schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105416",
"label": "fraudulent",
"label_confidence": 0.916,
"severity": "high",
"timestamp": "2026-01-04T18:16:00Z",
"trace_id": "b0384b24-f9e6-d23b-d10c-c5ce140a9002"
} | {
"account_age_days": 37,
"account_id": "ACCT-745E0CA86127",
"baseline_risk_score": 0.429,
"kyc_tier": "tier_3",
"session_entropy": 0.692
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 687,
"timestamp": "2026-01-04T18:16:00Z",
"transaction_amount_usd": 1468811.29
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.51,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 4568327.89,
"financial_exposure_usd": 5299084.21,
"recoverable_pct": 0.915
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105116",
"label": "fraudulent",
"label_confidence": 0.744,
"severity": "high",
"timestamp": "2026-01-04T13:16:00Z",
"trace_id": "9145b44b-b88d-2008-ff22-04438aa8f92a"
} | {
"account_age_days": 264,
"account_id": "ACCT-95825C7BDECD",
"baseline_risk_score": 0.254,
"kyc_tier": "tier_3",
"session_entropy": 0.821
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 491,
"timestamp": "2026-01-04T13:16:00Z",
"transaction_amount_usd": 2540146.8
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.826,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2299548.06,
"financial_exposure_usd": 2860135.18,
"recoverable_pct": 0.774
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101596",
"label": "fraudulent",
"label_confidence": 0.846,
"severity": "critical",
"timestamp": "2026-01-02T02:36:00Z",
"trace_id": "b1ca5526-342d-6320-cdf5-e7e260a7ef61"
} | {
"account_age_days": 1126,
"account_id": "ACCT-17A0308ED985",
"baseline_risk_score": 0.336,
"kyc_tier": "tier_3",
"session_entropy": 0.251
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 516,
"timestamp": "2026-01-02T02:36:00Z",
"transaction_amount_usd": 19722.49
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.594,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 517188.28,
"financial_exposure_usd": 596162.93,
"recoverable_pct": 0.691
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100823",
"label": "fraudulent",
"label_confidence": 0.947,
"severity": "medium",
"timestamp": "2026-01-01T13:43:00Z",
"trace_id": "7c3772a1-aa46-8387-7a7b-5d94e6fbf0d7"
} | {
"account_age_days": 1317,
"account_id": "ACCT-A0EDA5422017",
"baseline_risk_score": 0.279,
"kyc_tier": "tier_2",
"session_entropy": 0.623
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "LU",
"latency_ms": 238,
"timestamp": "2026-01-01T13:43:00Z",
"transaction_amount_usd": 112921.1
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.378,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 294088.57,
"financial_exposure_usd": 369198.81,
"recoverable_pct": 0.363
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104400",
"label": "fraudulent",
"label_confidence": 0.767,
"severity": "medium",
"timestamp": "2026-01-04T01:20:00Z",
"trace_id": "e795c348-6452-cc56-29b3-a8e61ed9590e"
} | {
"account_age_days": 540,
"account_id": "ACCT-E2CD9D861DED",
"baseline_risk_score": 0.253,
"kyc_tier": "tier_1",
"session_entropy": 0.52
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 861,
"timestamp": "2026-01-04T01:20:00Z",
"transaction_amount_usd": 987385.61
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.439,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1440265.3,
"financial_exposure_usd": 3297579.47,
"recoverable_pct": 0.401
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105018",
"label": "fraudulent",
"label_confidence": 0.91,
"severity": "critical",
"timestamp": "2026-01-04T11:38:00Z",
"trace_id": "516322ea-139f-271a-6b52-365fecea136b"
} | {
"account_age_days": 791,
"account_id": "ACCT-EAF1D29C2A38",
"baseline_risk_score": 0.41,
"kyc_tier": "tier_3",
"session_entropy": 0.893
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 166,
"timestamp": "2026-01-04T11:38:00Z",
"transaction_amount_usd": 1784701.73
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.752,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 685921.53,
"financial_exposure_usd": 1350294.15,
"recoverable_pct": 0.709
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104944",
"label": "fraudulent",
"label_confidence": 0.864,
"severity": "medium",
"timestamp": "2026-01-04T10:24:00Z",
"trace_id": "3172b8de-700b-2415-5501-6a881a0847b8"
} | {
"account_age_days": 713,
"account_id": "ACCT-10A7553C8A67",
"baseline_risk_score": 0.169,
"kyc_tier": "tier_2",
"session_entropy": 0.588
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 254,
"timestamp": "2026-01-04T10:24:00Z",
"transaction_amount_usd": 1085704.76
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.402,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3054464.23,
"financial_exposure_usd": 5565981.99,
"recoverable_pct": 0.737
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105960",
"label": "fraudulent",
"label_confidence": 0.799,
"severity": "high",
"timestamp": "2026-01-05T03:20:00Z",
"trace_id": "c9b92173-fa86-32e8-8b2e-422197f784ce"
} | {
"account_age_days": 1959,
"account_id": "ACCT-B0C31B1CCF9D",
"baseline_risk_score": 0.418,
"kyc_tier": "tier_2",
"session_entropy": 0.581
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 340,
"timestamp": "2026-01-05T03:20:00Z",
"transaction_amount_usd": 1108091.08
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.706,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3763943.25,
"financial_exposure_usd": 5001146.04,
"recoverable_pct": 0.716
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102131",
"label": "fraudulent",
"label_confidence": 0.927,
"severity": "critical",
"timestamp": "2026-01-02T11:31:00Z",
"trace_id": "fa4445d2-7bc9-7fa1-1d05-80c3e977f3ed"
} | {
"account_age_days": 1278,
"account_id": "ACCT-BC547BC9E2C5",
"baseline_risk_score": 0.309,
"kyc_tier": "tier_2",
"session_entropy": 0.113
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 381,
"timestamp": "2026-01-02T10:06:00Z",
"transaction_amount_usd": 8.05
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.67,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 977242.86,
"financial_exposure_usd": 1296110.51,
"recoverable_pct": 0.566
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104352",
"label": "fraudulent",
"label_confidence": 0.884,
"severity": "medium",
"timestamp": "2026-01-04T00:32:00Z",
"trace_id": "8078ff06-a3f6-bef3-d8a5-6b551b0b1ac8"
} | {
"account_age_days": 528,
"account_id": "ACCT-8D3D2D3555A8",
"baseline_risk_score": 0.206,
"kyc_tier": "tier_2",
"session_entropy": 0.412
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 1075,
"timestamp": "2026-01-04T00:32:00Z",
"transaction_amount_usd": 55400.68
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.561,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1479590.71,
"financial_exposure_usd": 2955141.28,
"recoverable_pct": 0.891
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104421",
"label": "fraudulent",
"label_confidence": 0.82,
"severity": "medium",
"timestamp": "2026-01-04T01:41:00Z",
"trace_id": "736df9ee-bda7-026c-7d85-8eb245783316"
} | {
"account_age_days": 1838,
"account_id": "ACCT-C8C4A3A121AF",
"baseline_risk_score": 0.143,
"kyc_tier": "tier_2",
"session_entropy": 0.429
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 578,
"timestamp": "2026-01-04T01:41:00Z",
"transaction_amount_usd": 2552088.15
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.392,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3203998.6,
"financial_exposure_usd": 4979339.61,
"recoverable_pct": 0.801
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107042",
"label": "benign",
"label_confidence": 0.641,
"severity": "high",
"timestamp": "2026-01-05T21:22:00Z",
"trace_id": "4d1c40fc-d4ad-55b9-00e8-2c78e1049e69"
} | {
"account_age_days": 1618,
"account_id": "ACCT-A6EC72336D5D",
"baseline_risk_score": 0.132,
"kyc_tier": "tier_3",
"session_entropy": 0.411
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 760,
"timestamp": "2026-01-05T21:22:00Z",
"transaction_amount_usd": 11165.54
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.667,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3414.97,
"financial_exposure_usd": 3583.43,
"recoverable_pct": 0.729
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104275",
"label": "fraudulent",
"label_confidence": 0.941,
"severity": "medium",
"timestamp": "2026-01-03T23:15:00Z",
"trace_id": "83a548ba-5339-d38b-4ad0-36ac59de96d3"
} | {
"account_age_days": 165,
"account_id": "ACCT-6DB143719606",
"baseline_risk_score": 0.073,
"kyc_tier": "tier_1",
"session_entropy": 0.548
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 176,
"timestamp": "2026-01-03T18:22:00Z",
"transaction_amount_usd": 14.25
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.786,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4395775.3,
"financial_exposure_usd": 6208225.7,
"recoverable_pct": 0.675
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102548",
"label": "fraudulent",
"label_confidence": 0.926,
"severity": "medium",
"timestamp": "2026-01-02T18:28:00Z",
"trace_id": "cae9018a-2ef4-4bdc-1b4d-4def6d4fa46a"
} | {
"account_age_days": 1771,
"account_id": "ACCT-41F2EAC1B44C",
"baseline_risk_score": 0.621,
"kyc_tier": "tier_3",
"session_entropy": 0.331
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 1053,
"timestamp": "2026-01-02T18:28:00Z",
"transaction_amount_usd": 3242.1
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.432,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 265208.34,
"financial_exposure_usd": 651095.48,
"recoverable_pct": 0.367
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101870",
"label": "fraudulent",
"label_confidence": 0.788,
"severity": "critical",
"timestamp": "2026-01-02T07:10:00Z",
"trace_id": "88c9bab3-2615-37e3-be17-8c73e92b928d"
} | {
"account_age_days": 1386,
"account_id": "ACCT-DC8C0FCEA1FA",
"baseline_risk_score": 0.253,
"kyc_tier": "tier_2",
"session_entropy": 0.256
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 120,
"timestamp": "2026-01-02T07:10:00Z",
"transaction_amount_usd": 58225.95
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.667,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 695911.47,
"financial_exposure_usd": 848479.65,
"recoverable_pct": 0.021
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105618",
"label": "fraudulent",
"label_confidence": 0.609,
"severity": "medium",
"timestamp": "2026-01-04T21:38:00Z",
"trace_id": "3f676a4b-33a2-cfbf-a764-7eb9915460cf"
} | {
"account_age_days": 1402,
"account_id": "ACCT-598F9533CC1D",
"baseline_risk_score": 0.366,
"kyc_tier": "tier_2",
"session_entropy": 0.137
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 151,
"timestamp": "2026-01-04T17:25:00Z",
"transaction_amount_usd": 15.32
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.351,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1385890.11,
"financial_exposure_usd": 2694993.74,
"recoverable_pct": 0.663
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100933",
"label": "fraudulent",
"label_confidence": 0.939,
"severity": "critical",
"timestamp": "2026-01-01T15:33:00Z",
"trace_id": "b1dbd7a7-0929-bf8b-2a17-9285eb940e28"
} | {
"account_age_days": 1362,
"account_id": "ACCT-D357058B685A",
"baseline_risk_score": 0.615,
"kyc_tier": "tier_1",
"session_entropy": 0.821
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "BR",
"latency_ms": 416,
"timestamp": "2026-01-01T15:33:00Z",
"transaction_amount_usd": 115972.09
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.484,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 513554.75,
"financial_exposure_usd": 556470.59,
"recoverable_pct": 0.618
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107369",
"label": "benign",
"label_confidence": 0.73,
"severity": "medium",
"timestamp": "2026-01-06T02:49:00Z",
"trace_id": "479a2eba-68b3-3d3d-8737-cb5d4e436154"
} | {
"account_age_days": 1941,
"account_id": "ACCT-547F33E9E8FA",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.576
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 190,
"timestamp": "2026-01-06T02:49:00Z",
"transaction_amount_usd": 2655.64
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.654,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 248.98,
"financial_exposure_usd": 366.45,
"recoverable_pct": 0.434
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107731",
"label": "benign",
"label_confidence": 0.518,
"severity": "high",
"timestamp": "2026-01-06T08:51:00Z",
"trace_id": "ca78cf2e-78c3-4a8a-ea85-c8101c074558"
} | {
"account_age_days": 7,
"account_id": "ACCT-7926C1D36C94",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.668
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 702,
"timestamp": "2026-01-06T08:51:00Z",
"transaction_amount_usd": 6746.01
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.475,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 4133.04,
"financial_exposure_usd": 5048.82,
"recoverable_pct": 0.601
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106552",
"label": "fraudulent",
"label_confidence": 0.83,
"severity": "low",
"timestamp": "2026-01-05T13:12:00Z",
"trace_id": "c4acff87-dcbc-d63f-8cd2-f49c43301b99"
} | {
"account_age_days": 1601,
"account_id": "ACCT-4F0E121731C5",
"baseline_risk_score": 0.202,
"kyc_tier": "tier_1",
"session_entropy": 0.935
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 838,
"timestamp": "2026-01-05T13:12:00Z",
"transaction_amount_usd": 1625841.07
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.817,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3730232.59,
"financial_exposure_usd": 5539655.06,
"recoverable_pct": 0.851
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104387",
"label": "fraudulent",
"label_confidence": 0.698,
"severity": "medium",
"timestamp": "2026-01-04T01:07:00Z",
"trace_id": "713a36a2-578f-6266-bf8b-fbfd77f0daa8"
} | {
"account_age_days": 274,
"account_id": "ACCT-E5F273D54493",
"baseline_risk_score": 0.151,
"kyc_tier": "tier_1",
"session_entropy": 0.273
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 216,
"timestamp": "2026-01-04T01:07:00Z",
"transaction_amount_usd": 1104887
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK_IM... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.739,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1133789.26,
"financial_exposure_usd": 2499176.37,
"recoverable_pct": 0.606
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107147",
"label": "benign",
"label_confidence": 0.512,
"severity": "medium",
"timestamp": "2026-01-05T23:07:00Z",
"trace_id": "1d905f0e-b9b2-dd82-df04-023ef3b3484f"
} | {
"account_age_days": 1372,
"account_id": "ACCT-2640BF9112A0",
"baseline_risk_score": 0.19,
"kyc_tier": "tier_2",
"session_entropy": 0.733
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 154,
"timestamp": "2026-01-05T19:03:00Z",
"transaction_amount_usd": 3.28
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.577,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1477.13,
"financial_exposure_usd": 3084.7,
"recoverable_pct": 0.809
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102340",
"label": "fraudulent",
"label_confidence": 0.795,
"severity": "critical",
"timestamp": "2026-01-02T15:00:00Z",
"trace_id": "9e5d4225-cbd6-7a52-5ea7-f39d31506829"
} | {
"account_age_days": 301,
"account_id": "ACCT-F1FBE7F5DDB5",
"baseline_risk_score": 0.586,
"kyc_tier": "tier_2",
"session_entropy": 0.558
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 549,
"timestamp": "2026-01-02T15:00:00Z",
"transaction_amount_usd": 55302.74
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.67,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 776649.38,
"financial_exposure_usd": 778467.96,
"recoverable_pct": 0.76
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100992",
"label": "fraudulent",
"label_confidence": 0.957,
"severity": "medium",
"timestamp": "2026-01-01T16:32:00Z",
"trace_id": "3a90db29-70f0-c832-487b-3bfc80f5501a"
} | {
"account_age_days": 888,
"account_id": "ACCT-7E7E5C46CB86",
"baseline_risk_score": 0.256,
"kyc_tier": "tier_2",
"session_entropy": 0.347
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "SG",
"latency_ms": 504,
"timestamp": "2026-01-01T16:32:00Z",
"transaction_amount_usd": 49623.28
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.655,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 194125.4,
"financial_exposure_usd": 473342.46,
"recoverable_pct": 0.44
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101983",
"label": "fraudulent",
"label_confidence": 0.902,
"severity": "high",
"timestamp": "2026-01-02T09:03:00Z",
"trace_id": "38c58ce3-3fb6-56a4-4717-a35a7c0be9a9"
} | {
"account_age_days": 1630,
"account_id": "ACCT-50DCDE75BA58",
"baseline_risk_score": 0.3,
"kyc_tier": "tier_1",
"session_entropy": 0.702
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 307,
"timestamp": "2026-01-02T09:03:00Z",
"transaction_amount_usd": 25661.04
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.76,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 968982.12,
"financial_exposure_usd": 1443786.46,
"recoverable_pct": 0.561
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103438",
"label": "fraudulent",
"label_confidence": 0.741,
"severity": "medium",
"timestamp": "2026-01-03T09:18:00Z",
"trace_id": "05a8c9fc-5033-7a04-49f7-acc91711b8be"
} | {
"account_age_days": 1818,
"account_id": "ACCT-C83CC5C547DF",
"baseline_risk_score": 0.299,
"kyc_tier": "tier_2",
"session_entropy": 0.924
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 252,
"timestamp": "2026-01-03T09:18:00Z",
"transaction_amount_usd": 2373818.4
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.435,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 590036.58,
"financial_exposure_usd": 910230.86,
"recoverable_pct": 0.548
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104675",
"label": "fraudulent",
"label_confidence": 0.672,
"severity": "high",
"timestamp": "2026-01-04T05:55:00Z",
"trace_id": "45d071b3-f9d4-b8ed-5bd5-611c0d43c71f"
} | {
"account_age_days": 1872,
"account_id": "ACCT-D1F537436574",
"baseline_risk_score": 0.445,
"kyc_tier": "tier_2",
"session_entropy": 0.712
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 322,
"timestamp": "2026-01-03T18:59:00Z",
"transaction_amount_usd": 12.24
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.674,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 7701319.34,
"financial_exposure_usd": 9510827.85,
"recoverable_pct": 0.809
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100479",
"label": "fraudulent",
"label_confidence": 0.845,
"severity": "low",
"timestamp": "2026-01-01T07:59:00Z",
"trace_id": "ca3d02cf-fad6-d030-057f-74a473738569"
} | {
"account_age_days": 1474,
"account_id": "ACCT-FEFD0E2FE395",
"baseline_risk_score": 0.255,
"kyc_tier": "tier_1",
"session_entropy": 0.855
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 264,
"timestamp": "2025-12-31T21:39:00Z",
"transaction_amount_usd": 14.34
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.473,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 237476.34,
"financial_exposure_usd": 350998.13,
"recoverable_pct": 0.563
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105761",
"label": "fraudulent",
"label_confidence": 0.641,
"severity": "medium",
"timestamp": "2026-01-05T00:01:00Z",
"trace_id": "f2a44f0b-a42a-e5d0-dd10-e5fe9a5dd1ff"
} | {
"account_age_days": 1831,
"account_id": "ACCT-1683CFD49029",
"baseline_risk_score": 0.19,
"kyc_tier": "tier_2",
"session_entropy": 0.269
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 360,
"timestamp": "2026-01-05T00:01:00Z",
"transaction_amount_usd": 144260.97
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.88,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 3031587.18,
"financial_exposure_usd": 6147732.22,
"recoverable_pct": 0.572
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107298",
"label": "benign",
"label_confidence": 0.631,
"severity": "low",
"timestamp": "2026-01-06T01:38:00Z",
"trace_id": "999b7cdc-9119-06b0-2b48-c6810e704ef5"
} | {
"account_age_days": 966,
"account_id": "ACCT-294CA07FBBD0",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.489
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 1164,
"timestamp": "2026-01-06T01:38:00Z",
"transaction_amount_usd": 5770.7
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.62,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 2856.82,
"financial_exposure_usd": 3054.08,
"recoverable_pct": 0.632
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108976",
"label": "benign",
"label_confidence": 0.589,
"severity": "medium",
"timestamp": "2026-01-07T05:36:00Z",
"trace_id": "3a1088a6-e020-ddfc-7f0b-02bd4e9ca4fd"
} | {
"account_age_days": 1106,
"account_id": "ACCT-84FB9308CBC3",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.313
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 318,
"timestamp": "2026-01-07T05:36:00Z",
"transaction_amount_usd": 10923.24
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.741,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 839.18,
"financial_exposure_usd": 1371.72,
"recoverable_pct": 0.852
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101793",
"label": "fraudulent",
"label_confidence": 0.889,
"severity": "critical",
"timestamp": "2026-01-02T05:53:00Z",
"trace_id": "ee467d8d-e020-6455-84c6-b05d50f8ba4a"
} | {
"account_age_days": 1047,
"account_id": "ACCT-DE26E2908E99",
"baseline_risk_score": 0.301,
"kyc_tier": "tier_3",
"session_entropy": 0.127
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 1126,
"timestamp": "2026-01-02T05:53:00Z",
"transaction_amount_usd": 50374.76
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.629,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 932408.07,
"financial_exposure_usd": 1308752.08,
"recoverable_pct": 0.288
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100085",
"label": "fraudulent",
"label_confidence": 0.978,
"severity": "critical",
"timestamp": "2026-01-01T01:25:00Z",
"trace_id": "57390b03-10e9-4dce-6241-cba37b7ce7cc"
} | {
"account_age_days": 1738,
"account_id": "ACCT-FC8621109C8A",
"baseline_risk_score": 0.616,
"kyc_tier": "tier_1",
"session_entropy": 0.534
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 780,
"timestamp": "2026-01-01T01:25:00Z",
"transaction_amount_usd": 71120.94
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.387,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 265564.5,
"financial_exposure_usd": 663072.49,
"recoverable_pct": 0.476
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104704",
"label": "fraudulent",
"label_confidence": 0.886,
"severity": "high",
"timestamp": "2026-01-04T06:24:00Z",
"trace_id": "d1c1ab1f-af28-cb32-75a7-81d7d17dcf7a"
} | {
"account_age_days": 1132,
"account_id": "ACCT-A1C18C361810",
"baseline_risk_score": 0.222,
"kyc_tier": "tier_1",
"session_entropy": 0.451
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 756,
"timestamp": "2026-01-04T06:24:00Z",
"transaction_amount_usd": 2017884.19
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.493,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3816466.23,
"financial_exposure_usd": 4466110.22,
"recoverable_pct": 0.688
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107945",
"label": "benign",
"label_confidence": 0.598,
"severity": "low",
"timestamp": "2026-01-06T12:25:00Z",
"trace_id": "1ea63f05-51d3-646b-dfdd-469ad53fe6b4"
} | {
"account_age_days": 1750,
"account_id": "ACCT-C9716940A515",
"baseline_risk_score": 0.166,
"kyc_tier": "tier_2",
"session_entropy": 0.279
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 244,
"timestamp": "2026-01-06T08:32:00Z",
"transaction_amount_usd": 8.06
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.585,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1266.53,
"financial_exposure_usd": 1772.31,
"recoverable_pct": 0.729
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101247",
"label": "fraudulent",
"label_confidence": 0.939,
"severity": "critical",
"timestamp": "2026-01-01T20:47:00Z",
"trace_id": "200ad030-3c68-e2cf-90f4-37131be68d20"
} | {
"account_age_days": 879,
"account_id": "ACCT-07BBFF575A38",
"baseline_risk_score": 0.463,
"kyc_tier": "tier_2",
"session_entropy": 0.878
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 806,
"timestamp": "2026-01-01T20:47:00Z",
"transaction_amount_usd": 119601.46
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.567,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 208452.38,
"financial_exposure_usd": 262201.48,
"recoverable_pct": 0.179
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102502",
"label": "fraudulent",
"label_confidence": 0.954,
"severity": "critical",
"timestamp": "2026-01-02T17:42:00Z",
"trace_id": "bb3f341b-f3d6-1e72-77f2-4c1647b555f2"
} | {
"account_age_days": 26,
"account_id": "ACCT-ED0AB9721030",
"baseline_risk_score": 0.518,
"kyc_tier": "tier_1",
"session_entropy": 0.563
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "HK",
"latency_ms": 825,
"timestamp": "2026-01-02T17:42:00Z",
"transaction_amount_usd": 113250.86
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.55,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 148442.13,
"financial_exposure_usd": 194100.63,
"recoverable_pct": 0.372
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103754",
"label": "fraudulent",
"label_confidence": 0.791,
"severity": "high",
"timestamp": "2026-01-03T14:34:00Z",
"trace_id": "f3453173-487f-3737-7ad0-660157f4e57f"
} | {
"account_age_days": 1713,
"account_id": "ACCT-3C082D23FC8C",
"baseline_risk_score": 0.421,
"kyc_tier": "tier_1",
"session_entropy": 0.748
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 280,
"timestamp": "2026-01-03T14:34:00Z",
"transaction_amount_usd": 1776238.87
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.629,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5210864.79,
"financial_exposure_usd": 5824320.82,
"recoverable_pct": 0.71
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109933",
"label": "benign",
"label_confidence": 0.578,
"severity": "low",
"timestamp": "2026-01-07T21:33:00Z",
"trace_id": "c5d1a559-ef02-6b14-e925-c1ad2d7155b0"
} | {
"account_age_days": 1254,
"account_id": "ACCT-DF1B2AAC5CB2",
"baseline_risk_score": 0.144,
"kyc_tier": "tier_1",
"session_entropy": 0.835
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 268,
"timestamp": "2026-01-07T21:33:00Z",
"transaction_amount_usd": 6970.89
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.798,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1003.85,
"financial_exposure_usd": 1470.37,
"recoverable_pct": 0.91
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100616",
"label": "fraudulent",
"label_confidence": 0.759,
"severity": "high",
"timestamp": "2026-01-01T10:16:00Z",
"trace_id": "733f4ae0-7bd1-5d83-1b78-376bdfd1d149"
} | {
"account_age_days": 1661,
"account_id": "ACCT-FD25F1A7E9B0",
"baseline_risk_score": 0.366,
"kyc_tier": "tier_1",
"session_entropy": 0.655
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 193,
"timestamp": "2025-12-31T23:14:00Z",
"transaction_amount_usd": 5.18
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.868,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 794709.86,
"financial_exposure_usd": 1086683.38,
"recoverable_pct": 0.514
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100124",
"label": "fraudulent",
"label_confidence": 0.956,
"severity": "high",
"timestamp": "2026-01-01T02:04:00Z",
"trace_id": "840d214b-3bd5-4863-7974-c90b35ba5e93"
} | {
"account_age_days": 68,
"account_id": "ACCT-ACC54C621AB4",
"baseline_risk_score": 0.431,
"kyc_tier": "tier_3",
"session_entropy": 0.57
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 255,
"timestamp": "2026-01-01T02:04:00Z",
"transaction_amount_usd": 91035.75
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.643,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 156769.18,
"financial_exposure_usd": 301827.89,
"recoverable_pct": 0.775
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103612",
"label": "fraudulent",
"label_confidence": 0.857,
"severity": "low",
"timestamp": "2026-01-03T12:12:00Z",
"trace_id": "04f5ecb9-f7b1-2e79-3ea5-0884b8f7d8bb"
} | {
"account_age_days": 802,
"account_id": "ACCT-DEBE69D13906",
"baseline_risk_score": 0.395,
"kyc_tier": "tier_2",
"session_entropy": 0.83
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 286,
"timestamp": "2026-01-03T05:40:00Z",
"transaction_amount_usd": 12.4
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.799,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3060950.11,
"financial_exposure_usd": 7424679.73,
"recoverable_pct": 0.535
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104164",
"label": "fraudulent",
"label_confidence": 0.752,
"severity": "critical",
"timestamp": "2026-01-03T21:24:00Z",
"trace_id": "9410fe89-f046-f927-4ca2-eac51b22ab5f"
} | {
"account_age_days": 453,
"account_id": "ACCT-6FB169A36043",
"baseline_risk_score": 0.15,
"kyc_tier": "tier_3",
"session_entropy": 0.407
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 785,
"timestamp": "2026-01-03T21:24:00Z",
"transaction_amount_usd": 1831620.43
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.86,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1760539.53,
"financial_exposure_usd": 2528985.01,
"recoverable_pct": 0.968
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109303",
"label": "benign",
"label_confidence": 0.653,
"severity": "high",
"timestamp": "2026-01-07T11:03:00Z",
"trace_id": "465473c5-88f4-20e9-62a7-6aeda31a6f22"
} | {
"account_age_days": 1317,
"account_id": "ACCT-FA978FFA6B79",
"baseline_risk_score": 0.082,
"kyc_tier": "tier_2",
"session_entropy": 0.701
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 239,
"timestamp": "2026-01-07T11:03:00Z",
"transaction_amount_usd": 2361.04
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.474,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2539.18,
"financial_exposure_usd": 4351.01,
"recoverable_pct": 0.88
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104654",
"label": "fraudulent",
"label_confidence": 0.713,
"severity": "high",
"timestamp": "2026-01-04T05:34:00Z",
"trace_id": "b380b817-1497-fb33-48e1-7990550907b2"
} | {
"account_age_days": 1121,
"account_id": "ACCT-ADCD8BF68B94",
"baseline_risk_score": 0.304,
"kyc_tier": "tier_1",
"session_entropy": 0.175
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 543,
"timestamp": "2026-01-04T05:34:00Z",
"transaction_amount_usd": 2702728.47
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.582,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2430491.01,
"financial_exposure_usd": 3873498.62,
"recoverable_pct": 0.894
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100387",
"label": "fraudulent",
"label_confidence": 0.832,
"severity": "high",
"timestamp": "2026-01-01T06:27:00Z",
"trace_id": "aca9af9e-fc85-9916-236e-d0d0f1e9f9bd"
} | {
"account_age_days": 1171,
"account_id": "ACCT-2FD8178299A1",
"baseline_risk_score": 0.535,
"kyc_tier": "tier_2",
"session_entropy": 0.192
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 453,
"timestamp": "2026-01-01T06:27:00Z",
"transaction_amount_usd": 44061.25
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.692,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 285441.53,
"financial_exposure_usd": 452620.3,
"recoverable_pct": 0.825
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107091",
"label": "benign",
"label_confidence": 0.611,
"severity": "low",
"timestamp": "2026-01-05T22:11:00Z",
"trace_id": "a0eb252f-8258-146e-ac28-a7fe85100e85"
} | {
"account_age_days": 295,
"account_id": "ACCT-AE6AB1231828",
"baseline_risk_score": 0.198,
"kyc_tier": "tier_2",
"session_entropy": 0.103
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 797,
"timestamp": "2026-01-05T22:11:00Z",
"transaction_amount_usd": 9029.11
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.466,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1087.89,
"financial_exposure_usd": 1977.37,
"recoverable_pct": 0.98
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106510",
"label": "fraudulent",
"label_confidence": 0.657,
"severity": "low",
"timestamp": "2026-01-05T12:30:00Z",
"trace_id": "999dd17b-3cea-0165-0cb5-6743aee4cbd6"
} | {
"account_age_days": 529,
"account_id": "ACCT-8D7A694518E6",
"baseline_risk_score": 0.244,
"kyc_tier": "tier_2",
"session_entropy": 0.854
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 604,
"timestamp": "2026-01-05T12:30:00Z",
"transaction_amount_usd": 1122063.56
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.417,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 6446991.71,
"financial_exposure_usd": 7637414.49,
"recoverable_pct": 0.525
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100538",
"label": "fraudulent",
"label_confidence": 0.823,
"severity": "medium",
"timestamp": "2026-01-01T08:58:00Z",
"trace_id": "aeca599c-ee88-d132-2523-0758d99a0673"
} | {
"account_age_days": 1311,
"account_id": "ACCT-C083A0E2E920",
"baseline_risk_score": 0.5,
"kyc_tier": "tier_2",
"session_entropy": 0.295
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 344,
"timestamp": "2026-01-01T08:58:00Z",
"transaction_amount_usd": 19787.47
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.789,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 127168.68,
"financial_exposure_usd": 153349.98,
"recoverable_pct": 0.442
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102467",
"label": "fraudulent",
"label_confidence": 0.945,
"severity": "medium",
"timestamp": "2026-01-02T17:07:00Z",
"trace_id": "0f1c3274-3ff9-a154-a128-ec62de3f95ff"
} | {
"account_age_days": 1973,
"account_id": "ACCT-9EB99763D494",
"baseline_risk_score": 0.401,
"kyc_tier": "tier_2",
"session_entropy": 0.454
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 1135,
"timestamp": "2026-01-02T17:07:00Z",
"transaction_amount_usd": 37175.81
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.396,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 273731.76,
"financial_exposure_usd": 393273.89,
"recoverable_pct": 0.349
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100330",
"label": "fraudulent",
"label_confidence": 0.802,
"severity": "medium",
"timestamp": "2026-01-01T05:30:00Z",
"trace_id": "5fa686f0-961d-4530-a068-f9edbfb9209f"
} | {
"account_age_days": 1841,
"account_id": "ACCT-CBD4B8DB541C",
"baseline_risk_score": 0.604,
"kyc_tier": "tier_1",
"session_entropy": 0.71
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 85,
"timestamp": "2026-01-01T05:30:00Z",
"transaction_amount_usd": 568.18
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.863,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 956231.69,
"financial_exposure_usd": 1170295.66,
"recoverable_pct": 0.177
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102503",
"label": "fraudulent",
"label_confidence": 0.911,
"severity": "critical",
"timestamp": "2026-01-02T17:43:00Z",
"trace_id": "a36de350-ca70-6c1b-49a6-625cb7572c21"
} | {
"account_age_days": 1056,
"account_id": "ACCT-244F937D3735",
"baseline_risk_score": 0.27,
"kyc_tier": "tier_3",
"session_entropy": 0.805
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 764,
"timestamp": "2026-01-02T17:43:00Z",
"transaction_amount_usd": 82108.23
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.392,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 293321.59,
"financial_exposure_usd": 347299.61,
"recoverable_pct": 0.489
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100188",
"label": "fraudulent",
"label_confidence": 0.803,
"severity": "medium",
"timestamp": "2026-01-01T03:08:00Z",
"trace_id": "7cbb2627-9929-c7c7-3709-d7d396e15645"
} | {
"account_age_days": 969,
"account_id": "ACCT-51EC8F304E2D",
"baseline_risk_score": 0.293,
"kyc_tier": "tier_1",
"session_entropy": 0.751
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "DE",
"latency_ms": 986,
"timestamp": "2026-01-01T03:08:00Z",
"transaction_amount_usd": 70014.77
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.907,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 959827.84,
"financial_exposure_usd": 1292514.55,
"recoverable_pct": 0.131
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105610",
"label": "fraudulent",
"label_confidence": 0.847,
"severity": "critical",
"timestamp": "2026-01-04T21:30:00Z",
"trace_id": "13389f48-9ebf-4cc1-ccc3-070fab0eb741"
} | {
"account_age_days": 1437,
"account_id": "ACCT-D389435B18F7",
"baseline_risk_score": 0.402,
"kyc_tier": "tier_3",
"session_entropy": 0.266
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 152,
"timestamp": "2026-01-04T15:48:00Z",
"transaction_amount_usd": 0.11
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.465,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4324395.37,
"financial_exposure_usd": 5500776.7,
"recoverable_pct": 0.515
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107304",
"label": "benign",
"label_confidence": 0.724,
"severity": "low",
"timestamp": "2026-01-06T01:44:00Z",
"trace_id": "65a05d3b-410b-7e9a-5f7d-a861ce597781"
} | {
"account_age_days": 1628,
"account_id": "ACCT-C6E73096D883",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.761
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 299,
"timestamp": "2026-01-05T18:00:00Z",
"transaction_amount_usd": 20.61
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.599,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2560.13,
"financial_exposure_usd": 6309.66,
"recoverable_pct": 0.463
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108334",
"label": "benign",
"label_confidence": 0.676,
"severity": "low",
"timestamp": "2026-01-06T18:54:00Z",
"trace_id": "c177e753-2487-ad1d-23ef-50bdd0dee77e"
} | {
"account_age_days": 1519,
"account_id": "ACCT-5AE92C299475",
"baseline_risk_score": 0.18,
"kyc_tier": "tier_1",
"session_entropy": 0.122
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 864,
"timestamp": "2026-01-06T18:54:00Z",
"transaction_amount_usd": 5455.79
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.536,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2259.59,
"financial_exposure_usd": 2922.29,
"recoverable_pct": 0.69
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105855",
"label": "fraudulent",
"label_confidence": 0.713,
"severity": "high",
"timestamp": "2026-01-05T01:35:00Z",
"trace_id": "140fd794-0866-5668-7c06-602507abca8e"
} | {
"account_age_days": 332,
"account_id": "ACCT-F9E7439D078E",
"baseline_risk_score": 0.373,
"kyc_tier": "tier_1",
"session_entropy": 0.519
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 352,
"timestamp": "2026-01-04T18:14:00Z",
"transaction_amount_usd": 20.22
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.753,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4007903.31,
"financial_exposure_usd": 9993048.81,
"recoverable_pct": 0.464
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109565",
"label": "benign",
"label_confidence": 0.58,
"severity": "critical",
"timestamp": "2026-01-07T15:25:00Z",
"trace_id": "1d57e1a0-b7d8-906f-38c2-33c3eae963cf"
} | {
"account_age_days": 590,
"account_id": "ACCT-7DFD7D33A41E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.566
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 936,
"timestamp": "2026-01-07T15:25:00Z",
"transaction_amount_usd": 14997.88
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.471,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1726.44,
"financial_exposure_usd": 2098.8,
"recoverable_pct": 0.651
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104686",
"label": "fraudulent",
"label_confidence": 0.812,
"severity": "medium",
"timestamp": "2026-01-04T06:06:00Z",
"trace_id": "dd2b8b93-ef9e-ff0a-2332-edd69e1d8fd7"
} | {
"account_age_days": 468,
"account_id": "ACCT-C9F3715CB961",
"baseline_risk_score": 0.287,
"kyc_tier": "tier_2",
"session_entropy": 0.212
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 125,
"timestamp": "2026-01-04T03:00:00Z",
"transaction_amount_usd": 1.59
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.864,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3713937.72,
"financial_exposure_usd": 5529301.05,
"recoverable_pct": 0.802
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104606",
"label": "fraudulent",
"label_confidence": 0.73,
"severity": "critical",
"timestamp": "2026-01-04T04:46:00Z",
"trace_id": "75563b80-e96a-baad-3185-1f5abd56f01c"
} | {
"account_age_days": 1928,
"account_id": "ACCT-969AC4231BC5",
"baseline_risk_score": 0.268,
"kyc_tier": "tier_2",
"session_entropy": 0.525
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 1046,
"timestamp": "2026-01-04T04:46:00Z",
"transaction_amount_usd": 2882518.93
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.354,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 6074005.02,
"financial_exposure_usd": 7022241.9,
"recoverable_pct": 0.693
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101438",
"label": "fraudulent",
"label_confidence": 0.757,
"severity": "medium",
"timestamp": "2026-01-01T23:58:00Z",
"trace_id": "53fa9655-6967-3e84-99c8-7f99de5151e2"
} | {
"account_age_days": 1770,
"account_id": "ACCT-F35B5ED63DB8",
"baseline_risk_score": 0.272,
"kyc_tier": "tier_1",
"session_entropy": 0.866
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 1130,
"timestamp": "2026-01-01T23:58:00Z",
"transaction_amount_usd": 34703.15
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.45,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 626636.26,
"financial_exposure_usd": 978422.74,
"recoverable_pct": 0.707
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107637",
"label": "benign",
"label_confidence": 0.64,
"severity": "high",
"timestamp": "2026-01-06T07:17:00Z",
"trace_id": "3ab4f64a-03ea-3d89-5697-81518430e4a3"
} | {
"account_age_days": 356,
"account_id": "ACCT-C6460C7AE258",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.305
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 297,
"timestamp": "2026-01-06T07:17:00Z",
"transaction_amount_usd": 1169.04
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.569,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1982.87,
"financial_exposure_usd": 2196.5,
"recoverable_pct": 0.834
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109480",
"label": "benign",
"label_confidence": 0.68,
"severity": "critical",
"timestamp": "2026-01-07T14:00:00Z",
"trace_id": "88216ac3-8640-a95c-10dc-1773a2f73265"
} | {
"account_age_days": 513,
"account_id": "ACCT-5CC961082129",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.25
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 572,
"timestamp": "2026-01-07T14:00:00Z",
"transaction_amount_usd": 14118.92
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.461,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 689.28,
"financial_exposure_usd": 1208.13,
"recoverable_pct": 0.816
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108487",
"label": "benign",
"label_confidence": 0.658,
"severity": "high",
"timestamp": "2026-01-06T21:27:00Z",
"trace_id": "23fb7bb5-d0d1-fe0b-c6d9-135ee53da52f"
} | {
"account_age_days": 1173,
"account_id": "ACCT-2972DC62BE81",
"baseline_risk_score": 0.06,
"kyc_tier": "tier_3",
"session_entropy": 0.516
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 940,
"timestamp": "2026-01-06T21:27:00Z",
"transaction_amount_usd": 7875.79
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.481,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 463.22,
"financial_exposure_usd": 980.33,
"recoverable_pct": 0.917
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102067",
"label": "fraudulent",
"label_confidence": 0.84,
"severity": "critical",
"timestamp": "2026-01-02T10:27:00Z",
"trace_id": "4f135126-40ea-bc0b-cb03-9eada8362305"
} | {
"account_age_days": 217,
"account_id": "ACCT-0770F2FE0130",
"baseline_risk_score": 0.528,
"kyc_tier": "tier_1",
"session_entropy": 0.796
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "SG",
"latency_ms": 638,
"timestamp": "2026-01-02T10:27:00Z",
"transaction_amount_usd": 37510.99
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.436,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 612706.33,
"financial_exposure_usd": 1330076.48,
"recoverable_pct": 0.442
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103113",
"label": "fraudulent",
"label_confidence": 0.83,
"severity": "medium",
"timestamp": "2026-01-03T03:53:00Z",
"trace_id": "91bd8b73-d18e-54d5-9a1b-062913c09940"
} | {
"account_age_days": 514,
"account_id": "ACCT-400EC9F4B40A",
"baseline_risk_score": 0.397,
"kyc_tier": "tier_2",
"session_entropy": 0.519
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 1062,
"timestamp": "2026-01-03T03:53:00Z",
"transaction_amount_usd": 30851.62
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.583,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 215557.23,
"financial_exposure_usd": 317008.66,
"recoverable_pct": 0.773
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107103",
"label": "benign",
"label_confidence": 0.475,
"severity": "high",
"timestamp": "2026-01-05T22:23:00Z",
"trace_id": "8f48a42b-7946-6e10-d129-df220e1b2cb0"
} | {
"account_age_days": 1981,
"account_id": "ACCT-D80A09F31633",
"baseline_risk_score": 0.108,
"kyc_tier": "tier_1",
"session_entropy": 0.213
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 342,
"timestamp": "2026-01-05T18:07:00Z",
"transaction_amount_usd": 23.47
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.683,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 822.15,
"financial_exposure_usd": 1893.17,
"recoverable_pct": 0.816
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105984",
"label": "fraudulent",
"label_confidence": 0.687,
"severity": "medium",
"timestamp": "2026-01-05T03:44:00Z",
"trace_id": "584a67eb-547a-47ee-4ace-9f0111bb475a"
} | {
"account_age_days": 163,
"account_id": "ACCT-57BB41BACA0B",
"baseline_risk_score": 0.399,
"kyc_tier": "tier_3",
"session_entropy": 0.764
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 899,
"timestamp": "2026-01-05T03:44:00Z",
"transaction_amount_usd": 1017877.04
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.801,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2881325.13,
"financial_exposure_usd": 5065707.49,
"recoverable_pct": 0.513
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109808",
"label": "benign",
"label_confidence": 0.737,
"severity": "low",
"timestamp": "2026-01-07T19:28:00Z",
"trace_id": "d62233ef-9522-b79c-e0de-3a7965a9e072"
} | {
"account_age_days": 1087,
"account_id": "ACCT-488CC74E474A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.919
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 963,
"timestamp": "2026-01-07T19:28:00Z",
"transaction_amount_usd": 12087.93
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.557,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3619.92,
"financial_exposure_usd": 4724.64,
"recoverable_pct": 0.446
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100942",
"label": "fraudulent",
"label_confidence": 0.881,
"severity": "high",
"timestamp": "2026-01-01T15:42:00Z",
"trace_id": "13e9f0e3-2607-e444-a19d-13f1ff7a5ced"
} | {
"account_age_days": 1595,
"account_id": "ACCT-03B3E3141544",
"baseline_risk_score": 0.591,
"kyc_tier": "tier_2",
"session_entropy": 0.16
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 183,
"timestamp": "2026-01-01T04:51:00Z",
"transaction_amount_usd": 18.09
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.852,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 743405.91,
"financial_exposure_usd": 753046.06,
"recoverable_pct": 0.531
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107666",
"label": "benign",
"label_confidence": 0.719,
"severity": "high",
"timestamp": "2026-01-06T07:46:00Z",
"trace_id": "54f960b4-8af7-476f-5e1f-9deea0ed38b5"
} | {
"account_age_days": 1499,
"account_id": "ACCT-C852120F9DB1",
"baseline_risk_score": 0.08,
"kyc_tier": "tier_3",
"session_entropy": 0.2
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 497,
"timestamp": "2026-01-06T07:46:00Z",
"transaction_amount_usd": 5685.84
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.591,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2362.06,
"financial_exposure_usd": 5284.2,
"recoverable_pct": 0.51
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104528",
"label": "fraudulent",
"label_confidence": 0.939,
"severity": "high",
"timestamp": "2026-01-04T03:28:00Z",
"trace_id": "2beeeb02-e001-b3db-dc35-4c2f1468d6f6"
} | {
"account_age_days": 978,
"account_id": "ACCT-6371CD320A29",
"baseline_risk_score": 0.175,
"kyc_tier": "tier_2",
"session_entropy": 0.67
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 298,
"timestamp": "2026-01-03T20:11:00Z",
"transaction_amount_usd": 11.14
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.452,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2690459.83,
"financial_exposure_usd": 2729748.7,
"recoverable_pct": 0.854
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106585",
"label": "fraudulent",
"label_confidence": 0.83,
"severity": "low",
"timestamp": "2026-01-05T13:45:00Z",
"trace_id": "1f0c3836-23ce-06dc-343c-31de50e52b02"
} | {
"account_age_days": 212,
"account_id": "ACCT-CE0D5B539383",
"baseline_risk_score": 0.32,
"kyc_tier": "tier_3",
"session_entropy": 0.477
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 104,
"timestamp": "2026-01-05T13:45:00Z",
"transaction_amount_usd": 1636150.62
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.52,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 2692574.21,
"financial_exposure_usd": 4988478.42,
"recoverable_pct": 0.681
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109061",
"label": "benign",
"label_confidence": 0.611,
"severity": "high",
"timestamp": "2026-01-07T07:01:00Z",
"trace_id": "f35f41ef-0aea-8654-0ebb-27f97a50d636"
} | {
"account_age_days": 1697,
"account_id": "ACCT-0E87398B2802",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.381
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 811,
"timestamp": "2026-01-07T07:01:00Z",
"transaction_amount_usd": 8191.35
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.611,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3615.83,
"financial_exposure_usd": 4767.55,
"recoverable_pct": 0.818
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104393",
"label": "fraudulent",
"label_confidence": 0.709,
"severity": "medium",
"timestamp": "2026-01-04T01:13:00Z",
"trace_id": "e6b72595-8045-2cbb-64a9-330ecd7e076a"
} | {
"account_age_days": 798,
"account_id": "ACCT-054B01F7D23B",
"baseline_risk_score": 0.212,
"kyc_tier": "tier_2",
"session_entropy": 0.704
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 827,
"timestamp": "2026-01-04T01:13:00Z",
"transaction_amount_usd": 1952130.01
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.666,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 287294.71,
"financial_exposure_usd": 458627.27,
"recoverable_pct": 0.916
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108026",
"label": "benign",
"label_confidence": 0.73,
"severity": "medium",
"timestamp": "2026-01-06T13:46:00Z",
"trace_id": "ded38930-63b1-5c6f-2fac-4b455c2bc1a5"
} | {
"account_age_days": 1277,
"account_id": "ACCT-196F54B4C6ED",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.338
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 318,
"timestamp": "2026-01-06T08:34:00Z",
"transaction_amount_usd": 20.89
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.787,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1006.4,
"financial_exposure_usd": 1669.35,
"recoverable_pct": 0.873
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106841",
"label": "benign",
"label_confidence": 0.514,
"severity": "low",
"timestamp": "2026-01-05T18:01:00Z",
"trace_id": "9bb941f3-cdd9-cdcc-4467-40141e7e00b8"
} | {
"account_age_days": 484,
"account_id": "ACCT-15235FE5D4C7",
"baseline_risk_score": 0.087,
"kyc_tier": "tier_3",
"session_entropy": 0.656
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 838,
"timestamp": "2026-01-05T18:01:00Z",
"transaction_amount_usd": 11082.02
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.54,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1395.77,
"financial_exposure_usd": 2308.19,
"recoverable_pct": 0.822
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103019",
"label": "fraudulent",
"label_confidence": 0.937,
"severity": "critical",
"timestamp": "2026-01-03T02:19:00Z",
"trace_id": "d8453ebe-68d4-201d-ddb0-a68991fba6c2"
} | {
"account_age_days": 272,
"account_id": "ACCT-87C86665D2B3",
"baseline_risk_score": 0.403,
"kyc_tier": "tier_3",
"session_entropy": 0.453
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 775,
"timestamp": "2026-01-03T02:19:00Z",
"transaction_amount_usd": 60381.23
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.407,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 647724.91,
"financial_exposure_usd": 652124.57,
"recoverable_pct": 0.835
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101170",
"label": "fraudulent",
"label_confidence": 0.877,
"severity": "high",
"timestamp": "2026-01-01T19:30:00Z",
"trace_id": "4f05ff08-66a2-4740-5963-8af747dadb5b"
} | {
"account_age_days": 1736,
"account_id": "ACCT-A2F4820ED7E7",
"baseline_risk_score": 0.379,
"kyc_tier": "tier_1",
"session_entropy": 0.44
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 155,
"timestamp": "2026-01-01T13:23:00Z",
"transaction_amount_usd": 11.97
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.751,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 390381.55,
"financial_exposure_usd": 653859.38,
"recoverable_pct": 0.025
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103955",
"label": "fraudulent",
"label_confidence": 0.895,
"severity": "low",
"timestamp": "2026-01-03T17:55:00Z",
"trace_id": "b7ba3a03-6e2e-9bec-af90-375e1842307c"
} | {
"account_age_days": 1568,
"account_id": "ACCT-1FB6D3C83FA5",
"baseline_risk_score": 0.389,
"kyc_tier": "tier_3",
"session_entropy": 0.332
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 159,
"timestamp": "2026-01-03T17:55:00Z",
"transaction_amount_usd": 173438.96
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.459,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1680777.55,
"financial_exposure_usd": 4180102.1,
"recoverable_pct": 0.632
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105169",
"label": "fraudulent",
"label_confidence": 0.772,
"severity": "medium",
"timestamp": "2026-01-04T14:09:00Z",
"trace_id": "0b274bfd-cd17-cc4f-0213-e81bfc76c18f"
} | {
"account_age_days": 748,
"account_id": "ACCT-875C5B6FF0DD",
"baseline_risk_score": 0.404,
"kyc_tier": "tier_1",
"session_entropy": 0.896
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 375,
"timestamp": "2026-01-04T14:09:00Z",
"transaction_amount_usd": 1809353.43
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.5,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND... | {
"customer_funds_at_risk_usd": 5688160.42,
"financial_exposure_usd": 6348804.18,
"recoverable_pct": 0.769
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100667",
"label": "fraudulent",
"label_confidence": 0.856,
"severity": "critical",
"timestamp": "2026-01-01T11:07:00Z",
"trace_id": "992fdb73-2a87-9ac0-7670-6b08477e781c"
} | {
"account_age_days": 464,
"account_id": "ACCT-C1FB16032E4D",
"baseline_risk_score": 0.58,
"kyc_tier": "tier_2",
"session_entropy": 0.375
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 871,
"timestamp": "2026-01-01T11:07:00Z",
"transaction_amount_usd": 83254.27
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.444,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 205696.15,
"financial_exposure_usd": 462137.86,
"recoverable_pct": 0.563
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100450",
"label": "fraudulent",
"label_confidence": 0.777,
"severity": "medium",
"timestamp": "2026-01-01T07:30:00Z",
"trace_id": "8e58b6c3-bd67-eb6a-ac2e-97b20c003f75"
} | {
"account_age_days": 390,
"account_id": "ACCT-3D1DCAAB9B88",
"baseline_risk_score": 0.355,
"kyc_tier": "tier_2",
"session_entropy": 0.46
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 373,
"timestamp": "2025-12-31T22:09:00Z",
"transaction_amount_usd": 16.65
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.705,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 414737.25,
"financial_exposure_usd": 456472.52,
"recoverable_pct": 0.369
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103073",
"label": "fraudulent",
"label_confidence": 0.969,
"severity": "medium",
"timestamp": "2026-01-03T03:13:00Z",
"trace_id": "96b07911-e254-060b-e968-087b7789f183"
} | {
"account_age_days": 1171,
"account_id": "ACCT-955DBA82A0C8",
"baseline_risk_score": 0.575,
"kyc_tier": "tier_2",
"session_entropy": 0.68
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 288,
"timestamp": "2026-01-03T03:13:00Z",
"transaction_amount_usd": 62906.55
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.734,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 732895.91,
"financial_exposure_usd": 812337.57,
"recoverable_pct": 0.751
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102317",
"label": "fraudulent",
"label_confidence": 0.753,
"severity": "high",
"timestamp": "2026-01-02T14:37:00Z",
"trace_id": "49f5fbca-1535-44c5-3401-08f21ddcd712"
} | {
"account_age_days": 146,
"account_id": "ACCT-6D24D5B122A1",
"baseline_risk_score": 0.509,
"kyc_tier": "tier_3",
"session_entropy": 0.841
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NL",
"latency_ms": 1001,
"timestamp": "2026-01-02T14:37:00Z",
"transaction_amount_usd": 10914.99
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.443,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 508792.88,
"financial_exposure_usd": 1093602.57,
"recoverable_pct": 0.434
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107488",
"label": "benign",
"label_confidence": 0.601,
"severity": "medium",
"timestamp": "2026-01-06T04:48:00Z",
"trace_id": "d172ffd5-2727-3d04-2c6a-771d0d4510fe"
} | {
"account_age_days": 363,
"account_id": "ACCT-20F229BA2933",
"baseline_risk_score": 0.115,
"kyc_tier": "tier_3",
"session_entropy": 0.106
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 552,
"timestamp": "2026-01-06T04:48:00Z",
"transaction_amount_usd": 11993.52
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.485,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3524.42,
"financial_exposure_usd": 4219.63,
"recoverable_pct": 0.512
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101367",
"label": "fraudulent",
"label_confidence": 0.811,
"severity": "critical",
"timestamp": "2026-01-01T22:47:00Z",
"trace_id": "5c888c48-b209-0e0d-b107-056976e298a6"
} | {
"account_age_days": 1711,
"account_id": "ACCT-5B8A8CFE1373",
"baseline_risk_score": 0.5,
"kyc_tier": "tier_3",
"session_entropy": 0.927
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 422,
"timestamp": "2026-01-01T22:47:00Z",
"transaction_amount_usd": 78233.36
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.601,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 443302.34,
"financial_exposure_usd": 598843.99,
"recoverable_pct": 0.638
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100527",
"label": "fraudulent",
"label_confidence": 0.822,
"severity": "high",
"timestamp": "2026-01-01T08:47:00Z",
"trace_id": "e2a721e9-4a12-2a4b-58aa-bc346ea8a10d"
} | {
"account_age_days": 964,
"account_id": "ACCT-589F50720E99",
"baseline_risk_score": 0.377,
"kyc_tier": "tier_3",
"session_entropy": 0.106
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "LU",
"latency_ms": 444,
"timestamp": "2026-01-01T08:47:00Z",
"transaction_amount_usd": 97393.33
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.647,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 281891.41,
"financial_exposure_usd": 698307.63,
"recoverable_pct": 0.475
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106313",
"label": "fraudulent",
"label_confidence": 0.741,
"severity": "high",
"timestamp": "2026-01-05T09:13:00Z",
"trace_id": "c788f3cd-0c01-a3a5-c430-8f122ea58212"
} | {
"account_age_days": 1198,
"account_id": "ACCT-1FAD19333447",
"baseline_risk_score": 0.18,
"kyc_tier": "tier_2",
"session_entropy": 0.205
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 113,
"timestamp": "2026-01-05T01:46:00Z",
"transaction_amount_usd": 11.16
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.606,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 5011273.16,
"financial_exposure_usd": 5966846.93,
"recoverable_pct": 0.516
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101782",
"label": "fraudulent",
"label_confidence": 0.906,
"severity": "critical",
"timestamp": "2026-01-02T05:42:00Z",
"trace_id": "c17970b5-7964-44ff-2f42-43400dc2825d"
} | {
"account_age_days": 840,
"account_id": "ACCT-60927263B4FA",
"baseline_risk_score": 0.558,
"kyc_tier": "tier_3",
"session_entropy": 0.337
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 1152,
"timestamp": "2026-01-02T05:42:00Z",
"transaction_amount_usd": 46835.02
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.588,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 1197374.14,
"financial_exposure_usd": 1360783.38,
"recoverable_pct": 0.661
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109036",
"label": "benign",
"label_confidence": 0.527,
"severity": "high",
"timestamp": "2026-01-07T06:36:00Z",
"trace_id": "70f1f596-8060-ef76-cde7-dfcfa0637f5a"
} | {
"account_age_days": 233,
"account_id": "ACCT-C24A1FE4F5C1",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.733
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 113,
"timestamp": "2026-01-06T19:23:00Z",
"transaction_amount_usd": 22.11
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.465,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2090.45,
"financial_exposure_usd": 2386.56,
"recoverable_pct": 0.5
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101769",
"label": "fraudulent",
"label_confidence": 0.818,
"severity": "high",
"timestamp": "2026-01-02T05:29:00Z",
"trace_id": "2602f520-5231-bcf0-2b81-7b86758a98c0"
} | {
"account_age_days": 752,
"account_id": "ACCT-893213C4AA75",
"baseline_risk_score": 0.641,
"kyc_tier": "tier_1",
"session_entropy": 0.632
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NL",
"latency_ms": 262,
"timestamp": "2026-01-02T05:29:00Z",
"transaction_amount_usd": 99970.9
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.616,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 638321.84,
"financial_exposure_usd": 844184.67,
"recoverable_pct": 0.116
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106607",
"label": "fraudulent",
"label_confidence": 0.788,
"severity": "high",
"timestamp": "2026-01-05T14:07:00Z",
"trace_id": "a728f228-55dd-9038-ef90-0531c7a4e6b3"
} | {
"account_age_days": 1032,
"account_id": "ACCT-4778F79B00B8",
"baseline_risk_score": 0.19,
"kyc_tier": "tier_2",
"session_entropy": 0.704
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 589,
"timestamp": "2026-01-05T14:07:00Z",
"transaction_amount_usd": 55484.18
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.419,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2133477.39,
"financial_exposure_usd": 2845684.25,
"recoverable_pct": 0.747
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108731",
"label": "benign",
"label_confidence": 0.554,
"severity": "low",
"timestamp": "2026-01-07T01:31:00Z",
"trace_id": "10bae2ff-c50e-d6e0-2d2e-cf9fcf7a8280"
} | {
"account_age_days": 540,
"account_id": "ACCT-01D254E26A49",
"baseline_risk_score": 0.062,
"kyc_tier": "tier_3",
"session_entropy": 0.2
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 106,
"timestamp": "2026-01-07T01:31:00Z",
"transaction_amount_usd": 6402.68
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.564,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 10575.15,
"financial_exposure_usd": 11481.32,
"recoverable_pct": 0.741
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101595",
"label": "fraudulent",
"label_confidence": 0.774,
"severity": "high",
"timestamp": "2026-01-02T02:35:00Z",
"trace_id": "ce30c11c-bc69-5a93-e9f4-88c478a7ddfd"
} | {
"account_age_days": 1633,
"account_id": "ACCT-099BB52A5B9D",
"baseline_risk_score": 0.256,
"kyc_tier": "tier_1",
"session_entropy": 0.53
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 333,
"timestamp": "2026-01-01T20:59:00Z",
"transaction_amount_usd": 15.75
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.935,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 639402.47,
"financial_exposure_usd": 910617.91,
"recoverable_pct": 0.654
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108511",
"label": "benign",
"label_confidence": 0.697,
"severity": "high",
"timestamp": "2026-01-06T21:51:00Z",
"trace_id": "6970a36d-0850-30a9-325b-b4e0a80babd4"
} | {
"account_age_days": 799,
"account_id": "ACCT-4157E04CDEE8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.237
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 713,
"timestamp": "2026-01-06T21:51:00Z",
"transaction_amount_usd": 7279.07
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.798,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3150.74,
"financial_exposure_usd": 3215.36,
"recoverable_pct": 0.95
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104467",
"label": "fraudulent",
"label_confidence": 0.917,
"severity": "medium",
"timestamp": "2026-01-04T02:27:00Z",
"trace_id": "cf0c8ee2-ad6e-f1c2-df62-249bcb90aeba"
} | {
"account_age_days": 825,
"account_id": "ACCT-C4CF5859486E",
"baseline_risk_score": 0.255,
"kyc_tier": "tier_2",
"session_entropy": 0.332
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 1158,
"timestamp": "2026-01-04T02:27:00Z",
"transaction_amount_usd": 1499065.18
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.947,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 5153228.96,
"financial_exposure_usd": 5643965.19,
"recoverable_pct": 0.946
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108129",
"label": "benign",
"label_confidence": 0.586,
"severity": "low",
"timestamp": "2026-01-06T15:29:00Z",
"trace_id": "5af53461-7a14-94cf-2339-750c7fcfc2cd"
} | {
"account_age_days": 320,
"account_id": "ACCT-4929D3D1BEB1",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.624
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 590,
"timestamp": "2026-01-06T15:29:00Z",
"transaction_amount_usd": 3843.73
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.707,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3853.39,
"financial_exposure_usd": 4878.77,
"recoverable_pct": 0.768
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108676",
"label": "benign",
"label_confidence": 0.734,
"severity": "medium",
"timestamp": "2026-01-07T00:36:00Z",
"trace_id": "edbe974f-0106-0e3d-63c3-7a2c9c4d7638"
} | {
"account_age_days": 1918,
"account_id": "ACCT-5F3764862B16",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.427
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 274,
"timestamp": "2026-01-07T00:36:00Z",
"transaction_amount_usd": 9079.16
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.694,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2584.53,
"financial_exposure_usd": 2628.87,
"recoverable_pct": 0.549
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107494",
"label": "benign",
"label_confidence": 0.732,
"severity": "medium",
"timestamp": "2026-01-06T04:54:00Z",
"trace_id": "a4c94b66-48ed-cfda-8f65-2c18d0addded"
} | {
"account_age_days": 525,
"account_id": "ACCT-9CD94A7007FB",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.206
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 126,
"timestamp": "2026-01-05T23:57:00Z",
"transaction_amount_usd": 18.98
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.683,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 924.77,
"financial_exposure_usd": 1717.6,
"recoverable_pct": 0.921
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.