
"trace_id": "15538c88-51a3-ac79-c22f-c6d666d335c2"
} | {
"account_age_days": 1428,
"account_id": "ACCT-BC353E733600",
"baseline_risk_score": 0.428,
"kyc_tier": "tier_2",
"session_entropy": 0.303
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 392,
"timestamp": "2026-01-04T07:17:00Z",
"transaction_amount_usd": 809099.62
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.918,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4574454.68,
"financial_exposure_usd": 6114728.95,
"recoverable_pct": 0.745
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103038",
"label": "fraudulent",
"label_confidence": 0.91,
"severity": "high",
"timestamp": "2026-01-03T02:38:00Z",
"trace_id": "d515e617-fed9-07e2-e2c3-0e84aba6cd72"
} | {
"account_age_days": 1965,
"account_id": "ACCT-16CCF38A3B87",
"baseline_risk_score": 0.281,
"kyc_tier": "tier_1",
"session_entropy": 0.871
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 670,
"timestamp": "2026-01-03T02:38:00Z",
"transaction_amount_usd": 103628.81
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.413,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 450337.65,
"financial_exposure_usd": 556544.95,
"recoverable_pct": 0.027
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107772",
"label": "benign",
"label_confidence": 0.536,
"severity": "low",
"timestamp": "2026-01-06T09:32:00Z",
"trace_id": "730b7ca8-f6b4-e525-d405-c91eb39f6e83"
} | {
"account_age_days": 1932,
"account_id": "ACCT-A9F4C2E47343",
"baseline_risk_score": 0.175,
"kyc_tier": "tier_3",
"session_entropy": 0.355
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 260,
"timestamp": "2026-01-06T06:13:00Z",
"transaction_amount_usd": 6.71
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.573,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1055.13,
"financial_exposure_usd": 2409.91,
"recoverable_pct": 0.724
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101154",
"label": "fraudulent",
"label_confidence": 0.852,
"severity": "high",
"timestamp": "2026-01-01T19:14:00Z",
"trace_id": "b9a00071-2c8c-8e08-f88c-20cbe122967f"
} | {
"account_age_days": 412,
"account_id": "ACCT-35197F1813D4",
"baseline_risk_score": 0.525,
"kyc_tier": "tier_3",
"session_entropy": 0.527
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 255,
"timestamp": "2026-01-01T11:24:00Z",
"transaction_amount_usd": 18.34
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.39,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 449347.07,
"financial_exposure_usd": 819871.59,
"recoverable_pct": 0.247
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107934",
"label": "benign",
"label_confidence": 0.729,
"severity": "low",
"timestamp": "2026-01-06T12:14:00Z",
"trace_id": "3fc1b9b4-d94e-e0a2-5a33-ed6c549910b0"
} | {
"account_age_days": 609,
"account_id": "ACCT-86C83FD2D2E2",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.816
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 801,
"timestamp": "2026-01-06T12:14:00Z",
"transaction_amount_usd": 11331.61
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.733,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3634.09,
"financial_exposure_usd": 3689.12,
"recoverable_pct": 0.635
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101846",
"label": "fraudulent",
"label_confidence": 0.962,
"severity": "critical",
"timestamp": "2026-01-02T06:46:00Z",
"trace_id": "e51a1a4e-8c85-59d6-aad3-f8fda1ba954d"
} | {
"account_age_days": 1734,
"account_id": "ACCT-33E862AAFE08",
"baseline_risk_score": 0.367,
"kyc_tier": "tier_2",
"session_entropy": 0.519
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 795,
"timestamp": "2026-01-02T06:46:00Z",
"transaction_amount_usd": 81798.81
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.519,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 1028954.54,
"financial_exposure_usd": 1479746.81,
"recoverable_pct": 0.337
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101476",
"label": "fraudulent",
"label_confidence": 0.832,
"severity": "medium",
"timestamp": "2026-01-02T00:36:00Z",
"trace_id": "88daaf92-ae46-6ccb-3522-39c5739451da"
} | {
"account_age_days": 1359,
"account_id": "ACCT-7492C0950AED",
"baseline_risk_score": 0.287,
"kyc_tier": "tier_3",
"session_entropy": 0.61
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 152,
"timestamp": "2026-01-01T18:49:00Z",
"transaction_amount_usd": 9.51
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.681,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 904386.43,
"financial_exposure_usd": 1107518.52,
"recoverable_pct": 0.666
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102679",
"label": "fraudulent",
"label_confidence": 0.927,
"severity": "high",
"timestamp": "2026-01-02T20:39:00Z",
"trace_id": "7b488ee0-af00-223a-8df3-b70a481471fd"
} | {
"account_age_days": 344,
"account_id": "ACCT-1014F7FFF252",
"baseline_risk_score": 0.432,
"kyc_tier": "tier_1",
"session_entropy": 0.549
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "JP",
"latency_ms": 1080,
"timestamp": "2026-01-02T20:39:00Z",
"transaction_amount_usd": 55895.35
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.513,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 654163.2,
"financial_exposure_usd": 656577.94,
"recoverable_pct": 0.357
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100141",
"label": "fraudulent",
"label_confidence": 0.818,
"severity": "medium",
"timestamp": "2026-01-01T02:21:00Z",
"trace_id": "33b636dc-c2d0-1c42-fd59-5978796512e3"
} | {
"account_age_days": 1095,
"account_id": "ACCT-2BCDCE431E7D",
"baseline_risk_score": 0.591,
"kyc_tier": "tier_1",
"session_entropy": 0.29
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 791,
"timestamp": "2026-01-01T02:21:00Z",
"transaction_amount_usd": 5735.43
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.373,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 1084993.38,
"financial_exposure_usd": 1124080.35,
"recoverable_pct": 0.236
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101090",
"label": "fraudulent",
"label_confidence": 0.773,
"severity": "critical",
"timestamp": "2026-01-01T18:10:00Z",
"trace_id": "b24209d9-ff22-920d-5d23-e94b9f6b2e44"
} | {
"account_age_days": 1760,
"account_id": "ACCT-5066ECA45AB0",
"baseline_risk_score": 0.487,
"kyc_tier": "tier_2",
"session_entropy": 0.768
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 712,
"timestamp": "2026-01-01T18:10:00Z",
"transaction_amount_usd": 31978.98
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.383,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 870071.06,
"financial_exposure_usd": 910286.01,
"recoverable_pct": 0.716
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101525",
"label": "fraudulent",
"label_confidence": 0.928,
"severity": "critical",
"timestamp": "2026-01-02T01:25:00Z",
"trace_id": "b057a269-6f5b-a62f-3aaa-a13492dfac62"
} | {
"account_age_days": 1983,
"account_id": "ACCT-EA680F2810B4",
"baseline_risk_score": 0.465,
"kyc_tier": "tier_2",
"session_entropy": 0.48
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 189,
"timestamp": "2026-01-02T01:25:00Z",
"transaction_amount_usd": 107094.02
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.452,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 610047.11,
"financial_exposure_usd": 1380450.68,
"recoverable_pct": 0.228
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106326",
"label": "fraudulent",
"label_confidence": 0.604,
"severity": "medium",
"timestamp": "2026-01-05T09:26:00Z",
"trace_id": "c5a8cf31-26a5-9328-222d-afdc8266b5e3"
} | {
"account_age_days": 1936,
"account_id": "ACCT-CC0E7C20E728",
"baseline_risk_score": 0.104,
"kyc_tier": "tier_3",
"session_entropy": 0.877
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 87,
"timestamp": "2026-01-05T09:26:00Z",
"transaction_amount_usd": 2257892.67
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.632,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1144792.05,
"financial_exposure_usd": 1274331.72,
"recoverable_pct": 0.924
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108114",
"label": "benign",
"label_confidence": 0.715,
"severity": "critical",
"timestamp": "2026-01-06T15:14:00Z",
"trace_id": "d626398c-acf2-afe9-94cf-49a06a115c08"
} | {
"account_age_days": 861,
"account_id": "ACCT-1AEA8BF1EA25",
"baseline_risk_score": 0.154,
"kyc_tier": "tier_3",
"session_entropy": 0.859
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 715,
"timestamp": "2026-01-06T15:14:00Z",
"transaction_amount_usd": 6690.64
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.751,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3497.76,
"financial_exposure_usd": 5246.25,
"recoverable_pct": 0.78
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100733",
"label": "fraudulent",
"label_confidence": 0.899,
"severity": "medium",
"timestamp": "2026-01-01T12:13:00Z",
"trace_id": "86534d3b-296c-6d2e-4534-24dbf859df6f"
} | {
"account_age_days": 690,
"account_id": "ACCT-086263F92546",
"baseline_risk_score": 0.293,
"kyc_tier": "tier_2",
"session_entropy": 0.366
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 171,
"timestamp": "2026-01-01T00:32:00Z",
"transaction_amount_usd": 23.82
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.802,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 456300.55,
"financial_exposure_usd": 983377.24,
"recoverable_pct": 0.308
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100299",
"label": "fraudulent",
"label_confidence": 0.93,
"severity": "low",
"timestamp": "2026-01-01T04:59:00Z",
"trace_id": "285cecb9-ed6d-216d-b9a1-f8c5929cc513"
} | {
"account_age_days": 1812,
"account_id": "ACCT-82E89B5E4BCB",
"baseline_risk_score": 0.582,
"kyc_tier": "tier_1",
"session_entropy": 0.663
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 920,
"timestamp": "2026-01-01T04:59:00Z",
"transaction_amount_usd": 14484.56
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.673,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 785667.59,
"financial_exposure_usd": 1082091.49,
"recoverable_pct": 0.455
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106329",
"label": "fraudulent",
"label_confidence": 0.628,
"severity": "low",
"timestamp": "2026-01-05T09:29:00Z",
"trace_id": "3798d6ea-4a79-94bb-ecc5-a26ca069a4a2"
} | {
"account_age_days": 1823,
"account_id": "ACCT-33F1BCFF8961",
"baseline_risk_score": 0.086,
"kyc_tier": "tier_3",
"session_entropy": 0.115
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 938,
"timestamp": "2026-01-05T09:29:00Z",
"transaction_amount_usd": 1271611.06
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.882,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3416932.01,
"financial_exposure_usd": 4653602.08,
"recoverable_pct": 0.711
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109939",
"label": "benign",
"label_confidence": 0.679,
"severity": "low",
"timestamp": "2026-01-07T21:39:00Z",
"trace_id": "895196f9-9fb3-b58e-ad53-9ab378a5a96a"
} | {
"account_age_days": 789,
"account_id": "ACCT-62021FA2C19D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.339
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 822,
"timestamp": "2026-01-07T21:39:00Z",
"transaction_amount_usd": 2949.61
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.731,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 459.94,
"financial_exposure_usd": 1050.81,
"recoverable_pct": 0.655
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106594",
"label": "fraudulent",
"label_confidence": 0.743,
"severity": "medium",
"timestamp": "2026-01-05T13:54:00Z",
"trace_id": "57823eab-1c15-2748-9ffe-6d779bc3a346"
} | {
"account_age_days": 999,
"account_id": "ACCT-95551EF59997",
"baseline_risk_score": 0.275,
"kyc_tier": "tier_2",
"session_entropy": 0.948
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 888,
"timestamp": "2026-01-05T13:54:00Z",
"transaction_amount_usd": 1424860.3
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.775,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3228723.13,
"financial_exposure_usd": 4845698.1,
"recoverable_pct": 0.651
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101610",
"label": "fraudulent",
"label_confidence": 0.883,
"severity": "high",
"timestamp": "2026-01-02T02:50:00Z",
"trace_id": "27988393-f04a-d86d-1f48-50525dd36cd2"
} | {
"account_age_days": 1067,
"account_id": "ACCT-A1030186580B",
"baseline_risk_score": 0.365,
"kyc_tier": "tier_2",
"session_entropy": 0.344
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 1100,
"timestamp": "2026-01-02T02:50:00Z",
"transaction_amount_usd": 5634.51
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.811,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 538406.75,
"financial_exposure_usd": 1008364.09,
"recoverable_pct": 0.73
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101000",
"label": "fraudulent",
"label_confidence": 0.757,
"severity": "critical",
"timestamp": "2026-01-01T16:40:00Z",
"trace_id": "010eedfd-ebe3-9482-71b7-3321e6b50ee9"
} | {
"account_age_days": 1031,
"account_id": "ACCT-64DC618A8022",
"baseline_risk_score": 0.425,
"kyc_tier": "tier_1",
"session_entropy": 0.95
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 500,
"timestamp": "2026-01-01T16:40:00Z",
"transaction_amount_usd": 119301.95
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.681,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 123114.81,
"financial_exposure_usd": 260943.51,
"recoverable_pct": 0.332
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104041",
"label": "fraudulent",
"label_confidence": 0.647,
"severity": "critical",
"timestamp": "2026-01-03T19:21:00Z",
"trace_id": "3814e9bf-e693-475b-6a14-4e5c8fadb121"
} | {
"account_age_days": 987,
"account_id": "ACCT-105660B407D4",
"baseline_risk_score": 0.243,
"kyc_tier": "tier_1",
"session_entropy": 0.384
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 894,
"timestamp": "2026-01-03T19:21:00Z",
"transaction_amount_usd": 431418.02
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.479,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2800656.99,
"financial_exposure_usd": 5628865.72,
"recoverable_pct": 0.615
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108448",
"label": "benign",
"label_confidence": 0.671,
"severity": "low",
"timestamp": "2026-01-06T20:48:00Z",
"trace_id": "7d078412-5427-5ead-f861-64ae12325557"
} | {
"account_age_days": 1266,
"account_id": "ACCT-9D8BB32D2B00",
"baseline_risk_score": 0.187,
"kyc_tier": "tier_2",
"session_entropy": 0.737
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 299,
"timestamp": "2026-01-06T20:48:00Z",
"transaction_amount_usd": 7729.11
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.676,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1155.42,
"financial_exposure_usd": 1727.98,
"recoverable_pct": 0.997
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103331",
"label": "fraudulent",
"label_confidence": 0.933,
"severity": "high",
"timestamp": "2026-01-03T07:31:00Z",
"trace_id": "e9f8815e-9978-b2e8-3791-0ddd7f2bca93"
} | {
"account_age_days": 1270,
"account_id": "ACCT-614D05E6F1E4",
"baseline_risk_score": 0.527,
"kyc_tier": "tier_2",
"session_entropy": 0.883
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 126,
"timestamp": "2026-01-03T02:12:00Z",
"transaction_amount_usd": 19.98
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.555,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 731726.85,
"financial_exposure_usd": 1437920.33,
"recoverable_pct": 0.163
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102084",
"label": "fraudulent",
"label_confidence": 0.762,
"severity": "medium",
"timestamp": "2026-01-02T10:44:00Z",
"trace_id": "77d10ca0-a9d1-119c-6d91-7df65254d5fd"
} | {
"account_age_days": 1125,
"account_id": "ACCT-552F1A1DFD46",
"baseline_risk_score": 0.472,
"kyc_tier": "tier_2",
"session_entropy": 0.912
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 558,
"timestamp": "2026-01-02T10:44:00Z",
"transaction_amount_usd": 10395.45
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.521,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 268652.68,
"financial_exposure_usd": 392234.6,
"recoverable_pct": 0.208
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109765",
"label": "benign",
"label_confidence": 0.684,
"severity": "low",
"timestamp": "2026-01-07T18:45:00Z",
"trace_id": "a40d2cf3-92fc-2503-4b82-528eb31d2cdd"
} | {
"account_age_days": 1566,
"account_id": "ACCT-D21CB9D96B08",
"baseline_risk_score": 0.159,
"kyc_tier": "tier_2",
"session_entropy": 0.16
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 369,
"timestamp": "2026-01-07T18:45:00Z",
"transaction_amount_usd": 8659.13
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.505,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3598.35,
"financial_exposure_usd": 4955.83,
"recoverable_pct": 0.778
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108406",
"label": "benign",
"label_confidence": 0.648,
"severity": "low",
"timestamp": "2026-01-06T20:06:00Z",
"trace_id": "617e42e4-b5c6-b7b0-a8d5-cd0bdc99db78"
} | {
"account_age_days": 356,
"account_id": "ACCT-66DFE063061D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.195
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 309,
"timestamp": "2026-01-06T20:06:00Z",
"transaction_amount_usd": 8498.59
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.55,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 4479.36,
"financial_exposure_usd": 4589.19,
"recoverable_pct": 0.655
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102929",
"label": "fraudulent",
"label_confidence": 0.821,
"severity": "high",
"timestamp": "2026-01-03T00:49:00Z",
"trace_id": "7537831c-f059-0cfa-aa37-84ae6f87f226"
} | {
"account_age_days": 1261,
"account_id": "ACCT-9FD748F18064",
"baseline_risk_score": 0.265,
"kyc_tier": "tier_3",
"session_entropy": 0.386
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "SG",
"latency_ms": 1165,
"timestamp": "2026-01-03T00:49:00Z",
"transaction_amount_usd": 101617.25
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.81,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 283111.87,
"financial_exposure_usd": 438442.42,
"recoverable_pct": 0.514
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101984",
"label": "fraudulent",
"label_confidence": 0.915,
"severity": "critical",
"timestamp": "2026-01-02T09:04:00Z",
"trace_id": "386b44f7-8268-23eb-cf64-61b669d6dfcf"
} | {
"account_age_days": 80,
"account_id": "ACCT-69F7A946F880",
"baseline_risk_score": 0.302,
"kyc_tier": "tier_3",
"session_entropy": 0.823
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "US",
"latency_ms": 793,
"timestamp": "2026-01-02T09:04:00Z",
"transaction_amount_usd": 41362.18
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.739,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 255326.36,
"financial_exposure_usd": 342820.93,
"recoverable_pct": 0.609
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108998",
"label": "benign",
"label_confidence": 0.677,
"severity": "low",
"timestamp": "2026-01-07T05:58:00Z",
"trace_id": "a82a144a-6ce8-8f35-04b3-5d28c535f3a0"
} | {
"account_age_days": 680,
"account_id": "ACCT-59D82CC4AA6A",
"baseline_risk_score": 0.121,
"kyc_tier": "tier_2",
"session_entropy": 0.292
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 215,
"timestamp": "2026-01-07T00:54:00Z",
"transaction_amount_usd": 9.58
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.663,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 4451.94,
"financial_exposure_usd": 4460.66,
"recoverable_pct": 0.733
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100663",
"label": "fraudulent",
"label_confidence": 0.897,
"severity": "critical",
"timestamp": "2026-01-01T11:03:00Z",
"trace_id": "78761e68-346c-9f49-ef62-52a6e7d975d4"
} | {
"account_age_days": 782,
"account_id": "ACCT-768957F2F3A5",
"baseline_risk_score": 0.313,
"kyc_tier": "tier_1",
"session_entropy": 0.715
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 165,
"timestamp": "2026-01-01T04:22:00Z",
"transaction_amount_usd": 2.94
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.386,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 553043.03,
"financial_exposure_usd": 764827.38,
"recoverable_pct": 0.702
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109056",
"label": "benign",
"label_confidence": 0.688,
"severity": "high",
"timestamp": "2026-01-07T06:56:00Z",
"trace_id": "ce03a542-55d4-b5dd-a816-e763dd5a9264"
} | {
"account_age_days": 349,
"account_id": "ACCT-52FC9401597C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.113
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 287,
"timestamp": "2026-01-07T03:16:00Z",
"transaction_amount_usd": 21.79
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.454,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1629.92,
"financial_exposure_usd": 1678.53,
"recoverable_pct": 0.979
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104124",
"label": "fraudulent",
"label_confidence": 0.624,
"severity": "medium",
"timestamp": "2026-01-03T20:44:00Z",
"trace_id": "c87ea77c-c146-8fa1-d9cb-12477976eaa4"
} | {
"account_age_days": 1047,
"account_id": "ACCT-1F77370083D4",
"baseline_risk_score": 0.359,
"kyc_tier": "tier_1",
"session_entropy": 0.304
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 816,
"timestamp": "2026-01-03T20:44:00Z",
"transaction_amount_usd": 372547.11
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.849,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 5293417.38,
"financial_exposure_usd": 7085925.73,
"recoverable_pct": 0.487
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103071",
"label": "fraudulent",
"label_confidence": 0.866,
"severity": "high",
"timestamp": "2026-01-03T03:11:00Z",
"trace_id": "7653d383-3c62-8852-51b6-3b0035fe0122"
} | {
"account_age_days": 1835,
"account_id": "ACCT-97E396296D0C",
"baseline_risk_score": 0.302,
"kyc_tier": "tier_3",
"session_entropy": 0.508
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 366,
"timestamp": "2026-01-02T23:04:00Z",
"transaction_amount_usd": 20.64
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.621,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 344301.77,
"financial_exposure_usd": 638347.24,
"recoverable_pct": 0.357
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108850",
"label": "benign",
"label_confidence": 0.721,
"severity": "medium",
"timestamp": "2026-01-07T03:30:00Z",
"trace_id": "9b2dbf59-e850-6042-99bb-5559b22943ac"
} | {
"account_age_days": 658,
"account_id": "ACCT-5E90FA65705F",
"baseline_risk_score": 0.084,
"kyc_tier": "tier_1",
"session_entropy": 0.246
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 332,
"timestamp": "2026-01-07T03:30:00Z",
"transaction_amount_usd": 9967.16
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.49,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 1304.43,
"financial_exposure_usd": 2317.66,
"recoverable_pct": 0.884
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103141",
"label": "fraudulent",
"label_confidence": 0.798,
"severity": "low",
"timestamp": "2026-01-03T04:21:00Z",
"trace_id": "17560b27-cd4a-7ef6-3f2a-44900ff82a68"
} | {
"account_age_days": 1822,
"account_id": "ACCT-E9BAC747BD8B",
"baseline_risk_score": 0.363,
"kyc_tier": "tier_2",
"session_entropy": 0.862
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 153,
"timestamp": "2026-01-03T01:39:00Z",
"transaction_amount_usd": 17.92
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.838,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 415403.78,
"financial_exposure_usd": 717578.75,
"recoverable_pct": 0.837
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108228",
"label": "benign",
"label_confidence": 0.452,
"severity": "critical",
"timestamp": "2026-01-06T17:08:00Z",
"trace_id": "8cf300f4-cc6d-3528-7426-5c7e5d0b7bb1"
} | {
"account_age_days": 750,
"account_id": "ACCT-ADC7362B3944",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.361
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 158,
"timestamp": "2026-01-06T13:53:00Z",
"transaction_amount_usd": 17.81
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.587,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 948.59,
"financial_exposure_usd": 1643.4,
"recoverable_pct": 0.648
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107276",
"label": "benign",
"label_confidence": 0.672,
"severity": "medium",
"timestamp": "2026-01-06T01:16:00Z",
"trace_id": "8f806f62-34a4-d9a9-e7f3-5bff1ea4bea4"
} | {
"account_age_days": 1109,
"account_id": "ACCT-42B7F839EDFC",
"baseline_risk_score": 0.191,
"kyc_tier": "tier_3",
"session_entropy": 0.353
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 270,
"timestamp": "2026-01-06T01:16:00Z",
"transaction_amount_usd": 11065.63
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.69,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 194.06,
"financial_exposure_usd": 217.16,
"recoverable_pct": 0.822
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103472",
"label": "fraudulent",
"label_confidence": 0.736,
"severity": "medium",
"timestamp": "2026-01-03T09:52:00Z",
"trace_id": "62478b59-f57e-1894-823d-3f0140932e68"
} | {
"account_age_days": 1359,
"account_id": "ACCT-9A2D8B4A577F",
"baseline_risk_score": 0.078,
"kyc_tier": "tier_2",
"session_entropy": 0.23
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 1183,
"timestamp": "2026-01-03T09:52:00Z",
"transaction_amount_usd": 1047938.82
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.649,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5879507.97,
"financial_exposure_usd": 6230655.78,
"recoverable_pct": 0.586
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103727",
"label": "fraudulent",
"label_confidence": 0.889,
"severity": "critical",
"timestamp": "2026-01-03T14:07:00Z",
"trace_id": "0fe4331b-8e67-fdcc-4726-3441e314cde5"
} | {
"account_age_days": 1661,
"account_id": "ACCT-C43E278D6901",
"baseline_risk_score": 0.1,
"kyc_tier": "tier_3",
"session_entropy": 0.242
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 332,
"timestamp": "2026-01-03T14:07:00Z",
"transaction_amount_usd": 2802953.36
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.479,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2831585.77,
"financial_exposure_usd": 2834895.27,
"recoverable_pct": 0.725
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107549",
"label": "benign",
"label_confidence": 0.669,
"severity": "medium",
"timestamp": "2026-01-06T05:49:00Z",
"trace_id": "b7c4923e-33da-1997-954f-b6e0d16e9efd"
} | {
"account_age_days": 1446,
"account_id": "ACCT-6270F0D530C2",
"baseline_risk_score": 0.191,
"kyc_tier": "tier_3",
"session_entropy": 0.762
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 262,
"timestamp": "2026-01-06T05:49:00Z",
"transaction_amount_usd": 3144.19
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.699,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1205.89,
"financial_exposure_usd": 1377.65,
"recoverable_pct": 0.615
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108678",
"label": "benign",
"label_confidence": 0.654,
"severity": "low",
"timestamp": "2026-01-07T00:38:00Z",
"trace_id": "8ecbeffb-0038-7e8e-fda4-7977a076ed36"
} | {
"account_age_days": 603,
"account_id": "ACCT-2FB656788263",
"baseline_risk_score": 0.089,
"kyc_tier": "tier_3",
"session_entropy": 0.41
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 328,
"timestamp": "2026-01-07T00:38:00Z",
"transaction_amount_usd": 8741.46
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.691,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2113.57,
"financial_exposure_usd": 2240.4,
"recoverable_pct": 0.576
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109592",
"label": "benign",
"label_confidence": 0.528,
"severity": "low",
"timestamp": "2026-01-07T15:52:00Z",
"trace_id": "e0dc844f-f279-1de8-2fd8-b09dc2180d98"
} | {
"account_age_days": 1674,
"account_id": "ACCT-6E016F6FEAE6",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.767
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 1112,
"timestamp": "2026-01-07T15:52:00Z",
"transaction_amount_usd": 9486.68
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.725,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1747.51,
"financial_exposure_usd": 2242.2,
"recoverable_pct": 0.689
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104836",
"label": "fraudulent",
"label_confidence": 0.718,
"severity": "medium",
"timestamp": "2026-01-04T08:36:00Z",
"trace_id": "37eb4d70-225d-e5c6-e3a6-b18c4588f121"
} | {
"account_age_days": 701,
"account_id": "ACCT-F53BEEB12DBD",
"baseline_risk_score": 0.215,
"kyc_tier": "tier_3",
"session_entropy": 0.737
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 199,
"timestamp": "2026-01-03T21:41:00Z",
"transaction_amount_usd": 15.75
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.502,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 6576485.53,
"financial_exposure_usd": 7816478.32,
"recoverable_pct": 0.846
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107029",
"label": "benign",
"label_confidence": 0.646,
"severity": "low",
"timestamp": "2026-01-05T21:09:00Z",
"trace_id": "3bfd2d24-b32e-4c8e-91c0-6e798411fa00"
} | {
"account_age_days": 692,
"account_id": "ACCT-E1DE9F4608A9",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.599
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 173,
"timestamp": "2026-01-05T12:47:00Z",
"transaction_amount_usd": 2.21
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.791,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 5475.34,
"financial_exposure_usd": 5823.7,
"recoverable_pct": 0.718
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102881",
"label": "fraudulent",
"label_confidence": 0.903,
"severity": "high",
"timestamp": "2026-01-03T00:01:00Z",
"trace_id": "548152da-5613-4edf-3703-fe96a7b480b1"
} | {
"account_age_days": 467,
"account_id": "ACCT-E814F3E23886",
"baseline_risk_score": 0.349,
"kyc_tier": "tier_1",
"session_entropy": 0.159
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 240,
"timestamp": "2026-01-02T18:59:00Z",
"transaction_amount_usd": 3.47
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.374,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 680985.54,
"financial_exposure_usd": 970951.17,
"recoverable_pct": 0.548
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102661",
"label": "fraudulent",
"label_confidence": 0.781,
"severity": "critical",
"timestamp": "2026-01-02T20:21:00Z",
"trace_id": "91abdc13-ca5c-40e1-ac9b-e4f48c8464db"
} | {
"account_age_days": 1730,
"account_id": "ACCT-CFAAD868BC43",
"baseline_risk_score": 0.65,
"kyc_tier": "tier_2",
"session_entropy": 0.612
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "JP",
"latency_ms": 1130,
"timestamp": "2026-01-02T20:21:00Z",
"transaction_amount_usd": 36661.07
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.895,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 398420.07,
"financial_exposure_usd": 614023.96,
"recoverable_pct": 0.133
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108672",
"label": "benign",
"label_confidence": 0.74,
"severity": "medium",
"timestamp": "2026-01-07T00:32:00Z",
"trace_id": "683bcd79-0b30-8716-2bac-fcbed09d813b"
} | {
"account_age_days": 309,
"account_id": "ACCT-D4D1A7BE9832",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.116
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 315,
"timestamp": "2026-01-06T23:07:00Z",
"transaction_amount_usd": 22.25
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.66,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 3291.43,
"financial_exposure_usd": 5753.48,
"recoverable_pct": 0.976
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103498",
"label": "fraudulent",
"label_confidence": 0.817,
"severity": "critical",
"timestamp": "2026-01-03T10:18:00Z",
"trace_id": "997feef4-0ebe-6480-4ce2-39107e454f89"
} | {
"account_age_days": 733,
"account_id": "ACCT-F7EFFB492C1B",
"baseline_risk_score": 0.129,
"kyc_tier": "tier_1",
"session_entropy": 0.832
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 212,
"timestamp": "2026-01-03T01:28:00Z",
"transaction_amount_usd": 18.33
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.578,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 9",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3643472.05,
"financial_exposure_usd": 4060692.25,
"recoverable_pct": 0.972
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100284",
"label": "fraudulent",
"label_confidence": 0.793,
"severity": "critical",
"timestamp": "2026-01-01T04:44:00Z",
"trace_id": "4d6396fe-022f-6ca5-5802-9d896ab584fd"
} | {
"account_age_days": 463,
"account_id": "ACCT-5D5B0BD90EBF",
"baseline_risk_score": 0.64,
"kyc_tier": "tier_1",
"session_entropy": 0.552
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 355,
"timestamp": "2026-01-01T04:44:00Z",
"transaction_amount_usd": 20489.34
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.92,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 599402.8,
"financial_exposure_usd": 677023.48,
"recoverable_pct": 0.205
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109526",
"label": "benign",
"label_confidence": 0.696,
"severity": "medium",
"timestamp": "2026-01-07T14:46:00Z",
"trace_id": "9d4145da-e42c-53ec-005a-e8d175814de5"
} | {
"account_age_days": 1312,
"account_id": "ACCT-3890B954DA74",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.391
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 848,
"timestamp": "2026-01-07T14:46:00Z",
"transaction_amount_usd": 9603.96
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.608,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1864.51,
"financial_exposure_usd": 3330.49,
"recoverable_pct": 0.598
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105299",
"label": "fraudulent",
"label_confidence": 0.714,
"severity": "medium",
"timestamp": "2026-01-04T16:19:00Z",
"trace_id": "6ab40a30-075e-1fb8-c8dc-dc962d0dcaee"
} | {
"account_age_days": 803,
"account_id": "ACCT-53E2A21B149D",
"baseline_risk_score": 0.332,
"kyc_tier": "tier_2",
"session_entropy": 0.856
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 583,
"timestamp": "2026-01-04T16:19:00Z",
"transaction_amount_usd": 2824955.42
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.69,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 2560363.15,
"financial_exposure_usd": 3014851.36,
"recoverable_pct": 0.66
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101172",
"label": "fraudulent",
"label_confidence": 0.766,
"severity": "high",
"timestamp": "2026-01-01T19:32:00Z",
"trace_id": "a8399fc3-2300-3c5f-7a67-e276ff918616"
} | {
"account_age_days": 631,
"account_id": "ACCT-B161DD161F35",
"baseline_risk_score": 0.472,
"kyc_tier": "tier_2",
"session_entropy": 0.296
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 204,
"timestamp": "2026-01-01T12:47:00Z",
"transaction_amount_usd": 15.8
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.838,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 190980.34,
"financial_exposure_usd": 365854.44,
"recoverable_pct": 0.533
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100327",
"label": "fraudulent",
"label_confidence": 0.752,
"severity": "high",
"timestamp": "2026-01-01T05:27:00Z",
"trace_id": "e4bc9bef-25c2-98e5-fb34-31dd671fa59b"
} | {
"account_age_days": 925,
"account_id": "ACCT-BCE4D414A7FF",
"baseline_risk_score": 0.353,
"kyc_tier": "tier_1",
"session_entropy": 0.373
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 85,
"timestamp": "2025-12-31T20:38:00Z",
"transaction_amount_usd": 10.72
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.65,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 492464.32,
"financial_exposure_usd": 703634.17,
"recoverable_pct": 0.288
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104451",
"label": "fraudulent",
"label_confidence": 0.767,
"severity": "high",
"timestamp": "2026-01-04T02:11:00Z",
"trace_id": "605544e8-d38b-679b-90ad-4f54d26656f1"
} | {
"account_age_days": 996,
"account_id": "ACCT-7F477346D62D",
"baseline_risk_score": 0.162,
"kyc_tier": "tier_1",
"session_entropy": 0.363
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 85,
"timestamp": "2026-01-04T00:52:00Z",
"transaction_amount_usd": 1.83
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.919,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5915444.4,
"financial_exposure_usd": 7646152.96,
"recoverable_pct": 0.987
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100019",
"label": "fraudulent",
"label_confidence": 0.867,
"severity": "medium",
"timestamp": "2026-01-01T00:19:00Z",
"trace_id": "372f871a-45ee-432d-6a07-f2137129cec7"
} | {
"account_age_days": 718,
"account_id": "ACCT-31A3AC4D828C",
"baseline_risk_score": 0.317,
"kyc_tier": "tier_2",
"session_entropy": 0.87
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 349,
"timestamp": "2025-12-31T14:32:00Z",
"transaction_amount_usd": 16.96
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.492,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 604135.42,
"financial_exposure_usd": 1091322.66,
"recoverable_pct": 0.147
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107228",
"label": "benign",
"label_confidence": 0.715,
"severity": "critical",
"timestamp": "2026-01-06T00:28:00Z",
"trace_id": "c289b2f4-58e4-c6a1-8b2c-123da91c52ea"
} | {
"account_age_days": 393,
"account_id": "ACCT-F374D2A487A7",
"baseline_risk_score": 0.168,
"kyc_tier": "tier_1",
"session_entropy": 0.211
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 176,
"timestamp": "2026-01-05T22:59:00Z",
"transaction_amount_usd": 10.66
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.757,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2477.22,
"financial_exposure_usd": 3767.09,
"recoverable_pct": 0.743
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107641",
"label": "benign",
"label_confidence": 0.731,
"severity": "medium",
"timestamp": "2026-01-06T07:21:00Z",
"trace_id": "64dd29e1-afdd-5196-2f2d-0161071afdad"
} | {
"account_age_days": 1880,
"account_id": "ACCT-FB1F9A7D8244",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.115
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 979,
"timestamp": "2026-01-06T07:21:00Z",
"transaction_amount_usd": 4518.64
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.489,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 899.26,
"financial_exposure_usd": 1222.13,
"recoverable_pct": 0.996
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109008",
"label": "benign",
"label_confidence": 0.479,
"severity": "high",
"timestamp": "2026-01-07T06:08:00Z",
"trace_id": "498850da-2b5d-ba67-87be-0bbff5266d47"
} | {
"account_age_days": 1020,
"account_id": "ACCT-51D090C32CF4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.301
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 870,
"timestamp": "2026-01-07T06:08:00Z",
"transaction_amount_usd": 2730.86
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.564,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 5283.74,
"financial_exposure_usd": 5599.36,
"recoverable_pct": 0.833
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.