schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109916",
"label": "benign",
"label_confidence": 0.504,
"severity": "low",
"timestamp": "2026-01-07T21:16:00Z",
"trace_id": "ba5caa35-6459-bd95-3df3-ea53aa4a101a"
} | {
"account_age_days": 1444,
"account_id": "ACCT-99B29FB4DD78",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.91
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 311,
"timestamp": "2026-01-07T21:16:00Z",
"transaction_amount_usd": 3246.99
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.454,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 688.36,
"financial_exposure_usd": 994.94,
"recoverable_pct": 0.867
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102533",
"label": "fraudulent",
"label_confidence": 0.917,
"severity": "medium",
"timestamp": "2026-01-02T18:13:00Z",
"trace_id": "dfc01bce-0d8f-f655-79dd-de3210c55fe3"
} | {
"account_age_days": 1555,
"account_id": "ACCT-0C49D6DB15F3",
"baseline_risk_score": 0.507,
"kyc_tier": "tier_2",
"session_entropy": 0.82
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 387,
"timestamp": "2026-01-02T11:02:00Z",
"transaction_amount_usd": 19.64
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.505,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 891030.2,
"financial_exposure_usd": 1239691.06,
"recoverable_pct": 0.441
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100791",
"label": "fraudulent",
"label_confidence": 0.921,
"severity": "medium",
"timestamp": "2026-01-01T13:11:00Z",
"trace_id": "5d027966-c671-3eeb-75d0-9c8c22c486ba"
} | {
"account_age_days": 174,
"account_id": "ACCT-4F23DB5C9D72",
"baseline_risk_score": 0.288,
"kyc_tier": "tier_1",
"session_entropy": 0.338
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 1043,
"timestamp": "2026-01-01T13:11:00Z",
"transaction_amount_usd": 57412.34
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.831,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 398540,
"financial_exposure_usd": 502209.97,
"recoverable_pct": 0.773
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101063",
"label": "fraudulent",
"label_confidence": 0.921,
"severity": "high",
"timestamp": "2026-01-01T17:43:00Z",
"trace_id": "5b4b9be5-e43f-9c60-e4ec-aa0827b7f8c0"
} | {
"account_age_days": 1928,
"account_id": "ACCT-33898C456582",
"baseline_risk_score": 0.255,
"kyc_tier": "tier_1",
"session_entropy": 0.514
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "BR",
"latency_ms": 989,
"timestamp": "2026-01-01T17:43:00Z",
"transaction_amount_usd": 41999.61
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.677,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 427496.92,
"financial_exposure_usd": 588727.17,
"recoverable_pct": 0.497
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109474",
"label": "benign",
"label_confidence": 0.585,
"severity": "medium",
"timestamp": "2026-01-07T13:54:00Z",
"trace_id": "efa9b620-0b58-fcd9-0453-dff220d44c71"
} | {
"account_age_days": 1919,
"account_id": "ACCT-394666934E23",
"baseline_risk_score": 0.176,
"kyc_tier": "tier_2",
"session_entropy": 0.903
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 397,
"timestamp": "2026-01-07T13:54:00Z",
"transaction_amount_usd": 3813.57
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.754,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1603.77,
"financial_exposure_usd": 2279.39,
"recoverable_pct": 0.802
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106379",
"label": "fraudulent",
"label_confidence": 0.701,
"severity": "high",
"timestamp": "2026-01-05T10:19:00Z",
"trace_id": "20c45980-a7b6-e44d-55a4-986b67a8b18b"
} | {
"account_age_days": 1995,
"account_id": "ACCT-FD0A7A73A02B",
"baseline_risk_score": 0.279,
"kyc_tier": "tier_1",
"session_entropy": 0.618
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 770,
"timestamp": "2026-01-05T10:19:00Z",
"transaction_amount_usd": 1487424.43
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.529,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1400356.67,
"financial_exposure_usd": 3139317.98,
"recoverable_pct": 0.505
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102720",
"label": "fraudulent",
"label_confidence": 0.88,
"severity": "medium",
"timestamp": "2026-01-02T21:20:00Z",
"trace_id": "0d581264-a7df-9854-900d-7b19ae1177c3"
} | {
"account_age_days": 68,
"account_id": "ACCT-3244868612B3",
"baseline_risk_score": 0.396,
"kyc_tier": "tier_3",
"session_entropy": 0.632
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CA",
"latency_ms": 1069,
"timestamp": "2026-01-02T21:20:00Z",
"transaction_amount_usd": 62694.85
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.602,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 480942.2,
"financial_exposure_usd": 655077.7,
"recoverable_pct": 0.202
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108419",
"label": "benign",
"label_confidence": 0.665,
"severity": "critical",
"timestamp": "2026-01-06T20:19:00Z",
"trace_id": "2b5880fa-a740-a106-72b0-e1c543a3ff88"
} | {
"account_age_days": 1955,
"account_id": "ACCT-D16E5141CD53",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.177
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 504,
"timestamp": "2026-01-06T20:19:00Z",
"transaction_amount_usd": 5637.27
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.478,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 379.89,
"financial_exposure_usd": 429.07,
"recoverable_pct": 0.519
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101300",
"label": "fraudulent",
"label_confidence": 0.827,
"severity": "critical",
"timestamp": "2026-01-01T21:40:00Z",
"trace_id": "8f669e7a-51fc-c5dc-e6ed-306985a7f513"
} | {
"account_age_days": 1875,
"account_id": "ACCT-63478F830931",
"baseline_risk_score": 0.515,
"kyc_tier": "tier_2",
"session_entropy": 0.64
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 886,
"timestamp": "2026-01-01T21:40:00Z",
"transaction_amount_usd": 83457.59
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.741,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 181402.45,
"financial_exposure_usd": 206197.76,
"recoverable_pct": 0.289
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101175",
"label": "fraudulent",
"label_confidence": 0.817,
"severity": "critical",
"timestamp": "2026-01-01T19:35:00Z",
"trace_id": "c416ac5b-fa48-ef41-e44a-442d3ee8178d"
} | {
"account_age_days": 959,
"account_id": "ACCT-F3A42514DBF0",
"baseline_risk_score": 0.521,
"kyc_tier": "tier_2",
"session_entropy": 0.236
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 378,
"timestamp": "2026-01-01T14:20:00Z",
"transaction_amount_usd": 4.07
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.929,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 758900.27,
"financial_exposure_usd": 854904.4,
"recoverable_pct": 0.356
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103060",
"label": "fraudulent",
"label_confidence": 0.871,
"severity": "high",
"timestamp": "2026-01-03T03:00:00Z",
"trace_id": "450975d9-03b4-532f-7710-c298f200aac8"
} | {
"account_age_days": 279,
"account_id": "ACCT-7556CE987BF7",
"baseline_risk_score": 0.464,
"kyc_tier": "tier_2",
"session_entropy": 0.192
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 649,
"timestamp": "2026-01-03T03:00:00Z",
"transaction_amount_usd": 111540.43
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.38,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 436604.16,
"financial_exposure_usd": 1003011.77,
"recoverable_pct": 0.393
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106754",
"label": "benign",
"label_confidence": 0.638,
"severity": "medium",
"timestamp": "2026-01-05T16:34:00Z",
"trace_id": "61848869-abd1-caed-913b-7262ffd4690a"
} | {
"account_age_days": 1688,
"account_id": "ACCT-5452760A36E4",
"baseline_risk_score": 0.122,
"kyc_tier": "tier_3",
"session_entropy": 0.384
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 768,
"timestamp": "2026-01-05T16:34:00Z",
"transaction_amount_usd": 9100.72
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.465,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3063.65,
"financial_exposure_usd": 3167.57,
"recoverable_pct": 0.831
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100340",
"label": "fraudulent",
"label_confidence": 0.968,
"severity": "critical",
"timestamp": "2026-01-01T05:40:00Z",
"trace_id": "016db752-ed6b-9872-dc2b-15378082efd4"
} | {
"account_age_days": 1042,
"account_id": "ACCT-75281C2C04EC",
"baseline_risk_score": 0.38,
"kyc_tier": "tier_3",
"session_entropy": 0.225
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 783,
"timestamp": "2026-01-01T05:40:00Z",
"transaction_amount_usd": 114484.85
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.93,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 970678.54,
"financial_exposure_usd": 1236609.48,
"recoverable_pct": 0.397
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108342",
"label": "benign",
"label_confidence": 0.63,
"severity": "high",
"timestamp": "2026-01-06T19:02:00Z",
"trace_id": "29d28c7e-f4dc-63dd-767b-d0a3aa6712a2"
} | {
"account_age_days": 1396,
"account_id": "ACCT-2096D92FCDC7",
"baseline_risk_score": 0.196,
"kyc_tier": "tier_2",
"session_entropy": 0.29
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 212,
"timestamp": "2026-01-06T12:44:00Z",
"transaction_amount_usd": 8.31
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.549,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 319.96,
"financial_exposure_usd": 553.63,
"recoverable_pct": 0.642
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109694",
"label": "benign",
"label_confidence": 0.608,
"severity": "low",
"timestamp": "2026-01-07T17:34:00Z",
"trace_id": "20f227bc-304b-85b3-030e-0410fcd082e5"
} | {
"account_age_days": 1796,
"account_id": "ACCT-8063B2EBB15D",
"baseline_risk_score": 0.092,
"kyc_tier": "tier_1",
"session_entropy": 0.221
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 447,
"timestamp": "2026-01-07T17:34:00Z",
"transaction_amount_usd": 4466.28
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.641,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2606.71,
"financial_exposure_usd": 4868.6,
"recoverable_pct": 0.721
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103289",
"label": "fraudulent",
"label_confidence": 0.752,
"severity": "high",
"timestamp": "2026-01-03T06:49:00Z",
"trace_id": "289762d8-09b8-e775-4dd4-be499c914648"
} | {
"account_age_days": 265,
"account_id": "ACCT-519DB2B02837",
"baseline_risk_score": 0.604,
"kyc_tier": "tier_3",
"session_entropy": 0.734
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 214,
"timestamp": "2026-01-02T19:10:00Z",
"transaction_amount_usd": 5.79
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.653,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 427451.86,
"financial_exposure_usd": 870370.43,
"recoverable_pct": 0.098
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100831",
"label": "fraudulent",
"label_confidence": 0.831,
"severity": "critical",
"timestamp": "2026-01-01T13:51:00Z",
"trace_id": "3923db19-3917-aff4-b097-06dc8accd5c0"
} | {
"account_age_days": 761,
"account_id": "ACCT-04D44A65A603",
"baseline_risk_score": 0.389,
"kyc_tier": "tier_2",
"session_entropy": 0.528
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 508,
"timestamp": "2026-01-01T13:51:00Z",
"transaction_amount_usd": 92587.47
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.627,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 840129.28,
"financial_exposure_usd": 867759.11,
"recoverable_pct": 0.18
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102106",
"label": "fraudulent",
"label_confidence": 0.939,
"severity": "medium",
"timestamp": "2026-01-02T11:06:00Z",
"trace_id": "c774ea29-f27c-cdce-b19f-7fd64ef42a83"
} | {
"account_age_days": 1502,
"account_id": "ACCT-8624DC8F1972",
"baseline_risk_score": 0.443,
"kyc_tier": "tier_1",
"session_entropy": 0.161
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 1019,
"timestamp": "2026-01-02T11:06:00Z",
"transaction_amount_usd": 73477.84
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.423,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 661081.8,
"financial_exposure_usd": 1331610.76,
"recoverable_pct": 0.799
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104493",
"label": "fraudulent",
"label_confidence": 0.726,
"severity": "low",
"timestamp": "2026-01-04T02:53:00Z",
"trace_id": "039fc730-3f71-5f6d-f254-85e40416faf8"
} | {
"account_age_days": 883,
"account_id": "ACCT-FEAF6D9A4534",
"baseline_risk_score": 0.424,
"kyc_tier": "tier_3",
"session_entropy": 0.717
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 372,
"timestamp": "2026-01-04T02:53:00Z",
"transaction_amount_usd": 1126977.59
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.874,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 6380759.41,
"financial_exposure_usd": 6925372.19,
"recoverable_pct": 0.648
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103398",
"label": "fraudulent",
"label_confidence": 0.762,
"severity": "low",
"timestamp": "2026-01-03T08:38:00Z",
"trace_id": "e10755d1-edd2-1dd1-cc55-8cb896bae688"
} | {
"account_age_days": 1112,
"account_id": "ACCT-98D81ECCB5BB",
"baseline_risk_score": 0.398,
"kyc_tier": "tier_1",
"session_entropy": 0.172
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 850,
"timestamp": "2026-01-03T08:38:00Z",
"transaction_amount_usd": 634957.14
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.81,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 948121.87,
"financial_exposure_usd": 1687267.95,
"recoverable_pct": 0.781
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109094",
"label": "benign",
"label_confidence": 0.718,
"severity": "medium",
"timestamp": "2026-01-07T07:34:00Z",
"trace_id": "f0c40fc6-9b3a-c639-4907-a9c8c1ae5c18"
} | {
"account_age_days": 1880,
"account_id": "ACCT-F57047E8C641",
"baseline_risk_score": 0.137,
"kyc_tier": "tier_3",
"session_entropy": 0.414
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 1069,
"timestamp": "2026-01-07T07:34:00Z",
"transaction_amount_usd": 12929.59
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.47,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 1532.79,
"financial_exposure_usd": 2529.26,
"recoverable_pct": 0.652
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100096",
"label": "fraudulent",
"label_confidence": 0.831,
"severity": "high",
"timestamp": "2026-01-01T01:36:00Z",
"trace_id": "27f31b78-51f9-cd77-ed85-0a6d75422851"
} | {
"account_age_days": 1493,
"account_id": "ACCT-8F9FDC15DFD2",
"baseline_risk_score": 0.364,
"kyc_tier": "tier_2",
"session_entropy": 0.174
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 1050,
"timestamp": "2026-01-01T01:36:00Z",
"transaction_amount_usd": 65764.4
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.832,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 609017.56,
"financial_exposure_usd": 1222253.84,
"recoverable_pct": 0.619
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104964",
"label": "fraudulent",
"label_confidence": 0.876,
"severity": "medium",
"timestamp": "2026-01-04T10:44:00Z",
"trace_id": "81db9c2e-01f5-65de-9e66-c83f05a748e0"
} | {
"account_age_days": 1681,
"account_id": "ACCT-89AD14C99343",
"baseline_risk_score": 0.197,
"kyc_tier": "tier_2",
"session_entropy": 0.274
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 765,
"timestamp": "2026-01-04T10:44:00Z",
"transaction_amount_usd": 2442242.42
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.733,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3498025.29,
"financial_exposure_usd": 6681404.61,
"recoverable_pct": 0.658
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105894",
"label": "fraudulent",
"label_confidence": 0.87,
"severity": "high",
"timestamp": "2026-01-05T02:14:00Z",
"trace_id": "cd5ec12b-2f8d-7576-d18c-258bbe0333e6"
} | {
"account_age_days": 606,
"account_id": "ACCT-2FDFA28B3BDD",
"baseline_risk_score": 0.155,
"kyc_tier": "tier_2",
"session_entropy": 0.667
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 581,
"timestamp": "2026-01-05T02:14:00Z",
"transaction_amount_usd": 1910070.58
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.783,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2150251.85,
"financial_exposure_usd": 3250828.78,
"recoverable_pct": 0.686
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101966",
"label": "fraudulent",
"label_confidence": 0.884,
"severity": "medium",
"timestamp": "2026-01-02T08:46:00Z",
"trace_id": "1222cd8f-ffa8-d3a2-9c88-9910b69fb70e"
} | {
"account_age_days": 987,
"account_id": "ACCT-AB400BF0F784",
"baseline_risk_score": 0.477,
"kyc_tier": "tier_3",
"session_entropy": 0.267
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 487,
"timestamp": "2026-01-02T08:46:00Z",
"transaction_amount_usd": 87697.77
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.714,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 682232.96,
"financial_exposure_usd": 898228.89,
"recoverable_pct": 0.175
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107027",
"label": "benign",
"label_confidence": 0.599,
"severity": "medium",
"timestamp": "2026-01-05T21:07:00Z",
"trace_id": "57e57b2e-b799-7eb2-773a-cdefe5950903"
} | {
"account_age_days": 1250,
"account_id": "ACCT-545151941E16",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.869
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 791,
"timestamp": "2026-01-05T21:07:00Z",
"transaction_amount_usd": 4812.44
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.593,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2462.49,
"financial_exposure_usd": 3674.01,
"recoverable_pct": 0.652
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102166",
"label": "fraudulent",
"label_confidence": 0.845,
"severity": "high",
"timestamp": "2026-01-02T12:06:00Z",
"trace_id": "8cb8f5e7-a67f-0b39-ee62-a85df550b9ef"
} | {
"account_age_days": 1906,
"account_id": "ACCT-743A6F09DD7D",
"baseline_risk_score": 0.458,
"kyc_tier": "tier_1",
"session_entropy": 0.837
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 430,
"timestamp": "2026-01-02T12:06:00Z",
"transaction_amount_usd": 43449.3
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.598,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 365342.05,
"financial_exposure_usd": 563552.74,
"recoverable_pct": 0.801
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104479",
"label": "fraudulent",
"label_confidence": 0.797,
"severity": "high",
"timestamp": "2026-01-04T02:39:00Z",
"trace_id": "378a35c3-3e57-fb00-0015-d52d4d399d41"
} | {
"account_age_days": 1578,
"account_id": "ACCT-41055882BDEB",
"baseline_risk_score": 0.195,
"kyc_tier": "tier_3",
"session_entropy": 0.778
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 365,
"timestamp": "2026-01-03T21:38:00Z",
"transaction_amount_usd": 14.21
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.542,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3530402.09,
"financial_exposure_usd": 4301522.81,
"recoverable_pct": 0.466
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103030",
"label": "fraudulent",
"label_confidence": 0.763,
"severity": "low",
"timestamp": "2026-01-03T02:30:00Z",
"trace_id": "611681c9-d12b-bf94-09e0-f40d38033617"
} | {
"account_age_days": 494,
"account_id": "ACCT-DED16110C957",
"baseline_risk_score": 0.312,
"kyc_tier": "tier_3",
"session_entropy": 0.172
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 873,
"timestamp": "2026-01-03T02:30:00Z",
"transaction_amount_usd": 83958.98
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.7,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING ... | {
"customer_funds_at_risk_usd": 155254.06,
"financial_exposure_usd": 188860.49,
"recoverable_pct": 0.838
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108308",
"label": "benign",
"label_confidence": 0.5,
"severity": "medium",
"timestamp": "2026-01-06T18:28:00Z",
"trace_id": "0a416851-9169-f672-8459-9aaeb1b4344e"
} | {
"account_age_days": 906,
"account_id": "ACCT-9D9B36B8EF7C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.325
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 274,
"timestamp": "2026-01-06T07:28:00Z",
"transaction_amount_usd": 18.14
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.788,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1102.96,
"financial_exposure_usd": 2236.37,
"recoverable_pct": 0.606
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104866",
"label": "fraudulent",
"label_confidence": 0.874,
"severity": "low",
"timestamp": "2026-01-04T09:06:00Z",
"trace_id": "0e857468-100c-6668-a783-8e3ee12bbdf9"
} | {
"account_age_days": 1959,
"account_id": "ACCT-A0887C8F2ADD",
"baseline_risk_score": 0.132,
"kyc_tier": "tier_1",
"session_entropy": 0.175
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 696,
"timestamp": "2026-01-04T09:06:00Z",
"transaction_amount_usd": 2583320.68
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.932,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3955909.79,
"financial_exposure_usd": 6060588.83,
"recoverable_pct": 0.721
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109481",
"label": "benign",
"label_confidence": 0.605,
"severity": "medium",
"timestamp": "2026-01-07T14:01:00Z",
"trace_id": "5e2ede75-b073-2f8d-3e27-4075201330e4"
} | {
"account_age_days": 870,
"account_id": "ACCT-EAFDAE1C8A22",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.48
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 528,
"timestamp": "2026-01-07T14:01:00Z",
"transaction_amount_usd": 7014.95
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.506,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1956.12,
"financial_exposure_usd": 2089.58,
"recoverable_pct": 0.429
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103499",
"label": "fraudulent",
"label_confidence": 0.64,
"severity": "high",
"timestamp": "2026-01-03T10:19:00Z",
"trace_id": "3ac27ae8-3657-271e-63e8-feb10d33d521"
} | {
"account_age_days": 1703,
"account_id": "ACCT-3CB6EB0A06CF",
"baseline_risk_score": 0.147,
"kyc_tier": "tier_3",
"session_entropy": 0.929
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 325,
"timestamp": "2026-01-03T02:10:00Z",
"transaction_amount_usd": 23.01
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.614,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3355763.21,
"financial_exposure_usd": 5490289.44,
"recoverable_pct": 0.98
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103137",
"label": "fraudulent",
"label_confidence": 0.948,
"severity": "low",
"timestamp": "2026-01-03T04:17:00Z",
"trace_id": "32634e42-304d-7cee-d45d-55cc3ca2fd73"
} | {
"account_age_days": 601,
"account_id": "ACCT-39A2B5FB971C",
"baseline_risk_score": 0.426,
"kyc_tier": "tier_3",
"session_entropy": 0.114
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 781,
"timestamp": "2026-01-03T04:17:00Z",
"transaction_amount_usd": 103670.96
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.624,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 42196.81,
"financial_exposure_usd": 103684.88,
"recoverable_pct": 0.132
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103197",
"label": "fraudulent",
"label_confidence": 0.865,
"severity": "low",
"timestamp": "2026-01-03T05:17:00Z",
"trace_id": "12cdc6c4-c08b-074c-20fd-015dfb973ed4"
} | {
"account_age_days": 306,
"account_id": "ACCT-5E4199332717",
"baseline_risk_score": 0.329,
"kyc_tier": "tier_1",
"session_entropy": 0.31
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 951,
"timestamp": "2026-01-03T05:17:00Z",
"transaction_amount_usd": 6920.8
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.879,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 194524.74,
"financial_exposure_usd": 274172.94,
"recoverable_pct": 0.502
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100672",
"label": "fraudulent",
"label_confidence": 0.872,
"severity": "low",
"timestamp": "2026-01-01T11:12:00Z",
"trace_id": "e3a8be79-c364-20ef-f5a6-5283eacabeff"
} | {
"account_age_days": 90,
"account_id": "ACCT-C5788B389ACF",
"baseline_risk_score": 0.39,
"kyc_tier": "tier_2",
"session_entropy": 0.95
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 149,
"timestamp": "2026-01-01T01:27:00Z",
"transaction_amount_usd": 8.85
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.359,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 894700.34,
"financial_exposure_usd": 1290324.48,
"recoverable_pct": 0.756
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108350",
"label": "benign",
"label_confidence": 0.678,
"severity": "medium",
"timestamp": "2026-01-06T19:10:00Z",
"trace_id": "8756f735-e4fc-efa0-8763-a332d1cf69a2"
} | {
"account_age_days": 42,
"account_id": "ACCT-AD4628850681",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.563
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 522,
"timestamp": "2026-01-06T19:10:00Z",
"transaction_amount_usd": 2093.38
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.508,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 951.04,
"financial_exposure_usd": 2052.53,
"recoverable_pct": 0.71
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106039",
"label": "fraudulent",
"label_confidence": 0.944,
"severity": "medium",
"timestamp": "2026-01-05T04:39:00Z",
"trace_id": "4fd549ab-40c5-d7d5-272a-a0c0c3be6154"
} | {
"account_age_days": 847,
"account_id": "ACCT-531155CC3F53",
"baseline_risk_score": 0.175,
"kyc_tier": "tier_2",
"session_entropy": 0.496
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 384,
"timestamp": "2026-01-05T04:39:00Z",
"transaction_amount_usd": 525315.15
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.579,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2353311.16,
"financial_exposure_usd": 4896980.78,
"recoverable_pct": 0.699
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108170",
"label": "benign",
"label_confidence": 0.504,
"severity": "critical",
"timestamp": "2026-01-06T16:10:00Z",
"trace_id": "d89e9a0c-3b4c-8043-9031-7a1f32d1db85"
} | {
"account_age_days": 757,
"account_id": "ACCT-0716F2C53816",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.889
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 793,
"timestamp": "2026-01-06T16:10:00Z",
"transaction_amount_usd": 2647.29
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.636,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3717.14,
"financial_exposure_usd": 5474.61,
"recoverable_pct": 0.534
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108023",
"label": "benign",
"label_confidence": 0.616,
"severity": "medium",
"timestamp": "2026-01-06T13:43:00Z",
"trace_id": "78b5ab1c-473d-a49c-88ba-68ebe79f8c05"
} | {
"account_age_days": 225,
"account_id": "ACCT-962877C86088",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.595
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 186,
"timestamp": "2026-01-06T13:43:00Z",
"transaction_amount_usd": 4435.45
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.584,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 3",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 390.74,
"financial_exposure_usd": 578.73,
"recoverable_pct": 0.599
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100513",
"label": "fraudulent",
"label_confidence": 0.86,
"severity": "critical",
"timestamp": "2026-01-01T08:33:00Z",
"trace_id": "2559506f-ca69-6526-c810-88d8939806fa"
} | {
"account_age_days": 543,
"account_id": "ACCT-41650E8AA39F",
"baseline_risk_score": 0.505,
"kyc_tier": "tier_1",
"session_entropy": 0.9
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "FR",
"latency_ms": 1084,
"timestamp": "2026-01-01T08:33:00Z",
"transaction_amount_usd": 78166.21
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.899,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 144704.56,
"financial_exposure_usd": 212758.5,
"recoverable_pct": 0.312
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108556",
"label": "benign",
"label_confidence": 0.686,
"severity": "medium",
"timestamp": "2026-01-06T22:36:00Z",
"trace_id": "d93733a8-0705-f92f-7b3a-e75ca607db23"
} | {
"account_age_days": 1122,
"account_id": "ACCT-722C4B2373FF",
"baseline_risk_score": 0.19,
"kyc_tier": "tier_3",
"session_entropy": 0.495
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 102,
"timestamp": "2026-01-06T12:09:00Z",
"transaction_amount_usd": 11.29
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.726,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1553.13,
"financial_exposure_usd": 1658.56,
"recoverable_pct": 0.759
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104082",
"label": "fraudulent",
"label_confidence": 0.901,
"severity": "medium",
"timestamp": "2026-01-03T20:02:00Z",
"trace_id": "93f5c7e8-f6fd-6a89-b8d1-46ab463485c1"
} | {
"account_age_days": 1036,
"account_id": "ACCT-983F8AE90678",
"baseline_risk_score": 0.066,
"kyc_tier": "tier_2",
"session_entropy": 0.459
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 485,
"timestamp": "2026-01-03T20:02:00Z",
"transaction_amount_usd": 1183028.65
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.615,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3910815.57,
"financial_exposure_usd": 6319618.05,
"recoverable_pct": 0.814
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107996",
"label": "benign",
"label_confidence": 0.561,
"severity": "medium",
"timestamp": "2026-01-06T13:16:00Z",
"trace_id": "2c16322e-58d1-284c-7b8d-7e081eae816b"
} | {
"account_age_days": 1699,
"account_id": "ACCT-8195037A382C",
"baseline_risk_score": 0.071,
"kyc_tier": "tier_3",
"session_entropy": 0.458
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 999,
"timestamp": "2026-01-06T13:16:00Z",
"transaction_amount_usd": 539.75
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.759,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1418,
"financial_exposure_usd": 1745.11,
"recoverable_pct": 0.651
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107112",
"label": "benign",
"label_confidence": 0.5,
"severity": "low",
"timestamp": "2026-01-05T22:32:00Z",
"trace_id": "54deaf4e-c247-c8a9-7cd0-9c9124f2a5c5"
} | {
"account_age_days": 1083,
"account_id": "ACCT-90751342DE7E",
"baseline_risk_score": 0.073,
"kyc_tier": "tier_1",
"session_entropy": 0.419
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 215,
"timestamp": "2026-01-05T16:08:00Z",
"transaction_amount_usd": 10.59
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.762,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 0, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 0,
"financial_exposure_usd": 0,
"recoverable_pct": 0.594
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100637",
"label": "fraudulent",
"label_confidence": 0.956,
"severity": "low",
"timestamp": "2026-01-01T10:37:00Z",
"trace_id": "4e23b921-a239-5979-a796-1377d786cfdd"
} | {
"account_age_days": 1221,
"account_id": "ACCT-91186AF41A2F",
"baseline_risk_score": 0.281,
"kyc_tier": "tier_2",
"session_entropy": 0.159
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "FR",
"latency_ms": 1024,
"timestamp": "2026-01-01T10:37:00Z",
"transaction_amount_usd": 61567.68
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.822,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 425880.65,
"financial_exposure_usd": 632025.56,
"recoverable_pct": 0.84
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106690",
"label": "benign",
"label_confidence": 0.637,
"severity": "low",
"timestamp": "2026-01-05T15:30:00Z",
"trace_id": "8f109534-3909-719a-b0e2-f0154cde80c1"
} | {
"account_age_days": 539,
"account_id": "ACCT-8A082B217249",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.817
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 729,
"timestamp": "2026-01-05T15:30:00Z",
"transaction_amount_usd": 9409.98
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.779,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2161.74,
"financial_exposure_usd": 3283.19,
"recoverable_pct": 0.766
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105640",
"label": "fraudulent",
"label_confidence": 0.631,
"severity": "medium",
"timestamp": "2026-01-04T22:00:00Z",
"trace_id": "4802694d-9e4c-b524-9b7d-df33cb2f6ef0"
} | {
"account_age_days": 1758,
"account_id": "ACCT-01569C3FA0A5",
"baseline_risk_score": 0.25,
"kyc_tier": "tier_2",
"session_entropy": 0.622
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 89,
"timestamp": "2026-01-04T21:04:00Z",
"transaction_amount_usd": 18.29
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.781,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1468818.87,
"financial_exposure_usd": 3255010.97,
"recoverable_pct": 0.421
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103107",
"label": "fraudulent",
"label_confidence": 0.938,
"severity": "low",
"timestamp": "2026-01-03T03:47:00Z",
"trace_id": "b44f23f0-bb7d-d4ad-f7ed-9c0b97a6ff2f"
} | {
"account_age_days": 1179,
"account_id": "ACCT-ED154F425ABB",
"baseline_risk_score": 0.316,
"kyc_tier": "tier_3",
"session_entropy": 0.737
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CA",
"latency_ms": 145,
"timestamp": "2026-01-03T03:47:00Z",
"transaction_amount_usd": 30074.27
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.87,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 596694.86,
"financial_exposure_usd": 666853.71,
"recoverable_pct": 0.096
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109469",
"label": "benign",
"label_confidence": 0.651,
"severity": "high",
"timestamp": "2026-01-07T13:49:00Z",
"trace_id": "990bb3b6-848c-5fa0-11f4-4e5a9f2289f4"
} | {
"account_age_days": 1498,
"account_id": "ACCT-5913EB6FAF4F",
"baseline_risk_score": 0.086,
"kyc_tier": "tier_3",
"session_entropy": 0.291
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 930,
"timestamp": "2026-01-07T13:49:00Z",
"transaction_amount_usd": 14928.69
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.681,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 5238.75,
"financial_exposure_usd": 5440.82,
"recoverable_pct": 0.618
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103535",
"label": "fraudulent",
"label_confidence": 0.647,
"severity": "low",
"timestamp": "2026-01-03T10:55:00Z",
"trace_id": "e0673d16-fc80-9e92-87b8-5ce3d1b88b0a"
} | {
"account_age_days": 1169,
"account_id": "ACCT-0872B4EEA7E6",
"baseline_risk_score": 0.098,
"kyc_tier": "tier_3",
"session_entropy": 0.877
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 1064,
"timestamp": "2026-01-03T10:55:00Z",
"transaction_amount_usd": 2463530.84
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.757,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5589360.36,
"financial_exposure_usd": 7155134.68,
"recoverable_pct": 0.615
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108055",
"label": "benign",
"label_confidence": 0.655,
"severity": "high",
"timestamp": "2026-01-06T14:15:00Z",
"trace_id": "f3d27cfd-6591-1b66-549a-8bafdbf84a15"
} | {
"account_age_days": 1976,
"account_id": "ACCT-03E1288DB6C9",
"baseline_risk_score": 0.135,
"kyc_tier": "tier_3",
"session_entropy": 0.224
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 312,
"timestamp": "2026-01-06T04:09:00Z",
"transaction_amount_usd": 18.86
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.777,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1173.06,
"financial_exposure_usd": 2457,
"recoverable_pct": 0.556
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100842",
"label": "fraudulent",
"label_confidence": 0.93,
"severity": "high",
"timestamp": "2026-01-01T14:02:00Z",
"trace_id": "28a1b392-4090-3884-235f-1935f53fa0dd"
} | {
"account_age_days": 879,
"account_id": "ACCT-7351FDB2AB36",
"baseline_risk_score": 0.537,
"kyc_tier": "tier_2",
"session_entropy": 0.123
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 208,
"timestamp": "2026-01-01T05:54:00Z",
"transaction_amount_usd": 1.96
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.558,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 354940.58,
"financial_exposure_usd": 768072.14,
"recoverable_pct": 0.364
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102575",
"label": "fraudulent",
"label_confidence": 0.95,
"severity": "critical",
"timestamp": "2026-01-02T18:55:00Z",
"trace_id": "f7dd0c82-b7e4-a0e9-d96f-eab6401774b5"
} | {
"account_age_days": 673,
"account_id": "ACCT-E25769FFB742",
"baseline_risk_score": 0.607,
"kyc_tier": "tier_3",
"session_entropy": 0.471
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 241,
"timestamp": "2026-01-02T07:29:00Z",
"transaction_amount_usd": 5.31
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.651,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 658045.66,
"financial_exposure_usd": 998629.99,
"recoverable_pct": 0.031
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102724",
"label": "fraudulent",
"label_confidence": 0.976,
"severity": "high",
"timestamp": "2026-01-02T21:24:00Z",
"trace_id": "d05e2af3-04cf-5d8b-a325-da8dd7de79ff"
} | {
"account_age_days": 146,
"account_id": "ACCT-4AB9055FFF5E",
"baseline_risk_score": 0.33,
"kyc_tier": "tier_1",
"session_entropy": 0.433
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "BR",
"latency_ms": 1048,
"timestamp": "2026-01-02T21:24:00Z",
"transaction_amount_usd": 58681.96
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.68,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 708521.23,
"financial_exposure_usd": 1196910.93,
"recoverable_pct": 0.341
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100965",
"label": "fraudulent",
"label_confidence": 0.957,
"severity": "high",
"timestamp": "2026-01-01T16:05:00Z",
"trace_id": "1d43a586-504d-b123-8b36-5373f079b5d3"
} | {
"account_age_days": 1301,
"account_id": "ACCT-01F0BD18C8E8",
"baseline_risk_score": 0.403,
"kyc_tier": "tier_2",
"session_entropy": 0.25
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 1093,
"timestamp": "2026-01-01T16:05:00Z",
"transaction_amount_usd": 75279.21
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.922,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 539158.77,
"financial_exposure_usd": 596754.59,
"recoverable_pct": 0.178
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108250",
"label": "benign",
"label_confidence": 0.483,
"severity": "medium",
"timestamp": "2026-01-06T17:30:00Z",
"trace_id": "f9476eb9-571b-3649-c9e3-4a977e178032"
} | {
"account_age_days": 889,
"account_id": "ACCT-630BCA420DCE",
"baseline_risk_score": 0.059,
"kyc_tier": "tier_1",
"session_entropy": 0.508
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 399,
"timestamp": "2026-01-06T16:06:00Z",
"transaction_amount_usd": 14
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.479,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2301.24,
"financial_exposure_usd": 3102.76,
"recoverable_pct": 0.56
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108192",
"label": "benign",
"label_confidence": 0.728,
"severity": "low",
"timestamp": "2026-01-06T16:32:00Z",
"trace_id": "86557914-0c11-9033-a653-a534a21ddc9a"
} | {
"account_age_days": 691,
"account_id": "ACCT-8B3499A938BD",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.667
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 589,
"timestamp": "2026-01-06T16:32:00Z",
"transaction_amount_usd": 3172.47
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.718,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 4429.52,
"financial_exposure_usd": 5939.74,
"recoverable_pct": 0.749
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108498",
"label": "benign",
"label_confidence": 0.61,
"severity": "medium",
"timestamp": "2026-01-06T21:38:00Z",
"trace_id": "54e7dbc3-ef07-6977-d6a2-c9b6d5a6969d"
} | {
"account_age_days": 982,
"account_id": "ACCT-2645A728B7EE",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.197
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 152,
"timestamp": "2026-01-06T10:54:00Z",
"transaction_amount_usd": 16.69
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.54,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 5810.71,
"financial_exposure_usd": 6070.94,
"recoverable_pct": 0.93
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101431",
"label": "fraudulent",
"label_confidence": 0.883,
"severity": "critical",
"timestamp": "2026-01-01T23:51:00Z",
"trace_id": "15186e2b-a13c-ed9d-4d1a-80af1c71bd90"
} | {
"account_age_days": 1664,
"account_id": "ACCT-5BAD287F59BB",
"baseline_risk_score": 0.27,
"kyc_tier": "tier_3",
"session_entropy": 0.707
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 897,
"timestamp": "2026-01-01T23:51:00Z",
"transaction_amount_usd": 76264.45
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.828,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 276771.12,
"financial_exposure_usd": 430372.94,
"recoverable_pct": 0.84
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107644",
"label": "benign",
"label_confidence": 0.691,
"severity": "medium",
"timestamp": "2026-01-06T07:24:00Z",
"trace_id": "6b028b8e-41a8-edbd-eb49-8dafe69d25b9"
} | {
"account_age_days": 1737,
"account_id": "ACCT-54AE698AEF15",
"baseline_risk_score": 0.11,
"kyc_tier": "tier_2",
"session_entropy": 0.392
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 531,
"timestamp": "2026-01-06T07:24:00Z",
"transaction_amount_usd": 6515.67
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.706,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3071.54,
"financial_exposure_usd": 4112.25,
"recoverable_pct": 0.438
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108537",
"label": "benign",
"label_confidence": 0.694,
"severity": "high",
"timestamp": "2026-01-06T22:17:00Z",
"trace_id": "41870d40-5b91-b3c5-61ec-49903dd318ab"
} | {
"account_age_days": 36,
"account_id": "ACCT-00DBF5849874",
"baseline_risk_score": 0.155,
"kyc_tier": "tier_3",
"session_entropy": 0.941
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 1182,
"timestamp": "2026-01-06T22:17:00Z",
"transaction_amount_usd": 1106.75
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.705,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 585.86,
"financial_exposure_usd": 658.13,
"recoverable_pct": 0.814
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108971",
"label": "benign",
"label_confidence": 0.734,
"severity": "low",
"timestamp": "2026-01-07T05:31:00Z",
"trace_id": "0519588b-a900-107f-3037-8614b7f35622"
} | {
"account_age_days": 1107,
"account_id": "ACCT-D0D8E7942924",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.306
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 350,
"timestamp": "2026-01-07T05:31:00Z",
"transaction_amount_usd": 11185.3
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.49,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 920.51,
"financial_exposure_usd": 1691.62,
"recoverable_pct": 0.818
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104873",
"label": "fraudulent",
"label_confidence": 0.797,
"severity": "medium",
"timestamp": "2026-01-04T09:13:00Z",
"trace_id": "13ca97c3-a4f3-6eba-38f3-64676121675e"
} | {
"account_age_days": 1514,
"account_id": "ACCT-3CC87C4C2E38",
"baseline_risk_score": 0.124,
"kyc_tier": "tier_2",
"session_entropy": 0.806
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 88,
"timestamp": "2026-01-04T01:55:00Z",
"transaction_amount_usd": 2.06
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.792,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3206014.39,
"financial_exposure_usd": 5362618.81,
"recoverable_pct": 0.986
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106226",
"label": "fraudulent",
"label_confidence": 0.853,
"severity": "medium",
"timestamp": "2026-01-05T07:46:00Z",
"trace_id": "ce589ee8-8493-6d57-1e82-ecbb0705c46d"
} | {
"account_age_days": 391,
"account_id": "ACCT-CA49FEEDDBEE",
"baseline_risk_score": 0.356,
"kyc_tier": "tier_1",
"session_entropy": 0.929
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 340,
"timestamp": "2026-01-05T07:46:00Z",
"transaction_amount_usd": 456848.45
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.581,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2644350.39,
"financial_exposure_usd": 2966261.61,
"recoverable_pct": 0.878
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109099",
"label": "benign",
"label_confidence": 0.721,
"severity": "medium",
"timestamp": "2026-01-07T07:39:00Z",
"trace_id": "bfcfdedd-28ed-7277-532b-c37159184df5"
} | {
"account_age_days": 1287,
"account_id": "ACCT-E122D7969176",
"baseline_risk_score": 0.107,
"kyc_tier": "tier_3",
"session_entropy": 0.606
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 153,
"timestamp": "2026-01-07T07:39:00Z",
"transaction_amount_usd": 1074.4
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.731,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1688.09,
"financial_exposure_usd": 2470.63,
"recoverable_pct": 0.476
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107676",
"label": "benign",
"label_confidence": 0.716,
"severity": "low",
"timestamp": "2026-01-06T07:56:00Z",
"trace_id": "e3673c92-d91e-57a9-ca4e-fa7121c18f9a"
} | {
"account_age_days": 437,
"account_id": "ACCT-DF1361F4197A",
"baseline_risk_score": 0.054,
"kyc_tier": "tier_1",
"session_entropy": 0.255
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 280,
"timestamp": "2026-01-06T06:39:00Z",
"transaction_amount_usd": 20.88
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.709,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2773.24,
"financial_exposure_usd": 4454.2,
"recoverable_pct": 0.73
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100190",
"label": "fraudulent",
"label_confidence": 0.882,
"severity": "critical",
"timestamp": "2026-01-01T03:10:00Z",
"trace_id": "a3beb445-0e5d-8626-19f7-f7750f2f633b"
} | {
"account_age_days": 1998,
"account_id": "ACCT-135769CBBC03",
"baseline_risk_score": 0.447,
"kyc_tier": "tier_3",
"session_entropy": 0.581
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 117,
"timestamp": "2025-12-31T20:38:00Z",
"transaction_amount_usd": 2.78
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.669,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 385365.49,
"financial_exposure_usd": 517717.24,
"recoverable_pct": 0.398
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107899",
"label": "benign",
"label_confidence": 0.639,
"severity": "low",
"timestamp": "2026-01-06T11:39:00Z",
"trace_id": "137cc0a7-6b94-fde2-f5c8-e18badd06368"
} | {
"account_age_days": 690,
"account_id": "ACCT-8017BF55CB72",
"baseline_risk_score": 0.063,
"kyc_tier": "tier_2",
"session_entropy": 0.176
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 664,
"timestamp": "2026-01-06T11:39:00Z",
"transaction_amount_usd": 8962.25
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.495,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 885.16,
"financial_exposure_usd": 2030.27,
"recoverable_pct": 0.468
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101618",
"label": "fraudulent",
"label_confidence": 0.861,
"severity": "high",
"timestamp": "2026-01-02T02:58:00Z",
"trace_id": "574cc14f-efb8-7fca-a6ed-c821e1184210"
} | {
"account_age_days": 1187,
"account_id": "ACCT-709267C7A84F",
"baseline_risk_score": 0.443,
"kyc_tier": "tier_2",
"session_entropy": 0.142
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 136,
"timestamp": "2026-01-01T18:58:00Z",
"transaction_amount_usd": 0.07
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.833,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 200859.71,
"financial_exposure_usd": 440983,
"recoverable_pct": 0.492
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108970",
"label": "benign",
"label_confidence": 0.674,
"severity": "medium",
"timestamp": "2026-01-07T05:30:00Z",
"trace_id": "881028d5-050b-f405-9fd4-8b1e456916b0"
} | {
"account_age_days": 856,
"account_id": "ACCT-1182B762D75C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.461
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 271,
"timestamp": "2026-01-06T19:26:00Z",
"transaction_amount_usd": 3.52
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.796,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1656.25,
"financial_exposure_usd": 4049.22,
"recoverable_pct": 0.409
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109071",
"label": "benign",
"label_confidence": 0.636,
"severity": "low",
"timestamp": "2026-01-07T07:11:00Z",
"trace_id": "fc18d39e-6f0e-7c36-b423-633945c6bd10"
} | {
"account_age_days": 591,
"account_id": "ACCT-074F10FE7C5F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.397
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 324,
"timestamp": "2026-01-07T07:11:00Z",
"transaction_amount_usd": 4527.95
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.694,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 527.17,
"financial_exposure_usd": 986.9,
"recoverable_pct": 0.833
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106204",
"label": "fraudulent",
"label_confidence": 0.779,
"severity": "high",
"timestamp": "2026-01-05T07:24:00Z",
"trace_id": "7543e34c-deaf-dc79-169c-1f2974acf25d"
} | {
"account_age_days": 69,
"account_id": "ACCT-42B8B1F6904C",
"baseline_risk_score": 0.239,
"kyc_tier": "tier_2",
"session_entropy": 0.941
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 212,
"timestamp": "2026-01-05T05:13:00Z",
"transaction_amount_usd": 7.88
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.638,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3206464.28,
"financial_exposure_usd": 5674472.19,
"recoverable_pct": 0.471
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109523",
"label": "benign",
"label_confidence": 0.534,
"severity": "high",
"timestamp": "2026-01-07T14:43:00Z",
"trace_id": "807c1247-116d-d6bd-ad4e-903338ac4f75"
} | {
"account_age_days": 50,
"account_id": "ACCT-D51F126A3A3E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.498
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 915,
"timestamp": "2026-01-07T14:43:00Z",
"transaction_amount_usd": 10697.11
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.71,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 3699.28,
"financial_exposure_usd": 6291.22,
"recoverable_pct": 0.916
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103765",
"label": "fraudulent",
"label_confidence": 0.824,
"severity": "medium",
"timestamp": "2026-01-03T14:45:00Z",
"trace_id": "c20095a1-0ddf-5b4c-6664-5b866075ef90"
} | {
"account_age_days": 375,
"account_id": "ACCT-653DFDF1BEC4",
"baseline_risk_score": 0.146,
"kyc_tier": "tier_1",
"session_entropy": 0.133
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 164,
"timestamp": "2026-01-03T08:28:00Z",
"transaction_amount_usd": 8.01
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.858,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3223835.03,
"financial_exposure_usd": 6010296.45,
"recoverable_pct": 0.727
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108512",
"label": "benign",
"label_confidence": 0.538,
"severity": "low",
"timestamp": "2026-01-06T21:52:00Z",
"trace_id": "69b78e89-d0a6-e747-becd-8a1b257356f4"
} | {
"account_age_days": 668,
"account_id": "ACCT-46040A94106E",
"baseline_risk_score": 0.165,
"kyc_tier": "tier_3",
"session_entropy": 0.208
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 1132,
"timestamp": "2026-01-06T21:52:00Z",
"transaction_amount_usd": 12409.98
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.555,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 946.34,
"financial_exposure_usd": 1033.69,
"recoverable_pct": 0.807
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101388",
"label": "fraudulent",
"label_confidence": 0.827,
"severity": "medium",
"timestamp": "2026-01-01T23:08:00Z",
"trace_id": "85b3bcb6-3d11-58d7-aa9b-6bb1d3aa7f3e"
} | {
"account_age_days": 1314,
"account_id": "ACCT-8EB1EFE4E25C",
"baseline_risk_score": 0.465,
"kyc_tier": "tier_3",
"session_entropy": 0.631
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "LU",
"latency_ms": 1091,
"timestamp": "2026-01-01T23:08:00Z",
"transaction_amount_usd": 26638.52
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.383,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 493071.12,
"financial_exposure_usd": 696763.26,
"recoverable_pct": 0.296
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107017",
"label": "benign",
"label_confidence": 0.541,
"severity": "medium",
"timestamp": "2026-01-05T20:57:00Z",
"trace_id": "5ba7fb60-e1c9-0a1c-9c0f-7a99b12362f7"
} | {
"account_age_days": 456,
"account_id": "ACCT-4CEA778FFAEE",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.569
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 213,
"timestamp": "2026-01-05T17:31:00Z",
"transaction_amount_usd": 3.94
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.788,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2353.15,
"financial_exposure_usd": 4342.51,
"recoverable_pct": 0.886
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108588",
"label": "benign",
"label_confidence": 0.626,
"severity": "medium",
"timestamp": "2026-01-06T23:08:00Z",
"trace_id": "44937dac-a4f5-b5f4-ec79-e5d0865175e3"
} | {
"account_age_days": 1599,
"account_id": "ACCT-D889E337FFBB",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.397
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 1077,
"timestamp": "2026-01-06T23:08:00Z",
"transaction_amount_usd": 1456.26
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.673,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2524.57,
"financial_exposure_usd": 5843.56,
"recoverable_pct": 0.494
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106612",
"label": "fraudulent",
"label_confidence": 0.739,
"severity": "low",
"timestamp": "2026-01-05T14:12:00Z",
"trace_id": "1625a345-d257-996f-bc6a-ae71366c62f7"
} | {
"account_age_days": 1133,
"account_id": "ACCT-FBB08D9E2A97",
"baseline_risk_score": 0.423,
"kyc_tier": "tier_3",
"session_entropy": 0.503
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 405,
"timestamp": "2026-01-05T14:12:00Z",
"transaction_amount_usd": 2012472.31
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.874,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2620250.48,
"financial_exposure_usd": 2824148.17,
"recoverable_pct": 0.928
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106726",
"label": "benign",
"label_confidence": 0.517,
"severity": "low",
"timestamp": "2026-01-05T16:06:00Z",
"trace_id": "be6d1c02-10b3-b2c0-09be-8debbb6745e0"
} | {
"account_age_days": 1994,
"account_id": "ACCT-6C43594DFBCA",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.949
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 800,
"timestamp": "2026-01-05T16:06:00Z",
"transaction_amount_usd": 6812.28
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.734,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 997.29,
"financial_exposure_usd": 1177.18,
"recoverable_pct": 0.77
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106224",
"label": "fraudulent",
"label_confidence": 0.885,
"severity": "low",
"timestamp": "2026-01-05T07:44:00Z",
"trace_id": "3a9aaa5a-2fae-e895-6667-07e5f4668f19"
} | {
"account_age_days": 1928,
"account_id": "ACCT-862B4EF5C603",
"baseline_risk_score": 0.121,
"kyc_tier": "tier_1",
"session_entropy": 0.42
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 207,
"timestamp": "2026-01-05T07:44:00Z",
"transaction_amount_usd": 2904978.72
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.865,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3104147.44,
"financial_exposure_usd": 4586171.13,
"recoverable_pct": 0.824
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105680",
"label": "fraudulent",
"label_confidence": 0.778,
"severity": "medium",
"timestamp": "2026-01-04T22:40:00Z",
"trace_id": "40d4b78e-af95-e3c7-fc41-74305e6dbef5"
} | {
"account_age_days": 657,
"account_id": "ACCT-60D512E41B88",
"baseline_risk_score": 0.259,
"kyc_tier": "tier_3",
"session_entropy": 0.585
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 220,
"timestamp": "2026-01-04T22:40:00Z",
"transaction_amount_usd": 2990740.64
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.779,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2849318.11,
"financial_exposure_usd": 4751962.93,
"recoverable_pct": 0.429
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101025",
"label": "fraudulent",
"label_confidence": 0.796,
"severity": "medium",
"timestamp": "2026-01-01T17:05:00Z",
"trace_id": "c0a62a72-f9a7-7656-9d51-2836691c5f38"
} | {
"account_age_days": 39,
"account_id": "ACCT-76B0BF1A7C5E",
"baseline_risk_score": 0.357,
"kyc_tier": "tier_3",
"session_entropy": 0.58
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 1038,
"timestamp": "2026-01-01T17:05:00Z",
"transaction_amount_usd": 65600.8
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.732,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 818219.94,
"financial_exposure_usd": 864302.76,
"recoverable_pct": 0.714
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103984",
"label": "fraudulent",
"label_confidence": 0.86,
"severity": "high",
"timestamp": "2026-01-03T18:24:00Z",
"trace_id": "dcc6a439-b1fa-c62c-dc44-17e23a122639"
} | {
"account_age_days": 1063,
"account_id": "ACCT-133D233DD8A2",
"baseline_risk_score": 0.27,
"kyc_tier": "tier_3",
"session_entropy": 0.453
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 348,
"timestamp": "2026-01-03T18:24:00Z",
"transaction_amount_usd": 405894.18
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.673,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1511624,
"financial_exposure_usd": 3466343.97,
"recoverable_pct": 0.504
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100051",
"label": "fraudulent",
"label_confidence": 0.918,
"severity": "critical",
"timestamp": "2026-01-01T00:51:00Z",
"trace_id": "65b90e94-8e6d-e263-635a-775d16476e3f"
} | {
"account_age_days": 1873,
"account_id": "ACCT-301C8DB316DB",
"baseline_risk_score": 0.378,
"kyc_tier": "tier_2",
"session_entropy": 0.475
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 1150,
"timestamp": "2026-01-01T00:51:00Z",
"transaction_amount_usd": 33506
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.806,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 949459.55,
"financial_exposure_usd": 1063688.61,
"recoverable_pct": 0.438
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105343",
"label": "fraudulent",
"label_confidence": 0.754,
"severity": "high",
"timestamp": "2026-01-04T17:03:00Z",
"trace_id": "505d5610-21e4-6c70-fd47-ab4ebeef20ef"
} | {
"account_age_days": 579,
"account_id": "ACCT-85618247C2DF",
"baseline_risk_score": 0.37,
"kyc_tier": "tier_3",
"session_entropy": 0.691
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 570,
"timestamp": "2026-01-04T17:03:00Z",
"transaction_amount_usd": 705757.6
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.45,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 1326661.49,
"financial_exposure_usd": 1698709.37,
"recoverable_pct": 0.707
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103100",
"label": "fraudulent",
"label_confidence": 0.953,
"severity": "high",
"timestamp": "2026-01-03T03:40:00Z",
"trace_id": "8db72f70-bcee-ac1a-c2bb-68189a68a8f2"
} | {
"account_age_days": 1383,
"account_id": "ACCT-F5EE71E7FA74",
"baseline_risk_score": 0.255,
"kyc_tier": "tier_1",
"session_entropy": 0.536
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 288,
"timestamp": "2026-01-03T02:08:00Z",
"transaction_amount_usd": 13.5
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.88,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 55110.2,
"financial_exposure_usd": 108820.57,
"recoverable_pct": 0.182
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103023",
"label": "fraudulent",
"label_confidence": 0.959,
"severity": "medium",
"timestamp": "2026-01-03T02:23:00Z",
"trace_id": "85ee2b95-d300-c25b-0316-8c139109c2e0"
} | {
"account_age_days": 37,
"account_id": "ACCT-E7AF207AC6F4",
"baseline_risk_score": 0.352,
"kyc_tier": "tier_1",
"session_entropy": 0.297
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 959,
"timestamp": "2026-01-03T02:23:00Z",
"transaction_amount_usd": 77587.24
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.455,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 3",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 111407.87,
"financial_exposure_usd": 226702.36,
"recoverable_pct": 0.203
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100839",
"label": "fraudulent",
"label_confidence": 0.767,
"severity": "critical",
"timestamp": "2026-01-01T13:59:00Z",
"trace_id": "b0b4821b-0604-844f-3181-b56b67fafcda"
} | {
"account_age_days": 1924,
"account_id": "ACCT-F290A3070A0E",
"baseline_risk_score": 0.544,
"kyc_tier": "tier_1",
"session_entropy": 0.854
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 761,
"timestamp": "2026-01-01T13:59:00Z",
"transaction_amount_usd": 28307.04
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.442,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 787710.32,
"financial_exposure_usd": 1007058.7,
"recoverable_pct": 0.343
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105798",
"label": "fraudulent",
"label_confidence": 0.873,
"severity": "high",
"timestamp": "2026-01-05T00:38:00Z",
"trace_id": "2b5c2213-92f8-5042-b8db-496e03feb734"
} | {
"account_age_days": 1229,
"account_id": "ACCT-1E6C969901FE",
"baseline_risk_score": 0.437,
"kyc_tier": "tier_1",
"session_entropy": 0.447
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 213,
"timestamp": "2026-01-04T14:47:00Z",
"transaction_amount_usd": 8.11
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.491,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2943670.72,
"financial_exposure_usd": 6723458.26,
"recoverable_pct": 0.563
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103158",
"label": "fraudulent",
"label_confidence": 0.86,
"severity": "critical",
"timestamp": "2026-01-03T04:38:00Z",
"trace_id": "9f176b2d-085f-524d-6f63-69bfc1255ce0"
} | {
"account_age_days": 402,
"account_id": "ACCT-CD129FFAA5D0",
"baseline_risk_score": 0.579,
"kyc_tier": "tier_2",
"session_entropy": 0.359
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 328,
"timestamp": "2026-01-03T01:23:00Z",
"transaction_amount_usd": 13.33
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.633,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 170752.74,
"financial_exposure_usd": 400811.2,
"recoverable_pct": 0.064
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104862",
"label": "fraudulent",
"label_confidence": 0.607,
"severity": "critical",
"timestamp": "2026-01-04T09:02:00Z",
"trace_id": "caa7cf3e-a122-7ad8-c0e2-bee3161971ec"
} | {
"account_age_days": 1411,
"account_id": "ACCT-1D9918313F1A",
"baseline_risk_score": 0.127,
"kyc_tier": "tier_2",
"session_entropy": 0.528
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 436,
"timestamp": "2026-01-04T09:02:00Z",
"transaction_amount_usd": 853148.85
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.484,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 7091991.52,
"financial_exposure_usd": 7668863.69,
"recoverable_pct": 0.87
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106706",
"label": "benign",
"label_confidence": 0.526,
"severity": "low",
"timestamp": "2026-01-05T15:46:00Z",
"trace_id": "b0696771-5b53-5460-1bcc-25135b2d06f2"
} | {
"account_age_days": 1013,
"account_id": "ACCT-3A15E4E04EE6",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.386
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 206,
"timestamp": "2026-01-05T15:46:00Z",
"transaction_amount_usd": 10285.8
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.667,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 633,
"financial_exposure_usd": 1023.42,
"recoverable_pct": 0.537
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100067",
"label": "fraudulent",
"label_confidence": 0.961,
"severity": "low",
"timestamp": "2026-01-01T01:07:00Z",
"trace_id": "8222cd7f-36e6-ba85-19ab-dc15296b67bf"
} | {
"account_age_days": 1196,
"account_id": "ACCT-D46B7756B9E4",
"baseline_risk_score": 0.531,
"kyc_tier": "tier_2",
"session_entropy": 0.575
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CA",
"latency_ms": 90,
"timestamp": "2026-01-01T01:07:00Z",
"transaction_amount_usd": 96202.02
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.928,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 470070.1,
"financial_exposure_usd": 877360.98,
"recoverable_pct": 0.819
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101383",
"label": "fraudulent",
"label_confidence": 0.751,
"severity": "high",
"timestamp": "2026-01-01T23:03:00Z",
"trace_id": "26690681-0784-4018-3a82-b86bc68b73ac"
} | {
"account_age_days": 549,
"account_id": "ACCT-7EE991386032",
"baseline_risk_score": 0.597,
"kyc_tier": "tier_3",
"session_entropy": 0.325
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 760,
"timestamp": "2026-01-01T23:03:00Z",
"transaction_amount_usd": 113994.91
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.478,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 314876.81,
"financial_exposure_usd": 332080.43,
"recoverable_pct": 0.425
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101333",
"label": "fraudulent",
"label_confidence": 0.81,
"severity": "high",
"timestamp": "2026-01-01T22:13:00Z",
"trace_id": "7fe22b0c-444f-b671-d741-db96e284a8f9"
} | {
"account_age_days": 202,
"account_id": "ACCT-E4D5C51D4ED6",
"baseline_risk_score": 0.586,
"kyc_tier": "tier_3",
"session_entropy": 0.376
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 981,
"timestamp": "2026-01-01T22:13:00Z",
"transaction_amount_usd": 53928.7
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.762,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 243249.29,
"financial_exposure_usd": 320062.08,
"recoverable_pct": 0.647
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105998",
"label": "fraudulent",
"label_confidence": 0.854,
"severity": "medium",
"timestamp": "2026-01-05T03:58:00Z",
"trace_id": "c4380b2e-1315-ca25-dac7-aae07b3f75d6"
} | {
"account_age_days": 1723,
"account_id": "ACCT-C0CD5AF362C4",
"baseline_risk_score": 0.306,
"kyc_tier": "tier_1",
"session_entropy": 0.379
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 1036,
"timestamp": "2026-01-05T03:58:00Z",
"transaction_amount_usd": 2999898.68
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.756,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2778200.06,
"financial_exposure_usd": 5651174.39,
"recoverable_pct": 0.414
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100013",
"label": "fraudulent",
"label_confidence": 0.862,
"severity": "high",
"timestamp": "2026-01-01T00:13:00Z",
"trace_id": "4c6e27ff-b9de-7a3a-4868-22b900a81de9"
} | {
"account_age_days": 1404,
"account_id": "ACCT-118405AD9E11",
"baseline_risk_score": 0.605,
"kyc_tier": "tier_2",
"session_entropy": 0.3
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 786,
"timestamp": "2026-01-01T00:13:00Z",
"transaction_amount_usd": 79362.92
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.798,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 531086.13,
"financial_exposure_usd": 538079.75,
"recoverable_pct": 0.646
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104788",
"label": "fraudulent",
"label_confidence": 0.715,
"severity": "medium",
"timestamp": "2026-01-04T07:48:00Z",
"trace_id": "bdf461fb-cbe5-f0eb-7ca9-bb62f7160a35"
} | {
"account_age_days": 791,
"account_id": "ACCT-66E7E029928B",
"baseline_risk_score": 0.21,
"kyc_tier": "tier_3",
"session_entropy": 0.235
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 267,
"timestamp": "2026-01-03T23:33:00Z",
"transaction_amount_usd": 2.24
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.835,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3040065.12,
"financial_exposure_usd": 3125731.77,
"recoverable_pct": 0.635
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.