schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107870",
"label": "benign",
"label_confidence": 0.463,
"severity": "medium",
"timestamp": "2026-01-06T11:10:00Z",
"trace_id": "cd6286f2-9865-84f7-fab6-6f52ef859dfe"
} | {
"account_age_days": 990,
"account_id": "ACCT-5CE0A3081FDF",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.583
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 94,
"timestamp": "2026-01-06T11:10:00Z",
"transaction_amount_usd": 10609.21
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.522,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3044.59,
"financial_exposure_usd": 5399.63,
"recoverable_pct": 0.868
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109730",
"label": "benign",
"label_confidence": 0.73,
"severity": "medium",
"timestamp": "2026-01-07T18:10:00Z",
"trace_id": "a848bb02-c7ee-0b2e-3420-af3a77d8521b"
} | {
"account_age_days": 173,
"account_id": "ACCT-8B2E34CEB87E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.324
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 999,
"timestamp": "2026-01-07T18:10:00Z",
"transaction_amount_usd": 11054.88
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.588,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 911.74,
"financial_exposure_usd": 1005.1,
"recoverable_pct": 0.716
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102494",
"label": "fraudulent",
"label_confidence": 0.902,
"severity": "critical",
"timestamp": "2026-01-02T17:34:00Z",
"trace_id": "01985392-76fe-eb71-8e74-bab52618059b"
} | {
"account_age_days": 1829,
"account_id": "ACCT-CF9FF7529747",
"baseline_risk_score": 0.629,
"kyc_tier": "tier_3",
"session_entropy": 0.596
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 90,
"timestamp": "2026-01-02T15:16:00Z",
"transaction_amount_usd": 4.12
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.606,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 807855.54,
"financial_exposure_usd": 819712.37,
"recoverable_pct": 0.336
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102925",
"label": "fraudulent",
"label_confidence": 0.821,
"severity": "high",
"timestamp": "2026-01-03T00:45:00Z",
"trace_id": "90382cf5-e6d2-3f58-613f-3917f1dd11f1"
} | {
"account_age_days": 1129,
"account_id": "ACCT-205F5DB469B9",
"baseline_risk_score": 0.411,
"kyc_tier": "tier_1",
"session_entropy": 0.228
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "LU",
"latency_ms": 1102,
"timestamp": "2026-01-03T00:45:00Z",
"transaction_amount_usd": 114204.21
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.416,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 147677.99,
"financial_exposure_usd": 266867.43,
"recoverable_pct": 0.693
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107054",
"label": "benign",
"label_confidence": 0.7,
"severity": "low",
"timestamp": "2026-01-05T21:34:00Z",
"trace_id": "119f5ecd-a2f7-a597-0e45-f08841768ccf"
} | {
"account_age_days": 868,
"account_id": "ACCT-C7A108C7AB83",
"baseline_risk_score": 0.143,
"kyc_tier": "tier_2",
"session_entropy": 0.894
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 633,
"timestamp": "2026-01-05T21:34:00Z",
"transaction_amount_usd": 14173.65
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.586,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2579.74,
"financial_exposure_usd": 3380.55,
"recoverable_pct": 0.99
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109581",
"label": "benign",
"label_confidence": 0.554,
"severity": "medium",
"timestamp": "2026-01-07T15:41:00Z",
"trace_id": "00f07524-2634-31c2-0f13-a369ca27e1c0"
} | {
"account_age_days": 1466,
"account_id": "ACCT-22883615D4F2",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.156
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 258,
"timestamp": "2026-01-07T15:41:00Z",
"transaction_amount_usd": 11704.34
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.687,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1493.9,
"financial_exposure_usd": 2548.14,
"recoverable_pct": 0.744
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109341",
"label": "benign",
"label_confidence": 0.647,
"severity": "high",
"timestamp": "2026-01-07T11:41:00Z",
"trace_id": "162fc8f9-76f9-c441-90a9-d01bbb8e974b"
} | {
"account_age_days": 1977,
"account_id": "ACCT-C09364ACD5A6",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.869
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 389,
"timestamp": "2026-01-07T11:41:00Z",
"transaction_amount_usd": 9259.13
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.506,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1234.47,
"financial_exposure_usd": 1288.05,
"recoverable_pct": 0.549
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107986",
"label": "benign",
"label_confidence": 0.559,
"severity": "high",
"timestamp": "2026-01-06T13:06:00Z",
"trace_id": "03356300-09ee-d79c-87d2-db442b220843"
} | {
"account_age_days": 959,
"account_id": "ACCT-DD41962BAADA",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.927
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 894,
"timestamp": "2026-01-06T13:06:00Z",
"transaction_amount_usd": 4688.69
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.531,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1111.85,
"financial_exposure_usd": 2311.52,
"recoverable_pct": 0.401
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101936",
"label": "fraudulent",
"label_confidence": 0.912,
"severity": "high",
"timestamp": "2026-01-02T08:16:00Z",
"trace_id": "d1d525f4-e0e5-2d88-8493-65b7d1195513"
} | {
"account_age_days": 810,
"account_id": "ACCT-D042697B55BA",
"baseline_risk_score": 0.494,
"kyc_tier": "tier_3",
"session_entropy": 0.162
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 742,
"timestamp": "2026-01-02T08:16:00Z",
"transaction_amount_usd": 34548.3
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.646,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 772156.16,
"financial_exposure_usd": 1143994.19,
"recoverable_pct": 0.214
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108806",
"label": "benign",
"label_confidence": 0.679,
"severity": "low",
"timestamp": "2026-01-07T02:46:00Z",
"trace_id": "dfa0f922-5262-f740-7464-25b187e6cbc2"
} | {
"account_age_days": 498,
"account_id": "ACCT-E89AC52DB59D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.716
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 1200,
"timestamp": "2026-01-07T02:46:00Z",
"transaction_amount_usd": 879.88
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.597,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3445.24,
"financial_exposure_usd": 4136.38,
"recoverable_pct": 0.889
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103863",
"label": "fraudulent",
"label_confidence": 0.892,
"severity": "high",
"timestamp": "2026-01-03T16:23:00Z",
"trace_id": "6c7c1147-79b8-1b5a-64af-cb3f3541ed40"
} | {
"account_age_days": 1363,
"account_id": "ACCT-794194F7A8EF",
"baseline_risk_score": 0.208,
"kyc_tier": "tier_3",
"session_entropy": 0.237
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 305,
"timestamp": "2026-01-03T11:23:00Z",
"transaction_amount_usd": 12.93
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.897,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3351438.69,
"financial_exposure_usd": 3824267.45,
"recoverable_pct": 0.479
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103747",
"label": "fraudulent",
"label_confidence": 0.744,
"severity": "medium",
"timestamp": "2026-01-03T14:27:00Z",
"trace_id": "aac6dd16-2d4c-c923-e2f4-18b2eea258ea"
} | {
"account_age_days": 417,
"account_id": "ACCT-6F79C7021786",
"baseline_risk_score": 0.128,
"kyc_tier": "tier_3",
"session_entropy": 0.883
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 334,
"timestamp": "2026-01-03T14:27:00Z",
"transaction_amount_usd": 2284411.96
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.45,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 5631662.39,
"financial_exposure_usd": 6790769.11,
"recoverable_pct": 0.6
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108385",
"label": "benign",
"label_confidence": 0.459,
"severity": "low",
"timestamp": "2026-01-06T19:45:00Z",
"trace_id": "1ee3f411-b550-dd5d-96af-44584771810b"
} | {
"account_age_days": 296,
"account_id": "ACCT-4CB948DE1E17",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.699
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 385,
"timestamp": "2026-01-06T17:39:00Z",
"transaction_amount_usd": 2.78
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.619,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2689.8,
"financial_exposure_usd": 2816.43,
"recoverable_pct": 0.763
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103420",
"label": "fraudulent",
"label_confidence": 0.831,
"severity": "critical",
"timestamp": "2026-01-03T09:00:00Z",
"trace_id": "f964e880-ba53-91d7-838e-af0d017438d3"
} | {
"account_age_days": 135,
"account_id": "ACCT-6200F8833110",
"baseline_risk_score": 0.433,
"kyc_tier": "tier_1",
"session_entropy": 0.134
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 626,
"timestamp": "2026-01-03T09:00:00Z",
"transaction_amount_usd": 2012674.85
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.487,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2200452.76,
"financial_exposure_usd": 3093700.9,
"recoverable_pct": 0.983
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103729",
"label": "fraudulent",
"label_confidence": 0.946,
"severity": "medium",
"timestamp": "2026-01-03T14:09:00Z",
"trace_id": "87d57a06-0b39-69c1-eb1f-ade43516da3d"
} | {
"account_age_days": 1215,
"account_id": "ACCT-878A4540A17B",
"baseline_risk_score": 0.443,
"kyc_tier": "tier_2",
"session_entropy": 0.132
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 603,
"timestamp": "2026-01-03T14:09:00Z",
"transaction_amount_usd": 508771.59
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.752,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3131030.91,
"financial_exposure_usd": 5768271.32,
"recoverable_pct": 0.591
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100222",
"label": "fraudulent",
"label_confidence": 0.788,
"severity": "medium",
"timestamp": "2026-01-01T03:42:00Z",
"trace_id": "79f34373-1bab-13ac-9863-bb207d53c706"
} | {
"account_age_days": 492,
"account_id": "ACCT-478B640B3868",
"baseline_risk_score": 0.434,
"kyc_tier": "tier_3",
"session_entropy": 0.191
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 191,
"timestamp": "2026-01-01T03:42:00Z",
"transaction_amount_usd": 14773.65
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.611,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 697492.27,
"financial_exposure_usd": 1044620.62,
"recoverable_pct": 0.197
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109080",
"label": "benign",
"label_confidence": 0.503,
"severity": "high",
"timestamp": "2026-01-07T07:20:00Z",
"trace_id": "4fb2d73c-2686-231e-34cd-843d94768ee6"
} | {
"account_age_days": 343,
"account_id": "ACCT-CA520709ED6B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.673
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 784,
"timestamp": "2026-01-07T07:20:00Z",
"transaction_amount_usd": 2168.44
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.593,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 892.01,
"financial_exposure_usd": 1577.52,
"recoverable_pct": 0.847
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109323",
"label": "benign",
"label_confidence": 0.551,
"severity": "high",
"timestamp": "2026-01-07T11:23:00Z",
"trace_id": "38f3f885-6ad4-6f5c-fbd8-bd437c2b8c32"
} | {
"account_age_days": 1412,
"account_id": "ACCT-A02FF9317A19",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.658
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 539,
"timestamp": "2026-01-07T11:23:00Z",
"transaction_amount_usd": 3627.9
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.454,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1927.63,
"financial_exposure_usd": 2063.79,
"recoverable_pct": 0.853
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109444",
"label": "benign",
"label_confidence": 0.581,
"severity": "low",
"timestamp": "2026-01-07T13:24:00Z",
"trace_id": "b8e4b8fc-174b-51a4-e2fc-6ee2d5bb5edf"
} | {
"account_age_days": 1004,
"account_id": "ACCT-55FF12A2CB60",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.588
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 1026,
"timestamp": "2026-01-07T13:24:00Z",
"transaction_amount_usd": 12763.81
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.739,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 666.34,
"financial_exposure_usd": 929.14,
"recoverable_pct": 0.709
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102287",
"label": "fraudulent",
"label_confidence": 0.873,
"severity": "medium",
"timestamp": "2026-01-02T14:07:00Z",
"trace_id": "547d4e09-c8a3-b7f1-cd2a-028bddf87fde"
} | {
"account_age_days": 496,
"account_id": "ACCT-A6F7DC07EBDC",
"baseline_risk_score": 0.599,
"kyc_tier": "tier_2",
"session_entropy": 0.388
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 1071,
"timestamp": "2026-01-02T14:07:00Z",
"transaction_amount_usd": 55108.91
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.895,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 329102.21,
"financial_exposure_usd": 607403.41,
"recoverable_pct": 0.34
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108960",
"label": "benign",
"label_confidence": 0.528,
"severity": "low",
"timestamp": "2026-01-07T05:20:00Z",
"trace_id": "115ca459-858d-c6eb-873e-57e95c0880bd"
} | {
"account_age_days": 1981,
"account_id": "ACCT-ED780C0CD4E3",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.648
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 291,
"timestamp": "2026-01-07T05:20:00Z",
"transaction_amount_usd": 7774
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.563,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 483.48,
"financial_exposure_usd": 690.17,
"recoverable_pct": 0.864
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101479",
"label": "fraudulent",
"label_confidence": 0.905,
"severity": "medium",
"timestamp": "2026-01-02T00:39:00Z",
"trace_id": "eafdfb30-8e2b-f437-85a6-9ded7ce824c4"
} | {
"account_age_days": 85,
"account_id": "ACCT-E0EC1D9BAD67",
"baseline_risk_score": 0.416,
"kyc_tier": "tier_1",
"session_entropy": 0.476
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 88,
"timestamp": "2026-01-01T19:17:00Z",
"transaction_amount_usd": 16.63
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.728,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 561845.24,
"financial_exposure_usd": 684750.53,
"recoverable_pct": 0.616
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109237",
"label": "benign",
"label_confidence": 0.48,
"severity": "low",
"timestamp": "2026-01-07T09:57:00Z",
"trace_id": "4e555fb9-c7a6-3c86-4d8b-2c4c99598ba2"
} | {
"account_age_days": 750,
"account_id": "ACCT-140A80052DE0",
"baseline_risk_score": 0.058,
"kyc_tier": "tier_1",
"session_entropy": 0.833
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 520,
"timestamp": "2026-01-07T09:57:00Z",
"transaction_amount_usd": 6436.47
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.674,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3284.1,
"financial_exposure_usd": 3897.07,
"recoverable_pct": 0.497
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105967",
"label": "fraudulent",
"label_confidence": 0.929,
"severity": "medium",
"timestamp": "2026-01-05T03:27:00Z",
"trace_id": "46b91659-28d8-821c-fee7-523054afa8db"
} | {
"account_age_days": 1553,
"account_id": "ACCT-EFF9F512E7C9",
"baseline_risk_score": 0.082,
"kyc_tier": "tier_1",
"session_entropy": 0.102
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 275,
"timestamp": "2026-01-05T03:27:00Z",
"transaction_amount_usd": 272265
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK_IM... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.365,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2404737.71,
"financial_exposure_usd": 3603651.48,
"recoverable_pct": 0.986
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109379",
"label": "benign",
"label_confidence": 0.734,
"severity": "low",
"timestamp": "2026-01-07T12:19:00Z",
"trace_id": "947a6ade-23ca-9021-fdf7-15dac2efbe6e"
} | {
"account_age_days": 552,
"account_id": "ACCT-FB27679AA5D4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.381
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 854,
"timestamp": "2026-01-07T12:19:00Z",
"transaction_amount_usd": 14744.77
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.799,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 580.3,
"financial_exposure_usd": 1009.48,
"recoverable_pct": 0.685
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105385",
"label": "fraudulent",
"label_confidence": 0.656,
"severity": "high",
"timestamp": "2026-01-04T17:45:00Z",
"trace_id": "a091970e-13d9-fdcc-346e-1c4a5110c18f"
} | {
"account_age_days": 1509,
"account_id": "ACCT-CE40EB1F2BDD",
"baseline_risk_score": 0.114,
"kyc_tier": "tier_1",
"session_entropy": 0.433
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 261,
"timestamp": "2026-01-04T08:13:00Z",
"transaction_amount_usd": 23.63
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.941,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2542916.41,
"financial_exposure_usd": 3099357.4,
"recoverable_pct": 0.522
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101636",
"label": "fraudulent",
"label_confidence": 0.868,
"severity": "medium",
"timestamp": "2026-01-02T03:16:00Z",
"trace_id": "a8f2ccd0-98cb-7c37-f40f-9d89f21b367b"
} | {
"account_age_days": 1101,
"account_id": "ACCT-7ADCE5B074BF",
"baseline_risk_score": 0.32,
"kyc_tier": "tier_3",
"session_entropy": 0.334
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 918,
"timestamp": "2026-01-02T03:16:00Z",
"transaction_amount_usd": 71816.37
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.361,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 224047.03,
"financial_exposure_usd": 366306.11,
"recoverable_pct": 0.708
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100471",
"label": "fraudulent",
"label_confidence": 0.882,
"severity": "medium",
"timestamp": "2026-01-01T07:51:00Z",
"trace_id": "de93f2fb-6654-c3dd-4915-d17add3df93c"
} | {
"account_age_days": 1036,
"account_id": "ACCT-3DC766D61E09",
"baseline_risk_score": 0.632,
"kyc_tier": "tier_2",
"session_entropy": 0.713
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "BR",
"latency_ms": 100,
"timestamp": "2026-01-01T07:51:00Z",
"transaction_amount_usd": 63553.39
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.87,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 478096.49,
"financial_exposure_usd": 983194.55,
"recoverable_pct": 0.19
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104108",
"label": "fraudulent",
"label_confidence": 0.913,
"severity": "high",
"timestamp": "2026-01-03T20:28:00Z",
"trace_id": "1da03b6b-bab5-15e4-516a-9be48ab8a5fb"
} | {
"account_age_days": 1157,
"account_id": "ACCT-1A2294C025CB",
"baseline_risk_score": 0.276,
"kyc_tier": "tier_3",
"session_entropy": 0.753
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 170,
"timestamp": "2026-01-03T20:28:00Z",
"transaction_amount_usd": 2091417.39
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.853,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2954991.67,
"financial_exposure_usd": 5047353.73,
"recoverable_pct": 0.817
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106076",
"label": "fraudulent",
"label_confidence": 0.821,
"severity": "high",
"timestamp": "2026-01-05T05:16:00Z",
"trace_id": "b44e92dd-68d0-2559-721d-1fbbccff978c"
} | {
"account_age_days": 1933,
"account_id": "ACCT-108BEB1E8883",
"baseline_risk_score": 0.431,
"kyc_tier": "tier_3",
"session_entropy": 0.764
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 669,
"timestamp": "2026-01-05T05:16:00Z",
"transaction_amount_usd": 2553020.25
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.584,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2840785.06,
"financial_exposure_usd": 5215937.64,
"recoverable_pct": 0.706
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103509",
"label": "fraudulent",
"label_confidence": 0.761,
"severity": "high",
"timestamp": "2026-01-03T10:29:00Z",
"trace_id": "701eddca-be69-9874-f8b7-ee6249caba57"
} | {
"account_age_days": 1046,
"account_id": "ACCT-D8FFE79F0E33",
"baseline_risk_score": 0.38,
"kyc_tier": "tier_2",
"session_entropy": 0.596
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 273,
"timestamp": "2026-01-03T10:29:00Z",
"transaction_amount_usd": 2252327.42
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.596,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2475806.22,
"financial_exposure_usd": 5356779,
"recoverable_pct": 0.795
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101761",
"label": "fraudulent",
"label_confidence": 0.872,
"severity": "medium",
"timestamp": "2026-01-02T05:21:00Z",
"trace_id": "3ac2b9ef-5b47-479c-2aff-6beee16a3a50"
} | {
"account_age_days": 1041,
"account_id": "ACCT-2FD730EA3262",
"baseline_risk_score": 0.455,
"kyc_tier": "tier_3",
"session_entropy": 0.745
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 119,
"timestamp": "2026-01-02T00:13:00Z",
"transaction_amount_usd": 7.4
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.509,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 500299.12,
"financial_exposure_usd": 715114.53,
"recoverable_pct": 0.732
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109729",
"label": "benign",
"label_confidence": 0.7,
"severity": "low",
"timestamp": "2026-01-07T18:09:00Z",
"trace_id": "5892e418-e59e-e797-797c-6301d0cf24ed"
} | {
"account_age_days": 348,
"account_id": "ACCT-7234DD8BA639",
"baseline_risk_score": 0.162,
"kyc_tier": "tier_3",
"session_entropy": 0.659
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 360,
"timestamp": "2026-01-07T09:11:00Z",
"transaction_amount_usd": 7.22
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.598,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1204.76,
"financial_exposure_usd": 1279.01,
"recoverable_pct": 0.647
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105997",
"label": "fraudulent",
"label_confidence": 0.914,
"severity": "medium",
"timestamp": "2026-01-05T03:57:00Z",
"trace_id": "dda63ecd-241b-2d97-3122-e6981051ab70"
} | {
"account_age_days": 1980,
"account_id": "ACCT-30BD5154227D",
"baseline_risk_score": 0.299,
"kyc_tier": "tier_2",
"session_entropy": 0.572
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 809,
"timestamp": "2026-01-05T03:57:00Z",
"transaction_amount_usd": 1205593.31
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.867,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2669117.56,
"financial_exposure_usd": 5500917.04,
"recoverable_pct": 0.735
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103267",
"label": "fraudulent",
"label_confidence": 0.929,
"severity": "high",
"timestamp": "2026-01-03T06:27:00Z",
"trace_id": "6b797764-df3c-1d37-9b4b-c6f0ba650e38"
} | {
"account_age_days": 1164,
"account_id": "ACCT-7FFDD147AE8E",
"baseline_risk_score": 0.402,
"kyc_tier": "tier_1",
"session_entropy": 0.44
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 193,
"timestamp": "2026-01-03T06:27:00Z",
"transaction_amount_usd": 93309.19
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.525,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 472183.79,
"financial_exposure_usd": 505035.26,
"recoverable_pct": 0.681
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109032",
"label": "benign",
"label_confidence": 0.614,
"severity": "medium",
"timestamp": "2026-01-07T06:32:00Z",
"trace_id": "42a56157-dbf1-20c5-d731-8a7cc0a26509"
} | {
"account_age_days": 1973,
"account_id": "ACCT-1AF0A44E9511",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.613
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 274,
"timestamp": "2026-01-07T06:02:00Z",
"transaction_amount_usd": 7.56
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.698,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 737.68,
"financial_exposure_usd": 1638.02,
"recoverable_pct": 0.712
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103620",
"label": "fraudulent",
"label_confidence": 0.622,
"severity": "high",
"timestamp": "2026-01-03T12:20:00Z",
"trace_id": "0730b35e-32a2-c137-93c7-0a5e2fae88cf"
} | {
"account_age_days": 598,
"account_id": "ACCT-8437F2E6A2EC",
"baseline_risk_score": 0.429,
"kyc_tier": "tier_1",
"session_entropy": 0.199
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 1116,
"timestamp": "2026-01-03T12:20:00Z",
"transaction_amount_usd": 1156599.76
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.785,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 5868221.97,
"financial_exposure_usd": 7075682.96,
"recoverable_pct": 0.771
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101733",
"label": "fraudulent",
"label_confidence": 0.757,
"severity": "high",
"timestamp": "2026-01-02T04:53:00Z",
"trace_id": "0775c994-c961-bf60-555c-56b4fb4f105a"
} | {
"account_age_days": 1655,
"account_id": "ACCT-8479259BD6D1",
"baseline_risk_score": 0.639,
"kyc_tier": "tier_3",
"session_entropy": 0.837
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 386,
"timestamp": "2026-01-01T18:57:00Z",
"transaction_amount_usd": 24.15
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.384,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 819581.12,
"financial_exposure_usd": 1157572.66,
"recoverable_pct": 0.448
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108974",
"label": "benign",
"label_confidence": 0.703,
"severity": "low",
"timestamp": "2026-01-07T05:34:00Z",
"trace_id": "d9d141bd-2634-33b8-f989-7871f732aeeb"
} | {
"account_age_days": 1550,
"account_id": "ACCT-94A413000709",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.757
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 383,
"timestamp": "2026-01-07T05:34:00Z",
"transaction_amount_usd": 375.57
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.763,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 4993.05,
"financial_exposure_usd": 5793.7,
"recoverable_pct": 0.891
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104824",
"label": "fraudulent",
"label_confidence": 0.88,
"severity": "critical",
"timestamp": "2026-01-04T08:24:00Z",
"trace_id": "5a0d4e93-9c6d-7e34-ec26-f2e2c407dc20"
} | {
"account_age_days": 1223,
"account_id": "ACCT-2F69AAB5897D",
"baseline_risk_score": 0.225,
"kyc_tier": "tier_2",
"session_entropy": 0.598
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 260,
"timestamp": "2026-01-03T21:37:00Z",
"transaction_amount_usd": 11.64
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.446,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3119897.35,
"financial_exposure_usd": 7161796.55,
"recoverable_pct": 0.714
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108439",
"label": "benign",
"label_confidence": 0.524,
"severity": "high",
"timestamp": "2026-01-06T20:39:00Z",
"trace_id": "cedefde5-6019-06ce-d1e5-8634a330622c"
} | {
"account_age_days": 112,
"account_id": "ACCT-77C8369DBFD7",
"baseline_risk_score": 0.19,
"kyc_tier": "tier_2",
"session_entropy": 0.85
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 919,
"timestamp": "2026-01-06T20:39:00Z",
"transaction_amount_usd": 5242.31
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.462,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2540.31,
"financial_exposure_usd": 2633.2,
"recoverable_pct": 0.546
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102433",
"label": "fraudulent",
"label_confidence": 0.848,
"severity": "critical",
"timestamp": "2026-01-02T16:33:00Z",
"trace_id": "a308f0ac-1cc7-d838-9fe1-febdd4650e81"
} | {
"account_age_days": 1214,
"account_id": "ACCT-FD5B3F0D8234",
"baseline_risk_score": 0.441,
"kyc_tier": "tier_3",
"session_entropy": 0.218
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 122,
"timestamp": "2026-01-02T14:43:00Z",
"transaction_amount_usd": 12.46
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.411,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 309108.66,
"financial_exposure_usd": 544477.66,
"recoverable_pct": 0.473
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103362",
"label": "fraudulent",
"label_confidence": 0.604,
"severity": "medium",
"timestamp": "2026-01-03T08:02:00Z",
"trace_id": "1dc9a17a-085d-a0ce-5a9d-55ac5b8be7be"
} | {
"account_age_days": 1202,
"account_id": "ACCT-105AAFB85951",
"baseline_risk_score": 0.381,
"kyc_tier": "tier_2",
"session_entropy": 0.367
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 350,
"timestamp": "2026-01-02T22:13:00Z",
"transaction_amount_usd": 14.1
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.527,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4842081.36,
"financial_exposure_usd": 6349677.43,
"recoverable_pct": 0.948
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106610",
"label": "fraudulent",
"label_confidence": 0.696,
"severity": "high",
"timestamp": "2026-01-05T14:10:00Z",
"trace_id": "2aa75c5b-3a74-ba43-b1ba-34377f30e7b0"
} | {
"account_age_days": 1406,
"account_id": "ACCT-9E9FBED0CB88",
"baseline_risk_score": 0.265,
"kyc_tier": "tier_3",
"session_entropy": 0.22
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 349,
"timestamp": "2026-01-05T07:19:00Z",
"transaction_amount_usd": 18.13
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.449,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 581384.98,
"financial_exposure_usd": 662331.57,
"recoverable_pct": 0.652
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101967",
"label": "fraudulent",
"label_confidence": 0.934,
"severity": "low",
"timestamp": "2026-01-02T08:47:00Z",
"trace_id": "5dec0d84-0e6e-3ec6-d1b3-fc0f2ab23207"
} | {
"account_age_days": 513,
"account_id": "ACCT-31CE7B1EBBB0",
"baseline_risk_score": 0.32,
"kyc_tier": "tier_3",
"session_entropy": 0.41
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 229,
"timestamp": "2026-01-02T08:47:00Z",
"transaction_amount_usd": 107359.02
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.422,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 235149.43,
"financial_exposure_usd": 314356.33,
"recoverable_pct": 0.535
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104583",
"label": "fraudulent",
"label_confidence": 0.899,
"severity": "low",
"timestamp": "2026-01-04T04:23:00Z",
"trace_id": "d57822d1-1da3-ceec-0188-7be0cb8a1d2c"
} | {
"account_age_days": 611,
"account_id": "ACCT-83046C5F5E02",
"baseline_risk_score": 0.305,
"kyc_tier": "tier_2",
"session_entropy": 0.275
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 1156,
"timestamp": "2026-01-04T04:23:00Z",
"transaction_amount_usd": 530717.88
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.79,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 6251388.64,
"financial_exposure_usd": 8379396.52,
"recoverable_pct": 0.998
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104858",
"label": "fraudulent",
"label_confidence": 0.724,
"severity": "high",
"timestamp": "2026-01-04T08:58:00Z",
"trace_id": "8af42cb6-2c5c-076e-fdfa-445c79f3baaa"
} | {
"account_age_days": 499,
"account_id": "ACCT-14863C04BB37",
"baseline_risk_score": 0.359,
"kyc_tier": "tier_2",
"session_entropy": 0.864
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 295,
"timestamp": "2026-01-04T08:58:00Z",
"transaction_amount_usd": 2249246.04
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.915,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3003656.84,
"financial_exposure_usd": 5772575.67,
"recoverable_pct": 0.76
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109378",
"label": "benign",
"label_confidence": 0.591,
"severity": "low",
"timestamp": "2026-01-07T12:18:00Z",
"trace_id": "2c91f79a-2167-0b2b-d6df-4dd4a0da546a"
} | {
"account_age_days": 25,
"account_id": "ACCT-26B964644657",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.558
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 133,
"timestamp": "2026-01-07T12:18:00Z",
"transaction_amount_usd": 4610.84
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.643,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 394.69,
"financial_exposure_usd": 853.05,
"recoverable_pct": 0.806
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102950",
"label": "fraudulent",
"label_confidence": 0.869,
"severity": "high",
"timestamp": "2026-01-03T01:10:00Z",
"trace_id": "c80dcfcd-416b-c70d-232f-7cebd36e4c28"
} | {
"account_age_days": 1954,
"account_id": "ACCT-DE8034AFFC49",
"baseline_risk_score": 0.346,
"kyc_tier": "tier_1",
"session_entropy": 0.804
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 131,
"timestamp": "2026-01-02T21:59:00Z",
"transaction_amount_usd": 1.7
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.872,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 442429.35,
"financial_exposure_usd": 686779.52,
"recoverable_pct": 0.064
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105153",
"label": "fraudulent",
"label_confidence": 0.655,
"severity": "high",
"timestamp": "2026-01-04T13:53:00Z",
"trace_id": "ba828f31-b7b1-1f7d-a895-0de518bfdf65"
} | {
"account_age_days": 143,
"account_id": "ACCT-AD5B40754DA8",
"baseline_risk_score": 0.06,
"kyc_tier": "tier_3",
"session_entropy": 0.795
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 364,
"timestamp": "2026-01-04T13:53:00Z",
"transaction_amount_usd": 90534.53
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.39,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 1492144.15,
"financial_exposure_usd": 1953886.27,
"recoverable_pct": 0.838
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106992",
"label": "benign",
"label_confidence": 0.732,
"severity": "low",
"timestamp": "2026-01-05T20:32:00Z",
"trace_id": "6579e876-84e0-8ee7-5ec7-94ee0ff06604"
} | {
"account_age_days": 1518,
"account_id": "ACCT-72C425CC33FA",
"baseline_risk_score": 0.142,
"kyc_tier": "tier_1",
"session_entropy": 0.445
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 202,
"timestamp": "2026-01-05T10:07:00Z",
"transaction_amount_usd": 16.82
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.664,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 4236.57,
"financial_exposure_usd": 5491.99,
"recoverable_pct": 0.783
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104792",
"label": "fraudulent",
"label_confidence": 0.712,
"severity": "critical",
"timestamp": "2026-01-04T07:52:00Z",
"trace_id": "96d60843-94fb-1000-e721-4ddd9b47fe56"
} | {
"account_age_days": 1378,
"account_id": "ACCT-0778BB0D1CF6",
"baseline_risk_score": 0.234,
"kyc_tier": "tier_1",
"session_entropy": 0.763
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 468,
"timestamp": "2026-01-04T07:52:00Z",
"transaction_amount_usd": 424133.13
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.563,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 7680082.07,
"financial_exposure_usd": 7748030.72,
"recoverable_pct": 0.979
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108617",
"label": "benign",
"label_confidence": 0.667,
"severity": "low",
"timestamp": "2026-01-06T23:37:00Z",
"trace_id": "c89c1537-db41-9dd2-918e-9176a9a3cdac"
} | {
"account_age_days": 204,
"account_id": "ACCT-C7BAE24075D2",
"baseline_risk_score": 0.089,
"kyc_tier": "tier_1",
"session_entropy": 0.429
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 458,
"timestamp": "2026-01-06T23:37:00Z",
"transaction_amount_usd": 9672.95
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.742,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2246.15,
"financial_exposure_usd": 4106.91,
"recoverable_pct": 0.618
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102375",
"label": "fraudulent",
"label_confidence": 0.87,
"severity": "medium",
"timestamp": "2026-01-02T15:35:00Z",
"trace_id": "9898d1cc-06ac-fb4c-6779-05c471809eaf"
} | {
"account_age_days": 612,
"account_id": "ACCT-66650EEDC612",
"baseline_risk_score": 0.432,
"kyc_tier": "tier_2",
"session_entropy": 0.726
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 123,
"timestamp": "2026-01-02T06:27:00Z",
"transaction_amount_usd": 24.16
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.502,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 641019.56,
"financial_exposure_usd": 814585.26,
"recoverable_pct": 0.446
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108280",
"label": "benign",
"label_confidence": 0.636,
"severity": "medium",
"timestamp": "2026-01-06T18:00:00Z",
"trace_id": "37743fe6-b17c-2020-4b2a-e04d39468852"
} | {
"account_age_days": 96,
"account_id": "ACCT-7F0881EEEE3B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.277
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 269,
"timestamp": "2026-01-06T15:44:00Z",
"transaction_amount_usd": 3.3
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.477,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 0, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 0,
"financial_exposure_usd": 0,
"recoverable_pct": 0.5
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104684",
"label": "fraudulent",
"label_confidence": 0.754,
"severity": "critical",
"timestamp": "2026-01-04T06:04:00Z",
"trace_id": "4fc86c6e-0a84-0f8a-a15c-d178a1498839"
} | {
"account_age_days": 1941,
"account_id": "ACCT-A1227B59C099",
"baseline_risk_score": 0.403,
"kyc_tier": "tier_1",
"session_entropy": 0.412
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 93,
"timestamp": "2026-01-03T19:50:00Z",
"transaction_amount_usd": 9.16
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.419,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3975204.29,
"financial_exposure_usd": 6880684.11,
"recoverable_pct": 0.751
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100102",
"label": "fraudulent",
"label_confidence": 0.882,
"severity": "medium",
"timestamp": "2026-01-01T01:42:00Z",
"trace_id": "e42f0c28-c3e3-c148-06e2-e861957edc3c"
} | {
"account_age_days": 1472,
"account_id": "ACCT-BE2DE8C89FE3",
"baseline_risk_score": 0.369,
"kyc_tier": "tier_3",
"session_entropy": 0.914
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 195,
"timestamp": "2026-01-01T01:42:00Z",
"transaction_amount_usd": 12133.33
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.705,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 432782.57,
"financial_exposure_usd": 982788.49,
"recoverable_pct": 0.681
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109977",
"label": "benign",
"label_confidence": 0.637,
"severity": "high",
"timestamp": "2026-01-07T22:17:00Z",
"trace_id": "e2f4a9b5-498e-8adb-53b2-96755a4e211a"
} | {
"account_age_days": 222,
"account_id": "ACCT-9AB10339AE9A",
"baseline_risk_score": 0.134,
"kyc_tier": "tier_3",
"session_entropy": 0.483
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 813,
"timestamp": "2026-01-07T22:17:00Z",
"transaction_amount_usd": 13479.07
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.642,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2245.19,
"financial_exposure_usd": 2774.99,
"recoverable_pct": 0.742
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106106",
"label": "fraudulent",
"label_confidence": 0.616,
"severity": "critical",
"timestamp": "2026-01-05T05:46:00Z",
"trace_id": "1caf7400-ae68-f1b4-ba49-2796c2e1b8a4"
} | {
"account_age_days": 865,
"account_id": "ACCT-0F75C9206317",
"baseline_risk_score": 0.319,
"kyc_tier": "tier_3",
"session_entropy": 0.128
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 773,
"timestamp": "2026-01-05T05:46:00Z",
"transaction_amount_usd": 2961586.6
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.643,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4268833.51,
"financial_exposure_usd": 8306128.47,
"recoverable_pct": 0.696
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105684",
"label": "fraudulent",
"label_confidence": 0.906,
"severity": "low",
"timestamp": "2026-01-04T22:44:00Z",
"trace_id": "1ce17bda-0184-5aa7-df14-cb64933d7df5"
} | {
"account_age_days": 1610,
"account_id": "ACCT-C8DE1C4951BD",
"baseline_risk_score": 0.303,
"kyc_tier": "tier_1",
"session_entropy": 0.189
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 1186,
"timestamp": "2026-01-04T22:44:00Z",
"transaction_amount_usd": 2358512.98
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.546,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3014188.55,
"financial_exposure_usd": 5839578.56,
"recoverable_pct": 0.5
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106590",
"label": "fraudulent",
"label_confidence": 0.845,
"severity": "medium",
"timestamp": "2026-01-05T13:50:00Z",
"trace_id": "de34ab81-9d0e-99dd-79fc-2986a1d13213"
} | {
"account_age_days": 467,
"account_id": "ACCT-80DA6A45BB9C",
"baseline_risk_score": 0.132,
"kyc_tier": "tier_2",
"session_entropy": 0.143
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 440,
"timestamp": "2026-01-05T13:50:00Z",
"transaction_amount_usd": 805206.86
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.464,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4353078.86,
"financial_exposure_usd": 6399556.7,
"recoverable_pct": 0.94
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109347",
"label": "benign",
"label_confidence": 0.552,
"severity": "low",
"timestamp": "2026-01-07T11:47:00Z",
"trace_id": "38e9d25f-9115-3b5e-9285-0f03fa111d37"
} | {
"account_age_days": 1401,
"account_id": "ACCT-07D4B67D4BCB",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.292
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 1139,
"timestamp": "2026-01-07T11:47:00Z",
"transaction_amount_usd": 2727.49
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.483,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1466.18,
"financial_exposure_usd": 2743.59,
"recoverable_pct": 0.612
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106394",
"label": "fraudulent",
"label_confidence": 0.855,
"severity": "low",
"timestamp": "2026-01-05T10:34:00Z",
"trace_id": "fc3e29fe-a0ed-1ae9-0a7a-d2daee148ed5"
} | {
"account_age_days": 384,
"account_id": "ACCT-D7F7BD953F5F",
"baseline_risk_score": 0.327,
"kyc_tier": "tier_2",
"session_entropy": 0.133
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 1059,
"timestamp": "2026-01-05T10:34:00Z",
"transaction_amount_usd": 1724048.75
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.768,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4086148.09,
"financial_exposure_usd": 5002943.68,
"recoverable_pct": 0.528
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104174",
"label": "fraudulent",
"label_confidence": 0.827,
"severity": "high",
"timestamp": "2026-01-03T21:34:00Z",
"trace_id": "0d429b92-6c92-557b-13ae-c61b786cabf5"
} | {
"account_age_days": 1298,
"account_id": "ACCT-4F981D19DDA2",
"baseline_risk_score": 0.129,
"kyc_tier": "tier_3",
"session_entropy": 0.357
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 825,
"timestamp": "2026-01-03T21:34:00Z",
"transaction_amount_usd": 2281092.2
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.906,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 6223063.36,
"financial_exposure_usd": 6462313.04,
"recoverable_pct": 0.856
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101395",
"label": "fraudulent",
"label_confidence": 0.845,
"severity": "critical",
"timestamp": "2026-01-01T23:15:00Z",
"trace_id": "8af3d512-b2ac-c2a5-1229-2fa2854228bd"
} | {
"account_age_days": 802,
"account_id": "ACCT-0F2C5BBC9B02",
"baseline_risk_score": 0.452,
"kyc_tier": "tier_1",
"session_entropy": 0.523
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 1133,
"timestamp": "2026-01-01T23:15:00Z",
"transaction_amount_usd": 107803.9
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.535,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 486272.71,
"financial_exposure_usd": 864768.42,
"recoverable_pct": 0.55
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101574",
"label": "fraudulent",
"label_confidence": 0.867,
"severity": "critical",
"timestamp": "2026-01-02T02:14:00Z",
"trace_id": "13129bac-0861-95c4-2430-10664dcb9f32"
} | {
"account_age_days": 70,
"account_id": "ACCT-53D69B6AABFE",
"baseline_risk_score": 0.302,
"kyc_tier": "tier_2",
"session_entropy": 0.709
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 525,
"timestamp": "2026-01-02T02:14:00Z",
"transaction_amount_usd": 81165.57
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.499,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 837807.07,
"financial_exposure_usd": 943550.99,
"recoverable_pct": 0.585
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103134",
"label": "fraudulent",
"label_confidence": 0.89,
"severity": "critical",
"timestamp": "2026-01-03T04:14:00Z",
"trace_id": "aead7c8c-56c2-594d-1f4d-f7aa5b6943a6"
} | {
"account_age_days": 1323,
"account_id": "ACCT-9AF2B037C20A",
"baseline_risk_score": 0.455,
"kyc_tier": "tier_1",
"session_entropy": 0.151
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 958,
"timestamp": "2026-01-03T04:14:00Z",
"transaction_amount_usd": 95381.3
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.515,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 529969.13,
"financial_exposure_usd": 920137.95,
"recoverable_pct": 0.332
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102107",
"label": "fraudulent",
"label_confidence": 0.828,
"severity": "high",
"timestamp": "2026-01-02T11:07:00Z",
"trace_id": "177f9d5f-31f4-261b-e251-083176046b65"
} | {
"account_age_days": 401,
"account_id": "ACCT-8E7F034049DE",
"baseline_risk_score": 0.617,
"kyc_tier": "tier_3",
"session_entropy": 0.849
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 715,
"timestamp": "2026-01-02T11:07:00Z",
"transaction_amount_usd": 75993.4
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.57,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 397285.81,
"financial_exposure_usd": 790273.59,
"recoverable_pct": 0.033
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109896",
"label": "benign",
"label_confidence": 0.691,
"severity": "low",
"timestamp": "2026-01-07T20:56:00Z",
"trace_id": "f2b28347-8537-a2dd-80f0-1c4bbf0e619e"
} | {
"account_age_days": 1160,
"account_id": "ACCT-D557A4024F5B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.467
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 869,
"timestamp": "2026-01-07T20:56:00Z",
"transaction_amount_usd": 2644.1
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.501,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3791.35,
"financial_exposure_usd": 4554.82,
"recoverable_pct": 0.954
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109963",
"label": "benign",
"label_confidence": 0.492,
"severity": "high",
"timestamp": "2026-01-07T22:03:00Z",
"trace_id": "3f881ea7-e208-9aa8-9aba-73a77352e225"
} | {
"account_age_days": 1237,
"account_id": "ACCT-225D9281A38E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.585
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 113,
"timestamp": "2026-01-07T12:15:00Z",
"transaction_amount_usd": 7.15
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.724,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 285.84,
"financial_exposure_usd": 537.05,
"recoverable_pct": 0.448
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102479",
"label": "fraudulent",
"label_confidence": 0.89,
"severity": "medium",
"timestamp": "2026-01-02T17:19:00Z",
"trace_id": "bce3f629-8281-e75e-b329-392853da3862"
} | {
"account_age_days": 1279,
"account_id": "ACCT-DF9E9CBA6473",
"baseline_risk_score": 0.582,
"kyc_tier": "tier_3",
"session_entropy": 0.903
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 194,
"timestamp": "2026-01-02T14:32:00Z",
"transaction_amount_usd": 22.19
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.464,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 596101.07,
"financial_exposure_usd": 871895.56,
"recoverable_pct": 0.112
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103077",
"label": "fraudulent",
"label_confidence": 0.855,
"severity": "high",
"timestamp": "2026-01-03T03:17:00Z",
"trace_id": "241974ce-2702-f680-f07d-5a60ff18898c"
} | {
"account_age_days": 556,
"account_id": "ACCT-BC789FBBFB65",
"baseline_risk_score": 0.288,
"kyc_tier": "tier_1",
"session_entropy": 0.652
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 627,
"timestamp": "2026-01-03T03:17:00Z",
"transaction_amount_usd": 81395.41
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.86,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 254441.23,
"financial_exposure_usd": 502342.02,
"recoverable_pct": 0.605
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109057",
"label": "benign",
"label_confidence": 0.673,
"severity": "medium",
"timestamp": "2026-01-07T06:57:00Z",
"trace_id": "c6883fbe-53e5-ef92-fc83-9e70ef1b8cc9"
} | {
"account_age_days": 1329,
"account_id": "ACCT-6A707790D7DE",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.25
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 381,
"timestamp": "2026-01-07T02:21:00Z",
"transaction_amount_usd": 10.59
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.524,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1704.84,
"financial_exposure_usd": 2855.94,
"recoverable_pct": 0.98
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108948",
"label": "benign",
"label_confidence": 0.75,
"severity": "low",
"timestamp": "2026-01-07T05:08:00Z",
"trace_id": "999fe928-98eb-4fc7-b795-4e569580f353"
} | {
"account_age_days": 454,
"account_id": "ACCT-169AF938CB95",
"baseline_risk_score": 0.055,
"kyc_tier": "tier_2",
"session_entropy": 0.272
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 122,
"timestamp": "2026-01-07T05:08:00Z",
"transaction_amount_usd": 478.29
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.604,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 854.36,
"financial_exposure_usd": 949.33,
"recoverable_pct": 0.532
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108453",
"label": "benign",
"label_confidence": 0.577,
"severity": "low",
"timestamp": "2026-01-06T20:53:00Z",
"trace_id": "1a6ef19f-7836-5d1e-009d-dedf9e029b6a"
} | {
"account_age_days": 669,
"account_id": "ACCT-E2119AB8D31C",
"baseline_risk_score": 0.179,
"kyc_tier": "tier_2",
"session_entropy": 0.378
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 154,
"timestamp": "2026-01-06T20:53:00Z",
"transaction_amount_usd": 6840.19
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.574,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1656.03,
"financial_exposure_usd": 3661.06,
"recoverable_pct": 0.993
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102763",
"label": "fraudulent",
"label_confidence": 0.89,
"severity": "low",
"timestamp": "2026-01-02T22:03:00Z",
"trace_id": "161444df-ac85-f803-0030-e2208b66c929"
} | {
"account_age_days": 1263,
"account_id": "ACCT-D8495325474B",
"baseline_risk_score": 0.277,
"kyc_tier": "tier_2",
"session_entropy": 0.489
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 146,
"timestamp": "2026-01-02T22:03:00Z",
"transaction_amount_usd": 73388.79
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.881,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 514927.78,
"financial_exposure_usd": 623782.35,
"recoverable_pct": 0.529
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103234",
"label": "fraudulent",
"label_confidence": 0.952,
"severity": "critical",
"timestamp": "2026-01-03T05:54:00Z",
"trace_id": "6fa77370-3842-3a1c-a3af-05f411f26f9b"
} | {
"account_age_days": 1047,
"account_id": "ACCT-C4A0FB522501",
"baseline_risk_score": 0.414,
"kyc_tier": "tier_2",
"session_entropy": 0.387
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 864,
"timestamp": "2026-01-03T05:54:00Z",
"transaction_amount_usd": 24835.3
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.876,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 611296.78,
"financial_exposure_usd": 793457.44,
"recoverable_pct": 0.587
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105394",
"label": "fraudulent",
"label_confidence": 0.81,
"severity": "medium",
"timestamp": "2026-01-04T17:54:00Z",
"trace_id": "4e774960-175b-983f-6d80-00c6894a1abf"
} | {
"account_age_days": 405,
"account_id": "ACCT-169EF7D81FBC",
"baseline_risk_score": 0.204,
"kyc_tier": "tier_1",
"session_entropy": 0.725
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 397,
"timestamp": "2026-01-04T17:54:00Z",
"transaction_amount_usd": 2504607.07
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.359,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2907211.85,
"financial_exposure_usd": 5720827.22,
"recoverable_pct": 0.917
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103326",
"label": "fraudulent",
"label_confidence": 0.857,
"severity": "low",
"timestamp": "2026-01-03T07:26:00Z",
"trace_id": "fa5daa53-8d28-d0c3-11ee-dedeb9717e1b"
} | {
"account_age_days": 1261,
"account_id": "ACCT-751D54E1EB66",
"baseline_risk_score": 0.644,
"kyc_tier": "tier_2",
"session_entropy": 0.845
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 493,
"timestamp": "2026-01-03T07:26:00Z",
"transaction_amount_usd": 40704.38
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.514,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 485380.6,
"financial_exposure_usd": 688488.66,
"recoverable_pct": 0.848
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108653",
"label": "benign",
"label_confidence": 0.619,
"severity": "high",
"timestamp": "2026-01-07T00:13:00Z",
"trace_id": "2566f435-4fb9-4c8e-828f-915c027b323d"
} | {
"account_age_days": 117,
"account_id": "ACCT-4E2C61E6093C",
"baseline_risk_score": 0.063,
"kyc_tier": "tier_1",
"session_entropy": 0.46
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 367,
"timestamp": "2026-01-06T18:50:00Z",
"transaction_amount_usd": 24.83
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.554,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 8084.88,
"financial_exposure_usd": 8881.17,
"recoverable_pct": 0.843
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109117",
"label": "benign",
"label_confidence": 0.458,
"severity": "low",
"timestamp": "2026-01-07T07:57:00Z",
"trace_id": "35b06506-5b89-07c9-bca1-7a21da9e87c4"
} | {
"account_age_days": 1840,
"account_id": "ACCT-948068172974",
"baseline_risk_score": 0.088,
"kyc_tier": "tier_1",
"session_entropy": 0.414
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 246,
"timestamp": "2026-01-07T05:17:00Z",
"transaction_amount_usd": 16.82
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.529,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3503.32,
"financial_exposure_usd": 5861.91,
"recoverable_pct": 0.742
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104730",
"label": "fraudulent",
"label_confidence": 0.703,
"severity": "high",
"timestamp": "2026-01-04T06:50:00Z",
"trace_id": "fd6bb9f0-8d54-44aa-9f10-19cd4bafa607"
} | {
"account_age_days": 1723,
"account_id": "ACCT-D21C4FCEF884",
"baseline_risk_score": 0.085,
"kyc_tier": "tier_1",
"session_entropy": 0.436
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 368,
"timestamp": "2026-01-04T00:21:00Z",
"transaction_amount_usd": 0.65
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.388,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3886031.08,
"financial_exposure_usd": 5292531.12,
"recoverable_pct": 0.838
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102300",
"label": "fraudulent",
"label_confidence": 0.755,
"severity": "high",
"timestamp": "2026-01-02T14:20:00Z",
"trace_id": "52695787-3259-06a7-ffff-9a1d04d6d71b"
} | {
"account_age_days": 646,
"account_id": "ACCT-4CE67D7EB1FC",
"baseline_risk_score": 0.644,
"kyc_tier": "tier_3",
"session_entropy": 0.3
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "FR",
"latency_ms": 1152,
"timestamp": "2026-01-02T14:20:00Z",
"transaction_amount_usd": 103998.68
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.675,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 965291.47,
"financial_exposure_usd": 1374900.65,
"recoverable_pct": 0.824
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102666",
"label": "fraudulent",
"label_confidence": 0.811,
"severity": "medium",
"timestamp": "2026-01-02T20:26:00Z",
"trace_id": "bc237f2a-fab8-42fd-04fe-2d402cd75480"
} | {
"account_age_days": 1752,
"account_id": "ACCT-7D13D10E8237",
"baseline_risk_score": 0.562,
"kyc_tier": "tier_1",
"session_entropy": 0.104
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 1151,
"timestamp": "2026-01-02T20:26:00Z",
"transaction_amount_usd": 12527.3
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.895,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 587625.35,
"financial_exposure_usd": 733227.78,
"recoverable_pct": 0.632
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109681",
"label": "benign",
"label_confidence": 0.457,
"severity": "high",
"timestamp": "2026-01-07T17:21:00Z",
"trace_id": "d55ca251-fd62-59ca-d991-c3c5fd3c4734"
} | {
"account_age_days": 30,
"account_id": "ACCT-D0EC86D0DF0C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.3
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 562,
"timestamp": "2026-01-07T17:21:00Z",
"transaction_amount_usd": 12373.43
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.506,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1992.79,
"financial_exposure_usd": 2901.13,
"recoverable_pct": 0.734
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108723",
"label": "benign",
"label_confidence": 0.72,
"severity": "low",
"timestamp": "2026-01-07T01:23:00Z",
"trace_id": "2ba67b0e-a4a9-29a8-fa6b-84e9affe2dae"
} | {
"account_age_days": 594,
"account_id": "ACCT-5BEEF6D32126",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.418
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 94,
"timestamp": "2026-01-07T01:23:00Z",
"transaction_amount_usd": 2559.76
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.528,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1011.95,
"financial_exposure_usd": 1095.42,
"recoverable_pct": 0.554
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104178",
"label": "fraudulent",
"label_confidence": 0.891,
"severity": "medium",
"timestamp": "2026-01-03T21:38:00Z",
"trace_id": "f6b68c7c-fc80-ee65-87d6-c293fcf24214"
} | {
"account_age_days": 368,
"account_id": "ACCT-671E9DA6F37E",
"baseline_risk_score": 0.232,
"kyc_tier": "tier_2",
"session_entropy": 0.347
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 127,
"timestamp": "2026-01-03T09:28:00Z",
"transaction_amount_usd": 23.4
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.417,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 5861034.89,
"financial_exposure_usd": 9232011.25,
"recoverable_pct": 0.7
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101113",
"label": "fraudulent",
"label_confidence": 0.763,
"severity": "high",
"timestamp": "2026-01-01T18:33:00Z",
"trace_id": "ee3cbee9-86ed-28c8-c311-cee3fc0ce080"
} | {
"account_age_days": 574,
"account_id": "ACCT-9F05CA6A0BCF",
"baseline_risk_score": 0.57,
"kyc_tier": "tier_3",
"session_entropy": 0.191
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "JP",
"latency_ms": 799,
"timestamp": "2026-01-01T18:33:00Z",
"transaction_amount_usd": 38260.87
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.711,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 602512.76,
"financial_exposure_usd": 742235.06,
"recoverable_pct": 0.472
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100526",
"label": "fraudulent",
"label_confidence": 0.767,
"severity": "critical",
"timestamp": "2026-01-01T08:46:00Z",
"trace_id": "e071fdc2-b9fd-b77d-e1a3-f33c25c5eecd"
} | {
"account_age_days": 1466,
"account_id": "ACCT-CDCC2676D07A",
"baseline_risk_score": 0.398,
"kyc_tier": "tier_2",
"session_entropy": 0.741
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 403,
"timestamp": "2026-01-01T08:46:00Z",
"transaction_amount_usd": 113149.01
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.52,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 988670.45,
"financial_exposure_usd": 1120184.41,
"recoverable_pct": 0.117
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100963",
"label": "fraudulent",
"label_confidence": 0.771,
"severity": "medium",
"timestamp": "2026-01-01T16:03:00Z",
"trace_id": "4147c6b5-9b9d-d20f-f9f5-176dc630644e"
} | {
"account_age_days": 1611,
"account_id": "ACCT-1075F720B1C5",
"baseline_risk_score": 0.438,
"kyc_tier": "tier_2",
"session_entropy": 0.578
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 337,
"timestamp": "2026-01-01T05:03:00Z",
"transaction_amount_usd": 7.72
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.925,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 86803,
"financial_exposure_usd": 214570.27,
"recoverable_pct": 0.232
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109424",
"label": "benign",
"label_confidence": 0.719,
"severity": "low",
"timestamp": "2026-01-07T13:04:00Z",
"trace_id": "7efc09a5-5c63-699f-ab9e-e1033471a77e"
} | {
"account_age_days": 227,
"account_id": "ACCT-91767B4F1FA8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.483
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 1041,
"timestamp": "2026-01-07T13:04:00Z",
"transaction_amount_usd": 4977.61
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.733,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2873.13,
"financial_exposure_usd": 3794.92,
"recoverable_pct": 0.415
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105483",
"label": "fraudulent",
"label_confidence": 0.666,
"severity": "medium",
"timestamp": "2026-01-04T19:23:00Z",
"trace_id": "e8054e65-bbe8-281b-8dc3-dab222ef2a69"
} | {
"account_age_days": 200,
"account_id": "ACCT-2932F812E86D",
"baseline_risk_score": 0.197,
"kyc_tier": "tier_3",
"session_entropy": 0.116
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 324,
"timestamp": "2026-01-04T19:23:00Z",
"transaction_amount_usd": 97380.14
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.58,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 3491490.92,
"financial_exposure_usd": 3740012.29,
"recoverable_pct": 0.969
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103460",
"label": "fraudulent",
"label_confidence": 0.62,
"severity": "medium",
"timestamp": "2026-01-03T09:40:00Z",
"trace_id": "a6cd8b40-d253-097d-fae3-cccf29dfc4ec"
} | {
"account_age_days": 810,
"account_id": "ACCT-2C7A550F00C0",
"baseline_risk_score": 0.428,
"kyc_tier": "tier_2",
"session_entropy": 0.171
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 580,
"timestamp": "2026-01-03T09:40:00Z",
"transaction_amount_usd": 2304298.85
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.79,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 5195632.52,
"financial_exposure_usd": 8714446.14,
"recoverable_pct": 0.445
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106727",
"label": "benign",
"label_confidence": 0.476,
"severity": "medium",
"timestamp": "2026-01-05T16:07:00Z",
"trace_id": "9dc55f94-8f02-bd28-9f30-b20b25fa807d"
} | {
"account_age_days": 889,
"account_id": "ACCT-58C04FC63ED3",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.318
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 636,
"timestamp": "2026-01-05T16:07:00Z",
"transaction_amount_usd": 12506.72
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.71,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 5976.04,
"financial_exposure_usd": 8371.76,
"recoverable_pct": 0.942
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106771",
"label": "benign",
"label_confidence": 0.656,
"severity": "low",
"timestamp": "2026-01-05T16:51:00Z",
"trace_id": "fc27b289-b8e7-6eec-d311-49c0d584b0eb"
} | {
"account_age_days": 333,
"account_id": "ACCT-9D279BF5A7D0",
"baseline_risk_score": 0.115,
"kyc_tier": "tier_2",
"session_entropy": 0.911
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 838,
"timestamp": "2026-01-05T16:51:00Z",
"transaction_amount_usd": 9700.53
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.714,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2930.01,
"financial_exposure_usd": 3541.19,
"recoverable_pct": 0.828
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102147",
"label": "fraudulent",
"label_confidence": 0.95,
"severity": "medium",
"timestamp": "2026-01-02T11:47:00Z",
"trace_id": "913769d1-45b1-892f-f743-cb211a31383b"
} | {
"account_age_days": 969,
"account_id": "ACCT-DEDA2002D10E",
"baseline_risk_score": 0.495,
"kyc_tier": "tier_2",
"session_entropy": 0.452
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NL",
"latency_ms": 376,
"timestamp": "2026-01-02T11:47:00Z",
"transaction_amount_usd": 42015.53
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.506,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 332094.78,
"financial_exposure_usd": 477676.2,
"recoverable_pct": 0.726
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108543",
"label": "benign",
"label_confidence": 0.509,
"severity": "low",
"timestamp": "2026-01-06T22:23:00Z",
"trace_id": "f24e39ad-176b-e912-1011-50e45aad6578"
} | {
"account_age_days": 1229,
"account_id": "ACCT-72BE0A89F617",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.509
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 820,
"timestamp": "2026-01-06T22:23:00Z",
"transaction_amount_usd": 1739.69
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.725,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 5276.27,
"financial_exposure_usd": 7486.48,
"recoverable_pct": 0.497
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108606",
"label": "benign",
"label_confidence": 0.661,
"severity": "low",
"timestamp": "2026-01-06T23:26:00Z",
"trace_id": "62d20e28-10c3-17fb-40cf-c9338e11f95a"
} | {
"account_age_days": 720,
"account_id": "ACCT-939BFDA12A27",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.759
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 608,
"timestamp": "2026-01-06T23:26:00Z",
"transaction_amount_usd": 9714.16
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.666,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1560.03,
"financial_exposure_usd": 2317.54,
"recoverable_pct": 0.519
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101974",
"label": "fraudulent",
"label_confidence": 0.855,
"severity": "high",
"timestamp": "2026-01-02T08:54:00Z",
"trace_id": "3f8a2c37-5b54-4da2-0111-d20c49ba416c"
} | {
"account_age_days": 845,
"account_id": "ACCT-909B7ED3D25B",
"baseline_risk_score": 0.344,
"kyc_tier": "tier_3",
"session_entropy": 0.748
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 290,
"timestamp": "2026-01-02T04:27:00Z",
"transaction_amount_usd": 8.59
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.773,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 106304.15,
"financial_exposure_usd": 183978.41,
"recoverable_pct": 0.3
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107195",
"label": "benign",
"label_confidence": 0.52,
"severity": "critical",
"timestamp": "2026-01-05T23:55:00Z",
"trace_id": "82acefec-b1c9-b408-29f4-17d7a88b6cba"
} | {
"account_age_days": 1974,
"account_id": "ACCT-5AE71A99CEF6",
"baseline_risk_score": 0.195,
"kyc_tier": "tier_2",
"session_entropy": 0.749
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 129,
"timestamp": "2026-01-05T23:55:00Z",
"transaction_amount_usd": 3629.08
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.588,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2233.88,
"financial_exposure_usd": 3137.28,
"recoverable_pct": 0.61
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.