schema_version
stringclasses
1 value
event
dict
identity_context
dict
telemetry_stream
listlengths
6
9
vulnerability
dict
detection
dict
impact
dict
simulation
dict
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105416", "label": "fraudulent", "label_confidence": 0.916, "severity": "high", "timestamp": "2026-01-04T18:16:00Z", "trace_id": "b0384b24-f9e6-d23b-d10c-c5ce140a9002" }
{ "account_age_days": 37, "account_id": "ACCT-745E0CA86127", "baseline_risk_score": 0.429, "kyc_tier": "tier_3", "session_entropy": 0.692 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "CA", "latency_ms": 687, "timestamp": "2026-01-04T18:16:00Z", "transaction_amount_usd": 1468811.29 }, { "asset": "SOL", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.51, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN...
{ "customer_funds_at_risk_usd": 4568327.89, "financial_exposure_usd": 5299084.21, "recoverable_pct": 0.915 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105116", "label": "fraudulent", "label_confidence": 0.744, "severity": "high", "timestamp": "2026-01-04T13:16:00Z", "trace_id": "9145b44b-b88d-2008-ff22-04438aa8f92a" }
{ "account_age_days": 264, "account_id": "ACCT-95825C7BDECD", "baseline_risk_score": 0.254, "kyc_tier": "tier_3", "session_entropy": 0.821 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "MY", "latency_ms": 491, "timestamp": "2026-01-04T13:16:00Z", "transaction_amount_usd": 2540146.8 }, { "asset": "ETH", "burst_indicator": false, "event_name": "ORDER_BOOK_...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.826, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 2299548.06, "financial_exposure_usd": 2860135.18, "recoverable_pct": 0.774 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101596", "label": "fraudulent", "label_confidence": 0.846, "severity": "critical", "timestamp": "2026-01-02T02:36:00Z", "trace_id": "b1ca5526-342d-6320-cdf5-e7e260a7ef61" }
{ "account_age_days": 1126, "account_id": "ACCT-17A0308ED985", "baseline_risk_score": 0.336, "kyc_tier": "tier_3", "session_entropy": 0.251 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "VE", "latency_ms": 516, "timestamp": "2026-01-02T02:36:00Z", "transaction_amount_usd": 19722.49 }, { "asset": "GBP", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.594, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 4", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 517188.28, "financial_exposure_usd": 596162.93, "recoverable_pct": 0.691 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100823", "label": "fraudulent", "label_confidence": 0.947, "severity": "medium", "timestamp": "2026-01-01T13:43:00Z", "trace_id": "7c3772a1-aa46-8387-7a7b-5d94e6fbf0d7" }
{ "account_age_days": 1317, "account_id": "ACCT-A0EDA5422017", "baseline_risk_score": 0.279, "kyc_tier": "tier_2", "session_entropy": 0.623 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "LU", "latency_ms": 238, "timestamp": "2026-01-01T13:43:00Z", "transaction_amount_usd": 112921.1 }, { "asset": "USDT", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.378, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 294088.57, "financial_exposure_usd": 369198.81, "recoverable_pct": 0.363 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104400", "label": "fraudulent", "label_confidence": 0.767, "severity": "medium", "timestamp": "2026-01-04T01:20:00Z", "trace_id": "e795c348-6452-cc56-29b3-a8e61ed9590e" }
{ "account_age_days": 540, "account_id": "ACCT-E2CD9D861DED", "baseline_risk_score": 0.253, "kyc_tier": "tier_1", "session_entropy": 0.52 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "HK", "latency_ms": 861, "timestamp": "2026-01-04T01:20:00Z", "transaction_amount_usd": 987385.61 }, { "asset": "USDC", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.439, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 1440265.3, "financial_exposure_usd": 3297579.47, "recoverable_pct": 0.401 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105018", "label": "fraudulent", "label_confidence": 0.91, "severity": "critical", "timestamp": "2026-01-04T11:38:00Z", "trace_id": "516322ea-139f-271a-6b52-365fecea136b" }
{ "account_age_days": 791, "account_id": "ACCT-EAF1D29C2A38", "baseline_risk_score": 0.41, "kyc_tier": "tier_3", "session_entropy": 0.893 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "GB", "latency_ms": 166, "timestamp": "2026-01-04T11:38:00Z", "transaction_amount_usd": 1784701.73 }, { "asset": "ETH", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.752, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 685921.53, "financial_exposure_usd": 1350294.15, "recoverable_pct": 0.709 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104944", "label": "fraudulent", "label_confidence": 0.864, "severity": "medium", "timestamp": "2026-01-04T10:24:00Z", "trace_id": "3172b8de-700b-2415-5501-6a881a0847b8" }
{ "account_age_days": 713, "account_id": "ACCT-10A7553C8A67", "baseline_risk_score": 0.169, "kyc_tier": "tier_2", "session_entropy": 0.588 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "VE", "latency_ms": 254, "timestamp": "2026-01-04T10:24:00Z", "transaction_amount_usd": 1085704.76 }, { "asset": "USD", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.402, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 3054464.23, "financial_exposure_usd": 5565981.99, "recoverable_pct": 0.737 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105960", "label": "fraudulent", "label_confidence": 0.799, "severity": "high", "timestamp": "2026-01-05T03:20:00Z", "trace_id": "c9b92173-fa86-32e8-8b2e-422197f784ce" }
{ "account_age_days": 1959, "account_id": "ACCT-B0C31B1CCF9D", "baseline_risk_score": 0.418, "kyc_tier": "tier_2", "session_entropy": 0.581 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "NG", "latency_ms": 340, "timestamp": "2026-01-05T03:20:00Z", "transaction_amount_usd": 1108091.08 }, { "asset": "JPY", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.706, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 3763943.25, "financial_exposure_usd": 5001146.04, "recoverable_pct": 0.716 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102131", "label": "fraudulent", "label_confidence": 0.927, "severity": "critical", "timestamp": "2026-01-02T11:31:00Z", "trace_id": "fa4445d2-7bc9-7fa1-1d05-80c3e977f3ed" }
{ "account_age_days": 1278, "account_id": "ACCT-BC547BC9E2C5", "baseline_risk_score": 0.309, "kyc_tier": "tier_2", "session_entropy": 0.113 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "SG", "latency_ms": 381, "timestamp": "2026-01-02T10:06:00Z", "transaction_amount_usd": 8.05 }, { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "ge...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.67, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING...
{ "customer_funds_at_risk_usd": 977242.86, "financial_exposure_usd": 1296110.51, "recoverable_pct": 0.566 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104352", "label": "fraudulent", "label_confidence": 0.884, "severity": "medium", "timestamp": "2026-01-04T00:32:00Z", "trace_id": "8078ff06-a3f6-bef3-d8a5-6b551b0b1ac8" }
{ "account_age_days": 528, "account_id": "ACCT-8D3D2D3555A8", "baseline_risk_score": 0.206, "kyc_tier": "tier_2", "session_entropy": 0.412 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "HK", "latency_ms": 1075, "timestamp": "2026-01-04T00:32:00Z", "transaction_amount_usd": 55400.68 }, { "asset": "GBP", "burst_indicator": false, "event_name": "ORDER_BOOK_...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.561, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 1479590.71, "financial_exposure_usd": 2955141.28, "recoverable_pct": 0.891 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104421", "label": "fraudulent", "label_confidence": 0.82, "severity": "medium", "timestamp": "2026-01-04T01:41:00Z", "trace_id": "736df9ee-bda7-026c-7d85-8eb245783316" }
{ "account_age_days": 1838, "account_id": "ACCT-C8C4A3A121AF", "baseline_risk_score": 0.143, "kyc_tier": "tier_2", "session_entropy": 0.429 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "KY", "latency_ms": 578, "timestamp": "2026-01-04T01:41:00Z", "transaction_amount_usd": 2552088.15 }, { "asset": "USD", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.392, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 3203998.6, "financial_exposure_usd": 4979339.61, "recoverable_pct": 0.801 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107042", "label": "benign", "label_confidence": 0.641, "severity": "high", "timestamp": "2026-01-05T21:22:00Z", "trace_id": "4d1c40fc-d4ad-55b9-00e8-2c78e1049e69" }
{ "account_age_days": 1618, "account_id": "ACCT-A6EC72336D5D", "baseline_risk_score": 0.132, "kyc_tier": "tier_3", "session_entropy": 0.411 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "IT", "latency_ms": 760, "timestamp": "2026-01-05T21:22:00Z", "transaction_amount_usd": 11165.54 }, { "asset": "ETH", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.667, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 3414.97, "financial_exposure_usd": 3583.43, "recoverable_pct": 0.729 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104275", "label": "fraudulent", "label_confidence": 0.941, "severity": "medium", "timestamp": "2026-01-03T23:15:00Z", "trace_id": "83a548ba-5339-d38b-4ad0-36ac59de96d3" }
{ "account_age_days": 165, "account_id": "ACCT-6DB143719606", "baseline_risk_score": 0.073, "kyc_tier": "tier_1", "session_entropy": 0.548 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "LU", "latency_ms": 176, "timestamp": "2026-01-03T18:22:00Z", "transaction_amount_usd": 14.25 }, { "asset": "USDT", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTE...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.786, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 4395775.3, "financial_exposure_usd": 6208225.7, "recoverable_pct": 0.675 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102548", "label": "fraudulent", "label_confidence": 0.926, "severity": "medium", "timestamp": "2026-01-02T18:28:00Z", "trace_id": "cae9018a-2ef4-4bdc-1b4d-4def6d4fa46a" }
{ "account_age_days": 1771, "account_id": "ACCT-41F2EAC1B44C", "baseline_risk_score": 0.621, "kyc_tier": "tier_3", "session_entropy": 0.331 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CN", "latency_ms": 1053, "timestamp": "2026-01-02T18:28:00Z", "transaction_amount_usd": 3242.1 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.432, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 265208.34, "financial_exposure_usd": 651095.48, "recoverable_pct": 0.367 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101870", "label": "fraudulent", "label_confidence": 0.788, "severity": "critical", "timestamp": "2026-01-02T07:10:00Z", "trace_id": "88c9bab3-2615-37e3-be17-8c73e92b928d" }
{ "account_age_days": 1386, "account_id": "ACCT-DC8C0FCEA1FA", "baseline_risk_score": 0.253, "kyc_tier": "tier_2", "session_entropy": 0.256 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "NG", "latency_ms": 120, "timestamp": "2026-01-02T07:10:00Z", "transaction_amount_usd": 58225.95 }, { "asset": "SOL", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.667, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 695911.47, "financial_exposure_usd": 848479.65, "recoverable_pct": 0.021 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105618", "label": "fraudulent", "label_confidence": 0.609, "severity": "medium", "timestamp": "2026-01-04T21:38:00Z", "trace_id": "3f676a4b-33a2-cfbf-a764-7eb9915460cf" }
{ "account_age_days": 1402, "account_id": "ACCT-598F9533CC1D", "baseline_risk_score": 0.366, "kyc_tier": "tier_2", "session_entropy": 0.137 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "DE", "latency_ms": 151, "timestamp": "2026-01-04T17:25:00Z", "transaction_amount_usd": 15.32 }, { "asset": "GBP", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.351, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 1385890.11, "financial_exposure_usd": 2694993.74, "recoverable_pct": 0.663 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100933", "label": "fraudulent", "label_confidence": 0.939, "severity": "critical", "timestamp": "2026-01-01T15:33:00Z", "trace_id": "b1dbd7a7-0929-bf8b-2a17-9285eb940e28" }
{ "account_age_days": 1362, "account_id": "ACCT-D357058B685A", "baseline_risk_score": 0.615, "kyc_tier": "tier_1", "session_entropy": 0.821 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "BR", "latency_ms": 416, "timestamp": "2026-01-01T15:33:00Z", "transaction_amount_usd": 115972.09 }, { "asset": "USD", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.484, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 513554.75, "financial_exposure_usd": 556470.59, "recoverable_pct": 0.618 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107369", "label": "benign", "label_confidence": 0.73, "severity": "medium", "timestamp": "2026-01-06T02:49:00Z", "trace_id": "479a2eba-68b3-3d3d-8737-cb5d4e436154" }
{ "account_age_days": 1941, "account_id": "ACCT-547F33E9E8FA", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.576 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "GR", "latency_ms": 190, "timestamp": "2026-01-06T02:49:00Z", "transaction_amount_usd": 2655.64 }, { "asset": "ETH", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.654, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 248.98, "financial_exposure_usd": 366.45, "recoverable_pct": 0.434 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107731", "label": "benign", "label_confidence": 0.518, "severity": "high", "timestamp": "2026-01-06T08:51:00Z", "trace_id": "ca78cf2e-78c3-4a8a-ea85-c8101c074558" }
{ "account_age_days": 7, "account_id": "ACCT-7926C1D36C94", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.668 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "GR", "latency_ms": 702, "timestamp": "2026-01-06T08:51:00Z", "transaction_amount_usd": 6746.01 }, { "asset": "ETH", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.475, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 4133.04, "financial_exposure_usd": 5048.82, "recoverable_pct": 0.601 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106552", "label": "fraudulent", "label_confidence": 0.83, "severity": "low", "timestamp": "2026-01-05T13:12:00Z", "trace_id": "c4acff87-dcbc-d63f-8cd2-f49c43301b99" }
{ "account_age_days": 1601, "account_id": "ACCT-4F0E121731C5", "baseline_risk_score": 0.202, "kyc_tier": "tier_1", "session_entropy": 0.935 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "NG", "latency_ms": 838, "timestamp": "2026-01-05T13:12:00Z", "transaction_amount_usd": 1625841.07 }, { "asset": "EUR", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.817, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 3730232.59, "financial_exposure_usd": 5539655.06, "recoverable_pct": 0.851 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104387", "label": "fraudulent", "label_confidence": 0.698, "severity": "medium", "timestamp": "2026-01-04T01:07:00Z", "trace_id": "713a36a2-578f-6266-bf8b-fbfd77f0daa8" }
{ "account_age_days": 274, "account_id": "ACCT-E5F273D54493", "baseline_risk_score": 0.151, "kyc_tier": "tier_1", "session_entropy": 0.273 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "LU", "latency_ms": 216, "timestamp": "2026-01-04T01:07:00Z", "transaction_amount_usd": 1104887 }, { "asset": "SOL", "burst_indicator": false, "event_name": "ORDER_BOOK_IM...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.739, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 1133789.26, "financial_exposure_usd": 2499176.37, "recoverable_pct": 0.606 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107147", "label": "benign", "label_confidence": 0.512, "severity": "medium", "timestamp": "2026-01-05T23:07:00Z", "trace_id": "1d905f0e-b9b2-dd82-df04-023ef3b3484f" }
{ "account_age_days": 1372, "account_id": "ACCT-2640BF9112A0", "baseline_risk_score": 0.19, "kyc_tier": "tier_2", "session_entropy": 0.733 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "FR", "latency_ms": 154, "timestamp": "2026-01-05T19:03:00Z", "transaction_amount_usd": 3.28 }, { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.577, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 1477.13, "financial_exposure_usd": 3084.7, "recoverable_pct": 0.809 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102340", "label": "fraudulent", "label_confidence": 0.795, "severity": "critical", "timestamp": "2026-01-02T15:00:00Z", "trace_id": "9e5d4225-cbd6-7a52-5ea7-f39d31506829" }
{ "account_age_days": 301, "account_id": "ACCT-F1FBE7F5DDB5", "baseline_risk_score": 0.586, "kyc_tier": "tier_2", "session_entropy": 0.558 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "KY", "latency_ms": 549, "timestamp": "2026-01-02T15:00:00Z", "transaction_amount_usd": 55302.74 }, { "asset": "GBP", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.67, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV...
{ "customer_funds_at_risk_usd": 776649.38, "financial_exposure_usd": 778467.96, "recoverable_pct": 0.76 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100992", "label": "fraudulent", "label_confidence": 0.957, "severity": "medium", "timestamp": "2026-01-01T16:32:00Z", "trace_id": "3a90db29-70f0-c832-487b-3bfc80f5501a" }
{ "account_age_days": 888, "account_id": "ACCT-7E7E5C46CB86", "baseline_risk_score": 0.256, "kyc_tier": "tier_2", "session_entropy": 0.347 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "SG", "latency_ms": 504, "timestamp": "2026-01-01T16:32:00Z", "transaction_amount_usd": 49623.28 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.655, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 194125.4, "financial_exposure_usd": 473342.46, "recoverable_pct": 0.44 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101983", "label": "fraudulent", "label_confidence": 0.902, "severity": "high", "timestamp": "2026-01-02T09:03:00Z", "trace_id": "38c58ce3-3fb6-56a4-4717-a35a7c0be9a9" }
{ "account_age_days": 1630, "account_id": "ACCT-50DCDE75BA58", "baseline_risk_score": 0.3, "kyc_tier": "tier_1", "session_entropy": 0.702 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "NG", "latency_ms": 307, "timestamp": "2026-01-02T09:03:00Z", "transaction_amount_usd": 25661.04 }, { "asset": "GBP", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.76, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING...
{ "customer_funds_at_risk_usd": 968982.12, "financial_exposure_usd": 1443786.46, "recoverable_pct": 0.561 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103438", "label": "fraudulent", "label_confidence": 0.741, "severity": "medium", "timestamp": "2026-01-03T09:18:00Z", "trace_id": "05a8c9fc-5033-7a04-49f7-acc91711b8be" }
{ "account_age_days": 1818, "account_id": "ACCT-C83CC5C547DF", "baseline_risk_score": 0.299, "kyc_tier": "tier_2", "session_entropy": 0.924 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "BR", "latency_ms": 252, "timestamp": "2026-01-03T09:18:00Z", "transaction_amount_usd": 2373818.4 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOOK_...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.435, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 590036.58, "financial_exposure_usd": 910230.86, "recoverable_pct": 0.548 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104675", "label": "fraudulent", "label_confidence": 0.672, "severity": "high", "timestamp": "2026-01-04T05:55:00Z", "trace_id": "45d071b3-f9d4-b8ed-5bd5-611c0d43c71f" }
{ "account_age_days": 1872, "account_id": "ACCT-D1F537436574", "baseline_risk_score": 0.445, "kyc_tier": "tier_2", "session_entropy": 0.712 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "CN", "latency_ms": 322, "timestamp": "2026-01-03T18:59:00Z", "transaction_amount_usd": 12.24 }, { "asset": "SOL", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.674, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 7701319.34, "financial_exposure_usd": 9510827.85, "recoverable_pct": 0.809 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100479", "label": "fraudulent", "label_confidence": 0.845, "severity": "low", "timestamp": "2026-01-01T07:59:00Z", "trace_id": "ca3d02cf-fad6-d030-057f-74a473738569" }
{ "account_age_days": 1474, "account_id": "ACCT-FEFD0E2FE395", "baseline_risk_score": 0.255, "kyc_tier": "tier_1", "session_entropy": 0.855 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "NG", "latency_ms": 264, "timestamp": "2025-12-31T21:39:00Z", "transaction_amount_usd": 14.34 }, { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.473, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 237476.34, "financial_exposure_usd": 350998.13, "recoverable_pct": 0.563 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105761", "label": "fraudulent", "label_confidence": 0.641, "severity": "medium", "timestamp": "2026-01-05T00:01:00Z", "trace_id": "f2a44f0b-a42a-e5d0-dd10-e5fe9a5dd1ff" }
{ "account_age_days": 1831, "account_id": "ACCT-1683CFD49029", "baseline_risk_score": 0.19, "kyc_tier": "tier_2", "session_entropy": 0.269 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "RU", "latency_ms": 360, "timestamp": "2026-01-05T00:01:00Z", "transaction_amount_usd": 144260.97 }, { "asset": "EUR", "burst_indicator": false, "event_name": "ORDER_BOOK_...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.88, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post...
{ "customer_funds_at_risk_usd": 3031587.18, "financial_exposure_usd": 6147732.22, "recoverable_pct": 0.572 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107298", "label": "benign", "label_confidence": 0.631, "severity": "low", "timestamp": "2026-01-06T01:38:00Z", "trace_id": "999b7cdc-9119-06b0-2b48-c6810e704ef5" }
{ "account_age_days": 966, "account_id": "ACCT-294CA07FBBD0", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.489 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "JP", "latency_ms": 1164, "timestamp": "2026-01-06T01:38:00Z", "transaction_amount_usd": 5770.7 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.62, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr...
{ "customer_funds_at_risk_usd": 2856.82, "financial_exposure_usd": 3054.08, "recoverable_pct": 0.632 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108976", "label": "benign", "label_confidence": 0.589, "severity": "medium", "timestamp": "2026-01-07T05:36:00Z", "trace_id": "3a1088a6-e020-ddfc-7f0b-02bd4e9ca4fd" }
{ "account_age_days": 1106, "account_id": "ACCT-84FB9308CBC3", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.313 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "ES", "latency_ms": 318, "timestamp": "2026-01-07T05:36:00Z", "transaction_amount_usd": 10923.24 }, { "asset": "USD", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.741, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 839.18, "financial_exposure_usd": 1371.72, "recoverable_pct": 0.852 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101793", "label": "fraudulent", "label_confidence": 0.889, "severity": "critical", "timestamp": "2026-01-02T05:53:00Z", "trace_id": "ee467d8d-e020-6455-84c6-b05d50f8ba4a" }
{ "account_age_days": 1047, "account_id": "ACCT-DE26E2908E99", "baseline_risk_score": 0.301, "kyc_tier": "tier_3", "session_entropy": 0.127 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "RU", "latency_ms": 1126, "timestamp": "2026-01-02T05:53:00Z", "transaction_amount_usd": 50374.76 }, { "asset": "SOL", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.629, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 932408.07, "financial_exposure_usd": 1308752.08, "recoverable_pct": 0.288 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100085", "label": "fraudulent", "label_confidence": 0.978, "severity": "critical", "timestamp": "2026-01-01T01:25:00Z", "trace_id": "57390b03-10e9-4dce-6241-cba37b7ce7cc" }
{ "account_age_days": 1738, "account_id": "ACCT-FC8621109C8A", "baseline_risk_score": 0.616, "kyc_tier": "tier_1", "session_entropy": 0.534 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "NG", "latency_ms": 780, "timestamp": "2026-01-01T01:25:00Z", "transaction_amount_usd": 71120.94 }, { "asset": "USD", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.387, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 265564.5, "financial_exposure_usd": 663072.49, "recoverable_pct": 0.476 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104704", "label": "fraudulent", "label_confidence": 0.886, "severity": "high", "timestamp": "2026-01-04T06:24:00Z", "trace_id": "d1c1ab1f-af28-cb32-75a7-81d7d17dcf7a" }
{ "account_age_days": 1132, "account_id": "ACCT-A1C18C361810", "baseline_risk_score": 0.222, "kyc_tier": "tier_1", "session_entropy": 0.451 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "FR", "latency_ms": 756, "timestamp": "2026-01-04T06:24:00Z", "transaction_amount_usd": 2017884.19 }, { "asset": "USD", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.493, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 3816466.23, "financial_exposure_usd": 4466110.22, "recoverable_pct": 0.688 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107945", "label": "benign", "label_confidence": 0.598, "severity": "low", "timestamp": "2026-01-06T12:25:00Z", "trace_id": "1ea63f05-51d3-646b-dfdd-469ad53fe6b4" }
{ "account_age_days": 1750, "account_id": "ACCT-C9716940A515", "baseline_risk_score": 0.166, "kyc_tier": "tier_2", "session_entropy": 0.279 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "CA", "latency_ms": 244, "timestamp": "2026-01-06T08:32:00Z", "transaction_amount_usd": 8.06 }, { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.585, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 1266.53, "financial_exposure_usd": 1772.31, "recoverable_pct": 0.729 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101247", "label": "fraudulent", "label_confidence": 0.939, "severity": "critical", "timestamp": "2026-01-01T20:47:00Z", "trace_id": "200ad030-3c68-e2cf-90f4-37131be68d20" }
{ "account_age_days": 879, "account_id": "ACCT-07BBFF575A38", "baseline_risk_score": 0.463, "kyc_tier": "tier_2", "session_entropy": 0.878 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CN", "latency_ms": 806, "timestamp": "2026-01-01T20:47:00Z", "transaction_amount_usd": 119601.46 }, { "asset": "USD", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.567, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 208452.38, "financial_exposure_usd": 262201.48, "recoverable_pct": 0.179 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102502", "label": "fraudulent", "label_confidence": 0.954, "severity": "critical", "timestamp": "2026-01-02T17:42:00Z", "trace_id": "bb3f341b-f3d6-1e72-77f2-4c1647b555f2" }
{ "account_age_days": 26, "account_id": "ACCT-ED0AB9721030", "baseline_risk_score": 0.518, "kyc_tier": "tier_1", "session_entropy": 0.563 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "HK", "latency_ms": 825, "timestamp": "2026-01-02T17:42:00Z", "transaction_amount_usd": 113250.86 }, { "asset": "USDT", "burst_indicator": false, "event_name": "PASSWORD_CHANGE",...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.55, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING...
{ "customer_funds_at_risk_usd": 148442.13, "financial_exposure_usd": 194100.63, "recoverable_pct": 0.372 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103754", "label": "fraudulent", "label_confidence": 0.791, "severity": "high", "timestamp": "2026-01-03T14:34:00Z", "trace_id": "f3453173-487f-3737-7ad0-660157f4e57f" }
{ "account_age_days": 1713, "account_id": "ACCT-3C082D23FC8C", "baseline_risk_score": 0.421, "kyc_tier": "tier_1", "session_entropy": 0.748 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "RU", "latency_ms": 280, "timestamp": "2026-01-03T14:34:00Z", "transaction_amount_usd": 1776238.87 }, { "asset": "ETH", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.629, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 5210864.79, "financial_exposure_usd": 5824320.82, "recoverable_pct": 0.71 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109933", "label": "benign", "label_confidence": 0.578, "severity": "low", "timestamp": "2026-01-07T21:33:00Z", "trace_id": "c5d1a559-ef02-6b14-e925-c1ad2d7155b0" }
{ "account_age_days": 1254, "account_id": "ACCT-DF1B2AAC5CB2", "baseline_risk_score": 0.144, "kyc_tier": "tier_1", "session_entropy": 0.835 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "FR", "latency_ms": 268, "timestamp": "2026-01-07T21:33:00Z", "transaction_amount_usd": 6970.89 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.798, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 1003.85, "financial_exposure_usd": 1470.37, "recoverable_pct": 0.91 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100616", "label": "fraudulent", "label_confidence": 0.759, "severity": "high", "timestamp": "2026-01-01T10:16:00Z", "trace_id": "733f4ae0-7bd1-5d83-1b78-376bdfd1d149" }
{ "account_age_days": 1661, "account_id": "ACCT-FD25F1A7E9B0", "baseline_risk_score": 0.366, "kyc_tier": "tier_1", "session_entropy": 0.655 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "CH", "latency_ms": 193, "timestamp": "2025-12-31T23:14:00Z", "transaction_amount_usd": 5.18 }, { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "g...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.868, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 794709.86, "financial_exposure_usd": 1086683.38, "recoverable_pct": 0.514 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100124", "label": "fraudulent", "label_confidence": 0.956, "severity": "high", "timestamp": "2026-01-01T02:04:00Z", "trace_id": "840d214b-3bd5-4863-7974-c90b35ba5e93" }
{ "account_age_days": 68, "account_id": "ACCT-ACC54C621AB4", "baseline_risk_score": 0.431, "kyc_tier": "tier_3", "session_entropy": 0.57 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "VE", "latency_ms": 255, "timestamp": "2026-01-01T02:04:00Z", "transaction_amount_usd": 91035.75 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.643, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 156769.18, "financial_exposure_usd": 301827.89, "recoverable_pct": 0.775 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103612", "label": "fraudulent", "label_confidence": 0.857, "severity": "low", "timestamp": "2026-01-03T12:12:00Z", "trace_id": "04f5ecb9-f7b1-2e79-3ea5-0884b8f7d8bb" }
{ "account_age_days": 802, "account_id": "ACCT-DEBE69D13906", "baseline_risk_score": 0.395, "kyc_tier": "tier_2", "session_entropy": 0.83 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "KY", "latency_ms": 286, "timestamp": "2026-01-03T05:40:00Z", "transaction_amount_usd": 12.4 }, { "asset": "ETH", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED"...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.799, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 3060950.11, "financial_exposure_usd": 7424679.73, "recoverable_pct": 0.535 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104164", "label": "fraudulent", "label_confidence": 0.752, "severity": "critical", "timestamp": "2026-01-03T21:24:00Z", "trace_id": "9410fe89-f046-f927-4ca2-eac51b22ab5f" }
{ "account_age_days": 453, "account_id": "ACCT-6FB169A36043", "baseline_risk_score": 0.15, "kyc_tier": "tier_3", "session_entropy": 0.407 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "RU", "latency_ms": 785, "timestamp": "2026-01-03T21:24:00Z", "transaction_amount_usd": 1831620.43 }, { "asset": "USDC", "burst_indicator": false, "event_name": "ORDER_BO...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.86, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 4", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 1760539.53, "financial_exposure_usd": 2528985.01, "recoverable_pct": 0.968 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109303", "label": "benign", "label_confidence": 0.653, "severity": "high", "timestamp": "2026-01-07T11:03:00Z", "trace_id": "465473c5-88f4-20e9-62a7-6aeda31a6f22" }
{ "account_age_days": 1317, "account_id": "ACCT-FA978FFA6B79", "baseline_risk_score": 0.082, "kyc_tier": "tier_2", "session_entropy": 0.701 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "VN", "latency_ms": 239, "timestamp": "2026-01-07T11:03:00Z", "transaction_amount_usd": 2361.04 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.474, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 2539.18, "financial_exposure_usd": 4351.01, "recoverable_pct": 0.88 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104654", "label": "fraudulent", "label_confidence": 0.713, "severity": "high", "timestamp": "2026-01-04T05:34:00Z", "trace_id": "b380b817-1497-fb33-48e1-7990550907b2" }
{ "account_age_days": 1121, "account_id": "ACCT-ADCD8BF68B94", "baseline_risk_score": 0.304, "kyc_tier": "tier_1", "session_entropy": 0.175 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "US", "latency_ms": 543, "timestamp": "2026-01-04T05:34:00Z", "transaction_amount_usd": 2702728.47 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.582, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 2430491.01, "financial_exposure_usd": 3873498.62, "recoverable_pct": 0.894 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100387", "label": "fraudulent", "label_confidence": 0.832, "severity": "high", "timestamp": "2026-01-01T06:27:00Z", "trace_id": "aca9af9e-fc85-9916-236e-d0d0f1e9f9bd" }
{ "account_age_days": 1171, "account_id": "ACCT-2FD8178299A1", "baseline_risk_score": 0.535, "kyc_tier": "tier_2", "session_entropy": 0.192 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "KY", "latency_ms": 453, "timestamp": "2026-01-01T06:27:00Z", "transaction_amount_usd": 44061.25 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.692, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 285441.53, "financial_exposure_usd": 452620.3, "recoverable_pct": 0.825 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107091", "label": "benign", "label_confidence": 0.611, "severity": "low", "timestamp": "2026-01-05T22:11:00Z", "trace_id": "a0eb252f-8258-146e-ac28-a7fe85100e85" }
{ "account_age_days": 295, "account_id": "ACCT-AE6AB1231828", "baseline_risk_score": 0.198, "kyc_tier": "tier_2", "session_entropy": 0.103 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "ID", "latency_ms": 797, "timestamp": "2026-01-05T22:11:00Z", "transaction_amount_usd": 9029.11 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.466, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 1087.89, "financial_exposure_usd": 1977.37, "recoverable_pct": 0.98 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106510", "label": "fraudulent", "label_confidence": 0.657, "severity": "low", "timestamp": "2026-01-05T12:30:00Z", "trace_id": "999dd17b-3cea-0165-0cb5-6743aee4cbd6" }
{ "account_age_days": 529, "account_id": "ACCT-8D7A694518E6", "baseline_risk_score": 0.244, "kyc_tier": "tier_2", "session_entropy": 0.854 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "CN", "latency_ms": 604, "timestamp": "2026-01-05T12:30:00Z", "transaction_amount_usd": 1122063.56 }, { "asset": "SOL", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.417, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 6446991.71, "financial_exposure_usd": 7637414.49, "recoverable_pct": 0.525 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100538", "label": "fraudulent", "label_confidence": 0.823, "severity": "medium", "timestamp": "2026-01-01T08:58:00Z", "trace_id": "aeca599c-ee88-d132-2523-0758d99a0673" }
{ "account_age_days": 1311, "account_id": "ACCT-C083A0E2E920", "baseline_risk_score": 0.5, "kyc_tier": "tier_2", "session_entropy": 0.295 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "NG", "latency_ms": 344, "timestamp": "2026-01-01T08:58:00Z", "transaction_amount_usd": 19787.47 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.789, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 1, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 127168.68, "financial_exposure_usd": 153349.98, "recoverable_pct": 0.442 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102467", "label": "fraudulent", "label_confidence": 0.945, "severity": "medium", "timestamp": "2026-01-02T17:07:00Z", "trace_id": "0f1c3274-3ff9-a154-a128-ec62de3f95ff" }
{ "account_age_days": 1973, "account_id": "ACCT-9EB99763D494", "baseline_risk_score": 0.401, "kyc_tier": "tier_2", "session_entropy": 0.454 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CN", "latency_ms": 1135, "timestamp": "2026-01-02T17:07:00Z", "transaction_amount_usd": 37175.81 }, { "asset": "JPY", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.396, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 4", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 273731.76, "financial_exposure_usd": 393273.89, "recoverable_pct": 0.349 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100330", "label": "fraudulent", "label_confidence": 0.802, "severity": "medium", "timestamp": "2026-01-01T05:30:00Z", "trace_id": "5fa686f0-961d-4530-a068-f9edbfb9209f" }
{ "account_age_days": 1841, "account_id": "ACCT-CBD4B8DB541C", "baseline_risk_score": 0.604, "kyc_tier": "tier_1", "session_entropy": 0.71 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "NG", "latency_ms": 85, "timestamp": "2026-01-01T05:30:00Z", "transaction_amount_usd": 568.18 }, { "asset": "EUR", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", "...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.863, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 956231.69, "financial_exposure_usd": 1170295.66, "recoverable_pct": 0.177 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102503", "label": "fraudulent", "label_confidence": 0.911, "severity": "critical", "timestamp": "2026-01-02T17:43:00Z", "trace_id": "a36de350-ca70-6c1b-49a6-625cb7572c21" }
{ "account_age_days": 1056, "account_id": "ACCT-244F937D3735", "baseline_risk_score": 0.27, "kyc_tier": "tier_3", "session_entropy": 0.805 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "KY", "latency_ms": 764, "timestamp": "2026-01-02T17:43:00Z", "transaction_amount_usd": 82108.23 }, { "asset": "EUR", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.392, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 293321.59, "financial_exposure_usd": 347299.61, "recoverable_pct": 0.489 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100188", "label": "fraudulent", "label_confidence": 0.803, "severity": "medium", "timestamp": "2026-01-01T03:08:00Z", "trace_id": "7cbb2627-9929-c7c7-3709-d7d396e15645" }
{ "account_age_days": 969, "account_id": "ACCT-51EC8F304E2D", "baseline_risk_score": 0.293, "kyc_tier": "tier_1", "session_entropy": 0.751 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "DE", "latency_ms": 986, "timestamp": "2026-01-01T03:08:00Z", "transaction_amount_usd": 70014.77 }, { "asset": "USD", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.907, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 959827.84, "financial_exposure_usd": 1292514.55, "recoverable_pct": 0.131 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105610", "label": "fraudulent", "label_confidence": 0.847, "severity": "critical", "timestamp": "2026-01-04T21:30:00Z", "trace_id": "13389f48-9ebf-4cc1-ccc3-070fab0eb741" }
{ "account_age_days": 1437, "account_id": "ACCT-D389435B18F7", "baseline_risk_score": 0.402, "kyc_tier": "tier_3", "session_entropy": 0.266 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "HK", "latency_ms": 152, "timestamp": "2026-01-04T15:48:00Z", "transaction_amount_usd": 0.11 }, { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.465, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 4324395.37, "financial_exposure_usd": 5500776.7, "recoverable_pct": 0.515 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107304", "label": "benign", "label_confidence": 0.724, "severity": "low", "timestamp": "2026-01-06T01:44:00Z", "trace_id": "65a05d3b-410b-7e9a-5f7d-a861ce597781" }
{ "account_age_days": 1628, "account_id": "ACCT-C6E73096D883", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.761 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "SG", "latency_ms": 299, "timestamp": "2026-01-05T18:00:00Z", "transaction_amount_usd": 20.61 }, { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.599, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 2560.13, "financial_exposure_usd": 6309.66, "recoverable_pct": 0.463 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108334", "label": "benign", "label_confidence": 0.676, "severity": "low", "timestamp": "2026-01-06T18:54:00Z", "trace_id": "c177e753-2487-ad1d-23ef-50bdd0dee77e" }
{ "account_age_days": 1519, "account_id": "ACCT-5AE92C299475", "baseline_risk_score": 0.18, "kyc_tier": "tier_1", "session_entropy": 0.122 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "FR", "latency_ms": 864, "timestamp": "2026-01-06T18:54:00Z", "transaction_amount_usd": 5455.79 }, { "asset": "USDC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.536, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 2259.59, "financial_exposure_usd": 2922.29, "recoverable_pct": 0.69 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105855", "label": "fraudulent", "label_confidence": 0.713, "severity": "high", "timestamp": "2026-01-05T01:35:00Z", "trace_id": "140fd794-0866-5668-7c06-602507abca8e" }
{ "account_age_days": 332, "account_id": "ACCT-F9E7439D078E", "baseline_risk_score": 0.373, "kyc_tier": "tier_1", "session_entropy": 0.519 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "SG", "latency_ms": 352, "timestamp": "2026-01-04T18:14:00Z", "transaction_amount_usd": 20.22 }, { "asset": "JPY", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.753, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 4007903.31, "financial_exposure_usd": 9993048.81, "recoverable_pct": 0.464 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109565", "label": "benign", "label_confidence": 0.58, "severity": "critical", "timestamp": "2026-01-07T15:25:00Z", "trace_id": "1d57e1a0-b7d8-906f-38c2-33c3eae963cf" }
{ "account_age_days": 590, "account_id": "ACCT-7DFD7D33A41E", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.566 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "PT", "latency_ms": 936, "timestamp": "2026-01-07T15:25:00Z", "transaction_amount_usd": 14997.88 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.471, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 1726.44, "financial_exposure_usd": 2098.8, "recoverable_pct": 0.651 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104686", "label": "fraudulent", "label_confidence": 0.812, "severity": "medium", "timestamp": "2026-01-04T06:06:00Z", "trace_id": "dd2b8b93-ef9e-ff0a-2332-edd69e1d8fd7" }
{ "account_age_days": 468, "account_id": "ACCT-C9F3715CB961", "baseline_risk_score": 0.287, "kyc_tier": "tier_2", "session_entropy": 0.212 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "SG", "latency_ms": 125, "timestamp": "2026-01-04T03:00:00Z", "transaction_amount_usd": 1.59 }, { "asset": "GBP", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.864, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 3713937.72, "financial_exposure_usd": 5529301.05, "recoverable_pct": 0.802 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104606", "label": "fraudulent", "label_confidence": 0.73, "severity": "critical", "timestamp": "2026-01-04T04:46:00Z", "trace_id": "75563b80-e96a-baad-3185-1f5abd56f01c" }
{ "account_age_days": 1928, "account_id": "ACCT-969AC4231BC5", "baseline_risk_score": 0.268, "kyc_tier": "tier_2", "session_entropy": 0.525 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "FR", "latency_ms": 1046, "timestamp": "2026-01-04T04:46:00Z", "transaction_amount_usd": 2882518.93 }, { "asset": "EUR", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.354, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 6074005.02, "financial_exposure_usd": 7022241.9, "recoverable_pct": 0.693 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101438", "label": "fraudulent", "label_confidence": 0.757, "severity": "medium", "timestamp": "2026-01-01T23:58:00Z", "trace_id": "53fa9655-6967-3e84-99c8-7f99de5151e2" }
{ "account_age_days": 1770, "account_id": "ACCT-F35B5ED63DB8", "baseline_risk_score": 0.272, "kyc_tier": "tier_1", "session_entropy": 0.866 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CN", "latency_ms": 1130, "timestamp": "2026-01-01T23:58:00Z", "transaction_amount_usd": 34703.15 }, { "asset": "USDC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.45, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ...
{ "customer_funds_at_risk_usd": 626636.26, "financial_exposure_usd": 978422.74, "recoverable_pct": 0.707 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107637", "label": "benign", "label_confidence": 0.64, "severity": "high", "timestamp": "2026-01-06T07:17:00Z", "trace_id": "3ab4f64a-03ea-3d89-5697-81518430e4a3" }
{ "account_age_days": 356, "account_id": "ACCT-C6460C7AE258", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.305 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "JP", "latency_ms": 297, "timestamp": "2026-01-06T07:17:00Z", "transaction_amount_usd": 1169.04 }, { "asset": "USDC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.569, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 1982.87, "financial_exposure_usd": 2196.5, "recoverable_pct": 0.834 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109480", "label": "benign", "label_confidence": 0.68, "severity": "critical", "timestamp": "2026-01-07T14:00:00Z", "trace_id": "88216ac3-8640-a95c-10dc-1773a2f73265" }
{ "account_age_days": 513, "account_id": "ACCT-5CC961082129", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.25 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "JP", "latency_ms": 572, "timestamp": "2026-01-07T14:00:00Z", "transaction_amount_usd": 14118.92 }, { "asset": "SOL", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.461, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 689.28, "financial_exposure_usd": 1208.13, "recoverable_pct": 0.816 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108487", "label": "benign", "label_confidence": 0.658, "severity": "high", "timestamp": "2026-01-06T21:27:00Z", "trace_id": "23fb7bb5-d0d1-fe0b-c6d9-135ee53da52f" }
{ "account_age_days": 1173, "account_id": "ACCT-2972DC62BE81", "baseline_risk_score": 0.06, "kyc_tier": "tier_3", "session_entropy": 0.516 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "TH", "latency_ms": 940, "timestamp": "2026-01-06T21:27:00Z", "transaction_amount_usd": 7875.79 }, { "asset": "USDC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.481, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 463.22, "financial_exposure_usd": 980.33, "recoverable_pct": 0.917 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102067", "label": "fraudulent", "label_confidence": 0.84, "severity": "critical", "timestamp": "2026-01-02T10:27:00Z", "trace_id": "4f135126-40ea-bc0b-cb03-9eada8362305" }
{ "account_age_days": 217, "account_id": "ACCT-0770F2FE0130", "baseline_risk_score": 0.528, "kyc_tier": "tier_1", "session_entropy": 0.796 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "SG", "latency_ms": 638, "timestamp": "2026-01-02T10:27:00Z", "transaction_amount_usd": 37510.99 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.436, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 612706.33, "financial_exposure_usd": 1330076.48, "recoverable_pct": 0.442 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103113", "label": "fraudulent", "label_confidence": 0.83, "severity": "medium", "timestamp": "2026-01-03T03:53:00Z", "trace_id": "91bd8b73-d18e-54d5-9a1b-062913c09940" }
{ "account_age_days": 514, "account_id": "ACCT-400EC9F4B40A", "baseline_risk_score": 0.397, "kyc_tier": "tier_2", "session_entropy": 0.519 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "RU", "latency_ms": 1062, "timestamp": "2026-01-03T03:53:00Z", "transaction_amount_usd": 30851.62 }, { "asset": "USD", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.583, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 215557.23, "financial_exposure_usd": 317008.66, "recoverable_pct": 0.773 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107103", "label": "benign", "label_confidence": 0.475, "severity": "high", "timestamp": "2026-01-05T22:23:00Z", "trace_id": "8f48a42b-7946-6e10-d129-df220e1b2cb0" }
{ "account_age_days": 1981, "account_id": "ACCT-D80A09F31633", "baseline_risk_score": 0.108, "kyc_tier": "tier_1", "session_entropy": 0.213 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "PK", "latency_ms": 342, "timestamp": "2026-01-05T18:07:00Z", "transaction_amount_usd": 23.47 }, { "asset": "SOL", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.683, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 822.15, "financial_exposure_usd": 1893.17, "recoverable_pct": 0.816 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105984", "label": "fraudulent", "label_confidence": 0.687, "severity": "medium", "timestamp": "2026-01-05T03:44:00Z", "trace_id": "584a67eb-547a-47ee-4ace-9f0111bb475a" }
{ "account_age_days": 163, "account_id": "ACCT-57BB41BACA0B", "baseline_risk_score": 0.399, "kyc_tier": "tier_3", "session_entropy": 0.764 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "CH", "latency_ms": 899, "timestamp": "2026-01-05T03:44:00Z", "transaction_amount_usd": 1017877.04 }, { "asset": "ETH", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.801, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 2881325.13, "financial_exposure_usd": 5065707.49, "recoverable_pct": 0.513 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109808", "label": "benign", "label_confidence": 0.737, "severity": "low", "timestamp": "2026-01-07T19:28:00Z", "trace_id": "d62233ef-9522-b79c-e0de-3a7965a9e072" }
{ "account_age_days": 1087, "account_id": "ACCT-488CC74E474A", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.919 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "FR", "latency_ms": 963, "timestamp": "2026-01-07T19:28:00Z", "transaction_amount_usd": 12087.93 }, { "asset": "USDT", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.557, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 3619.92, "financial_exposure_usd": 4724.64, "recoverable_pct": 0.446 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100942", "label": "fraudulent", "label_confidence": 0.881, "severity": "high", "timestamp": "2026-01-01T15:42:00Z", "trace_id": "13e9f0e3-2607-e444-a19d-13f1ff7a5ced" }
{ "account_age_days": 1595, "account_id": "ACCT-03B3E3141544", "baseline_risk_score": 0.591, "kyc_tier": "tier_2", "session_entropy": 0.16 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "GB", "latency_ms": 183, "timestamp": "2026-01-01T04:51:00Z", "transaction_amount_usd": 18.09 }, { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.852, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 743405.91, "financial_exposure_usd": 753046.06, "recoverable_pct": 0.531 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107666", "label": "benign", "label_confidence": 0.719, "severity": "high", "timestamp": "2026-01-06T07:46:00Z", "trace_id": "54f960b4-8af7-476f-5e1f-9deea0ed38b5" }
{ "account_age_days": 1499, "account_id": "ACCT-C852120F9DB1", "baseline_risk_score": 0.08, "kyc_tier": "tier_3", "session_entropy": 0.2 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "JP", "latency_ms": 497, "timestamp": "2026-01-06T07:46:00Z", "transaction_amount_usd": 5685.84 }, { "asset": "USD", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.591, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 2362.06, "financial_exposure_usd": 5284.2, "recoverable_pct": 0.51 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104528", "label": "fraudulent", "label_confidence": 0.939, "severity": "high", "timestamp": "2026-01-04T03:28:00Z", "trace_id": "2beeeb02-e001-b3db-dc35-4c2f1468d6f6" }
{ "account_age_days": 978, "account_id": "ACCT-6371CD320A29", "baseline_risk_score": 0.175, "kyc_tier": "tier_2", "session_entropy": 0.67 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "FR", "latency_ms": 298, "timestamp": "2026-01-03T20:11:00Z", "transaction_amount_usd": 11.14 }, { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.452, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 2690459.83, "financial_exposure_usd": 2729748.7, "recoverable_pct": 0.854 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106585", "label": "fraudulent", "label_confidence": 0.83, "severity": "low", "timestamp": "2026-01-05T13:45:00Z", "trace_id": "1f0c3836-23ce-06dc-343c-31de50e52b02" }
{ "account_age_days": 212, "account_id": "ACCT-CE0D5B539383", "baseline_risk_score": 0.32, "kyc_tier": "tier_3", "session_entropy": 0.477 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "LU", "latency_ms": 104, "timestamp": "2026-01-05T13:45:00Z", "transaction_amount_usd": 1636150.62 }, { "asset": "USDC", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.52, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post...
{ "customer_funds_at_risk_usd": 2692574.21, "financial_exposure_usd": 4988478.42, "recoverable_pct": 0.681 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109061", "label": "benign", "label_confidence": 0.611, "severity": "high", "timestamp": "2026-01-07T07:01:00Z", "trace_id": "f35f41ef-0aea-8654-0ebb-27f97a50d636" }
{ "account_age_days": 1697, "account_id": "ACCT-0E87398B2802", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.381 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "PT", "latency_ms": 811, "timestamp": "2026-01-07T07:01:00Z", "transaction_amount_usd": 8191.35 }, { "asset": "USD", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.611, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 3615.83, "financial_exposure_usd": 4767.55, "recoverable_pct": 0.818 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104393", "label": "fraudulent", "label_confidence": 0.709, "severity": "medium", "timestamp": "2026-01-04T01:13:00Z", "trace_id": "e6b72595-8045-2cbb-64a9-330ecd7e076a" }
{ "account_age_days": 798, "account_id": "ACCT-054B01F7D23B", "baseline_risk_score": 0.212, "kyc_tier": "tier_2", "session_entropy": 0.704 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "US", "latency_ms": 827, "timestamp": "2026-01-04T01:13:00Z", "transaction_amount_usd": 1952130.01 }, { "asset": "JPY", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.666, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 287294.71, "financial_exposure_usd": 458627.27, "recoverable_pct": 0.916 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108026", "label": "benign", "label_confidence": 0.73, "severity": "medium", "timestamp": "2026-01-06T13:46:00Z", "trace_id": "ded38930-63b1-5c6f-2fac-4b455c2bc1a5" }
{ "account_age_days": 1277, "account_id": "ACCT-196F54B4C6ED", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.338 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "MY", "latency_ms": 318, "timestamp": "2026-01-06T08:34:00Z", "transaction_amount_usd": 20.89 }, { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.787, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 1006.4, "financial_exposure_usd": 1669.35, "recoverable_pct": 0.873 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106841", "label": "benign", "label_confidence": 0.514, "severity": "low", "timestamp": "2026-01-05T18:01:00Z", "trace_id": "9bb941f3-cdd9-cdcc-4467-40141e7e00b8" }
{ "account_age_days": 484, "account_id": "ACCT-15235FE5D4C7", "baseline_risk_score": 0.087, "kyc_tier": "tier_3", "session_entropy": 0.656 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "GR", "latency_ms": 838, "timestamp": "2026-01-05T18:01:00Z", "transaction_amount_usd": 11082.02 }, { "asset": "ETH", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.54, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 1395.77, "financial_exposure_usd": 2308.19, "recoverable_pct": 0.822 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103019", "label": "fraudulent", "label_confidence": 0.937, "severity": "critical", "timestamp": "2026-01-03T02:19:00Z", "trace_id": "d8453ebe-68d4-201d-ddb0-a68991fba6c2" }
{ "account_age_days": 272, "account_id": "ACCT-87C86665D2B3", "baseline_risk_score": 0.403, "kyc_tier": "tier_3", "session_entropy": 0.453 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "PK", "latency_ms": 775, "timestamp": "2026-01-03T02:19:00Z", "transaction_amount_usd": 60381.23 }, { "asset": "USDC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.407, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 647724.91, "financial_exposure_usd": 652124.57, "recoverable_pct": 0.835 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101170", "label": "fraudulent", "label_confidence": 0.877, "severity": "high", "timestamp": "2026-01-01T19:30:00Z", "trace_id": "4f05ff08-66a2-4740-5963-8af747dadb5b" }
{ "account_age_days": 1736, "account_id": "ACCT-A2F4820ED7E7", "baseline_risk_score": 0.379, "kyc_tier": "tier_1", "session_entropy": 0.44 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "AE", "latency_ms": 155, "timestamp": "2026-01-01T13:23:00Z", "transaction_amount_usd": 11.97 }, { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.751, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 8", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 390381.55, "financial_exposure_usd": 653859.38, "recoverable_pct": 0.025 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103955", "label": "fraudulent", "label_confidence": 0.895, "severity": "low", "timestamp": "2026-01-03T17:55:00Z", "trace_id": "b7ba3a03-6e2e-9bec-af90-375e1842307c" }
{ "account_age_days": 1568, "account_id": "ACCT-1FB6D3C83FA5", "baseline_risk_score": 0.389, "kyc_tier": "tier_3", "session_entropy": 0.332 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "SG", "latency_ms": 159, "timestamp": "2026-01-03T17:55:00Z", "transaction_amount_usd": 173438.96 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.459, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 1680777.55, "financial_exposure_usd": 4180102.1, "recoverable_pct": 0.632 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105169", "label": "fraudulent", "label_confidence": 0.772, "severity": "medium", "timestamp": "2026-01-04T14:09:00Z", "trace_id": "0b274bfd-cd17-cc4f-0213-e81bfc76c18f" }
{ "account_age_days": 748, "account_id": "ACCT-875C5B6FF0DD", "baseline_risk_score": 0.404, "kyc_tier": "tier_1", "session_entropy": 0.896 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "US", "latency_ms": 375, "timestamp": "2026-01-04T14:09:00Z", "transaction_amount_usd": 1809353.43 }, { "asset": "SOL", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.5, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND...
{ "customer_funds_at_risk_usd": 5688160.42, "financial_exposure_usd": 6348804.18, "recoverable_pct": 0.769 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100667", "label": "fraudulent", "label_confidence": 0.856, "severity": "critical", "timestamp": "2026-01-01T11:07:00Z", "trace_id": "992fdb73-2a87-9ac0-7670-6b08477e781c" }
{ "account_age_days": 464, "account_id": "ACCT-C1FB16032E4D", "baseline_risk_score": 0.58, "kyc_tier": "tier_2", "session_entropy": 0.375 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "RU", "latency_ms": 871, "timestamp": "2026-01-01T11:07:00Z", "transaction_amount_usd": 83254.27 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.444, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 205696.15, "financial_exposure_usd": 462137.86, "recoverable_pct": 0.563 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100450", "label": "fraudulent", "label_confidence": 0.777, "severity": "medium", "timestamp": "2026-01-01T07:30:00Z", "trace_id": "8e58b6c3-bd67-eb6a-ac2e-97b20c003f75" }
{ "account_age_days": 390, "account_id": "ACCT-3D1DCAAB9B88", "baseline_risk_score": 0.355, "kyc_tier": "tier_2", "session_entropy": 0.46 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "CN", "latency_ms": 373, "timestamp": "2025-12-31T22:09:00Z", "transaction_amount_usd": 16.65 }, { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.705, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 414737.25, "financial_exposure_usd": 456472.52, "recoverable_pct": 0.369 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103073", "label": "fraudulent", "label_confidence": 0.969, "severity": "medium", "timestamp": "2026-01-03T03:13:00Z", "trace_id": "96b07911-e254-060b-e968-087b7789f183" }
{ "account_age_days": 1171, "account_id": "ACCT-955DBA82A0C8", "baseline_risk_score": 0.575, "kyc_tier": "tier_2", "session_entropy": 0.68 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "PK", "latency_ms": 288, "timestamp": "2026-01-03T03:13:00Z", "transaction_amount_usd": 62906.55 }, { "asset": "SOL", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.734, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 732895.91, "financial_exposure_usd": 812337.57, "recoverable_pct": 0.751 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102317", "label": "fraudulent", "label_confidence": 0.753, "severity": "high", "timestamp": "2026-01-02T14:37:00Z", "trace_id": "49f5fbca-1535-44c5-3401-08f21ddcd712" }
{ "account_age_days": 146, "account_id": "ACCT-6D24D5B122A1", "baseline_risk_score": 0.509, "kyc_tier": "tier_3", "session_entropy": 0.841 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "NL", "latency_ms": 1001, "timestamp": "2026-01-02T14:37:00Z", "transaction_amount_usd": 10914.99 }, { "asset": "USDC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.443, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 508792.88, "financial_exposure_usd": 1093602.57, "recoverable_pct": 0.434 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107488", "label": "benign", "label_confidence": 0.601, "severity": "medium", "timestamp": "2026-01-06T04:48:00Z", "trace_id": "d172ffd5-2727-3d04-2c6a-771d0d4510fe" }
{ "account_age_days": 363, "account_id": "ACCT-20F229BA2933", "baseline_risk_score": 0.115, "kyc_tier": "tier_3", "session_entropy": 0.106 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "ES", "latency_ms": 552, "timestamp": "2026-01-06T04:48:00Z", "transaction_amount_usd": 11993.52 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.485, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 3524.42, "financial_exposure_usd": 4219.63, "recoverable_pct": 0.512 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101367", "label": "fraudulent", "label_confidence": 0.811, "severity": "critical", "timestamp": "2026-01-01T22:47:00Z", "trace_id": "5c888c48-b209-0e0d-b107-056976e298a6" }
{ "account_age_days": 1711, "account_id": "ACCT-5B8A8CFE1373", "baseline_risk_score": 0.5, "kyc_tier": "tier_3", "session_entropy": 0.927 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "PK", "latency_ms": 422, "timestamp": "2026-01-01T22:47:00Z", "transaction_amount_usd": 78233.36 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.601, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 4", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 443302.34, "financial_exposure_usd": 598843.99, "recoverable_pct": 0.638 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100527", "label": "fraudulent", "label_confidence": 0.822, "severity": "high", "timestamp": "2026-01-01T08:47:00Z", "trace_id": "e2a721e9-4a12-2a4b-58aa-bc346ea8a10d" }
{ "account_age_days": 964, "account_id": "ACCT-589F50720E99", "baseline_risk_score": 0.377, "kyc_tier": "tier_3", "session_entropy": 0.106 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "LU", "latency_ms": 444, "timestamp": "2026-01-01T08:47:00Z", "transaction_amount_usd": 97393.33 }, { "asset": "USDT", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.647, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 281891.41, "financial_exposure_usd": 698307.63, "recoverable_pct": 0.475 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106313", "label": "fraudulent", "label_confidence": 0.741, "severity": "high", "timestamp": "2026-01-05T09:13:00Z", "trace_id": "c788f3cd-0c01-a3a5-c430-8f122ea58212" }
{ "account_age_days": 1198, "account_id": "ACCT-1FAD19333447", "baseline_risk_score": 0.18, "kyc_tier": "tier_2", "session_entropy": 0.205 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "BR", "latency_ms": 113, "timestamp": "2026-01-05T01:46:00Z", "transaction_amount_usd": 11.16 }, { "asset": "USDT", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTE...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.606, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 5011273.16, "financial_exposure_usd": 5966846.93, "recoverable_pct": 0.516 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101782", "label": "fraudulent", "label_confidence": 0.906, "severity": "critical", "timestamp": "2026-01-02T05:42:00Z", "trace_id": "c17970b5-7964-44ff-2f42-43400dc2825d" }
{ "account_age_days": 840, "account_id": "ACCT-60927263B4FA", "baseline_risk_score": 0.558, "kyc_tier": "tier_3", "session_entropy": 0.337 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "AE", "latency_ms": 1152, "timestamp": "2026-01-02T05:42:00Z", "transaction_amount_usd": 46835.02 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.588, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 4", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 1197374.14, "financial_exposure_usd": 1360783.38, "recoverable_pct": 0.661 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109036", "label": "benign", "label_confidence": 0.527, "severity": "high", "timestamp": "2026-01-07T06:36:00Z", "trace_id": "70f1f596-8060-ef76-cde7-dfcfa0637f5a" }
{ "account_age_days": 233, "account_id": "ACCT-C24A1FE4F5C1", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.733 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "DE", "latency_ms": 113, "timestamp": "2026-01-06T19:23:00Z", "transaction_amount_usd": 22.11 }, { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.465, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 2090.45, "financial_exposure_usd": 2386.56, "recoverable_pct": 0.5 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101769", "label": "fraudulent", "label_confidence": 0.818, "severity": "high", "timestamp": "2026-01-02T05:29:00Z", "trace_id": "2602f520-5231-bcf0-2b81-7b86758a98c0" }
{ "account_age_days": 752, "account_id": "ACCT-893213C4AA75", "baseline_risk_score": 0.641, "kyc_tier": "tier_1", "session_entropy": 0.632 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "NL", "latency_ms": 262, "timestamp": "2026-01-02T05:29:00Z", "transaction_amount_usd": 99970.9 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.616, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 638321.84, "financial_exposure_usd": 844184.67, "recoverable_pct": 0.116 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106607", "label": "fraudulent", "label_confidence": 0.788, "severity": "high", "timestamp": "2026-01-05T14:07:00Z", "trace_id": "a728f228-55dd-9038-ef90-0531c7a4e6b3" }
{ "account_age_days": 1032, "account_id": "ACCT-4778F79B00B8", "baseline_risk_score": 0.19, "kyc_tier": "tier_2", "session_entropy": 0.704 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "GB", "latency_ms": 589, "timestamp": "2026-01-05T14:07:00Z", "transaction_amount_usd": 55484.18 }, { "asset": "SOL", "burst_indicator": false, "event_name": "ORDER_BOOK_I...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.419, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 2133477.39, "financial_exposure_usd": 2845684.25, "recoverable_pct": 0.747 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108731", "label": "benign", "label_confidence": 0.554, "severity": "low", "timestamp": "2026-01-07T01:31:00Z", "trace_id": "10bae2ff-c50e-d6e0-2d2e-cf9fcf7a8280" }
{ "account_age_days": 540, "account_id": "ACCT-01D254E26A49", "baseline_risk_score": 0.062, "kyc_tier": "tier_3", "session_entropy": 0.2 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "VN", "latency_ms": 106, "timestamp": "2026-01-07T01:31:00Z", "transaction_amount_usd": 6402.68 }, { "asset": "USDC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.564, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 10575.15, "financial_exposure_usd": 11481.32, "recoverable_pct": 0.741 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101595", "label": "fraudulent", "label_confidence": 0.774, "severity": "high", "timestamp": "2026-01-02T02:35:00Z", "trace_id": "ce30c11c-bc69-5a93-e9f4-88c478a7ddfd" }
{ "account_age_days": 1633, "account_id": "ACCT-099BB52A5B9D", "baseline_risk_score": 0.256, "kyc_tier": "tier_1", "session_entropy": 0.53 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "PK", "latency_ms": 333, "timestamp": "2026-01-01T20:59:00Z", "transaction_amount_usd": 15.75 }, { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.935, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 639402.47, "financial_exposure_usd": 910617.91, "recoverable_pct": 0.654 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108511", "label": "benign", "label_confidence": 0.697, "severity": "high", "timestamp": "2026-01-06T21:51:00Z", "trace_id": "6970a36d-0850-30a9-325b-b4e0a80babd4" }
{ "account_age_days": 799, "account_id": "ACCT-4157E04CDEE8", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.237 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "GR", "latency_ms": 713, "timestamp": "2026-01-06T21:51:00Z", "transaction_amount_usd": 7279.07 }, { "asset": "ETH", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.798, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 3150.74, "financial_exposure_usd": 3215.36, "recoverable_pct": 0.95 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104467", "label": "fraudulent", "label_confidence": 0.917, "severity": "medium", "timestamp": "2026-01-04T02:27:00Z", "trace_id": "cf0c8ee2-ad6e-f1c2-df62-249bcb90aeba" }
{ "account_age_days": 825, "account_id": "ACCT-C4CF5859486E", "baseline_risk_score": 0.255, "kyc_tier": "tier_2", "session_entropy": 0.332 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "HK", "latency_ms": 1158, "timestamp": "2026-01-04T02:27:00Z", "transaction_amount_usd": 1499065.18 }, { "asset": "USDC", "burst_indicator": false, "event_name": "ORDER_BO...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.947, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 5153228.96, "financial_exposure_usd": 5643965.19, "recoverable_pct": 0.946 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108129", "label": "benign", "label_confidence": 0.586, "severity": "low", "timestamp": "2026-01-06T15:29:00Z", "trace_id": "5af53461-7a14-94cf-2339-750c7fcfc2cd" }
{ "account_age_days": 320, "account_id": "ACCT-4929D3D1BEB1", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.624 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "ES", "latency_ms": 590, "timestamp": "2026-01-06T15:29:00Z", "transaction_amount_usd": 3843.73 }, { "asset": "SOL", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.707, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 3853.39, "financial_exposure_usd": 4878.77, "recoverable_pct": 0.768 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108676", "label": "benign", "label_confidence": 0.734, "severity": "medium", "timestamp": "2026-01-07T00:36:00Z", "trace_id": "edbe974f-0106-0e3d-63c3-7a2c9c4d7638" }
{ "account_age_days": 1918, "account_id": "ACCT-5F3764862B16", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.427 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "ID", "latency_ms": 274, "timestamp": "2026-01-07T00:36:00Z", "transaction_amount_usd": 9079.16 }, { "asset": "EUR", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.694, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 2584.53, "financial_exposure_usd": 2628.87, "recoverable_pct": 0.549 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107494", "label": "benign", "label_confidence": 0.732, "severity": "medium", "timestamp": "2026-01-06T04:54:00Z", "trace_id": "a4c94b66-48ed-cfda-8f65-2c18d0addded" }
{ "account_age_days": 525, "account_id": "ACCT-9CD94A7007FB", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.206 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "KY", "latency_ms": 126, "timestamp": "2026-01-05T23:57:00Z", "transaction_amount_usd": 18.98 }, { "asset": "GBP", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.683, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 8", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 924.77, "financial_exposure_usd": 1717.6, "recoverable_pct": 0.921 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }