schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102868",
"label": "fraudulent",
"label_confidence": 0.754,
"severity": "low",
"timestamp": "2026-01-02T23:48:00Z",
"trace_id": "f1fd47da-f252-5a35-e34b-837b43769401"
} | {
"account_age_days": 1632,
"account_id": "ACCT-221F4823FB1B",
"baseline_risk_score": 0.645,
"kyc_tier": "tier_1",
"session_entropy": 0.894
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 91,
"timestamp": "2026-01-02T23:48:00Z",
"transaction_amount_usd": 36820.02
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.435,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 579751.5,
"financial_exposure_usd": 867233.9,
"recoverable_pct": 0.391
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109320",
"label": "benign",
"label_confidence": 0.574,
"severity": "low",
"timestamp": "2026-01-07T11:20:00Z",
"trace_id": "260262c9-166d-d3a7-4d0d-f63296e37207"
} | {
"account_age_days": 35,
"account_id": "ACCT-77D28F26C565",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.592
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 1041,
"timestamp": "2026-01-07T11:20:00Z",
"transaction_amount_usd": 9365.65
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.75,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 1215.58,
"financial_exposure_usd": 2011.42,
"recoverable_pct": 0.762
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108792",
"label": "benign",
"label_confidence": 0.562,
"severity": "high",
"timestamp": "2026-01-07T02:32:00Z",
"trace_id": "62ce53a9-1457-a62b-5981-7266f94ca771"
} | {
"account_age_days": 1239,
"account_id": "ACCT-B4538A8C646E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.563
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 244,
"timestamp": "2026-01-06T21:20:00Z",
"transaction_amount_usd": 17.35
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.54,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 1834.17,
"financial_exposure_usd": 3358.24,
"recoverable_pct": 0.672
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107918",
"label": "benign",
"label_confidence": 0.532,
"severity": "low",
"timestamp": "2026-01-06T11:58:00Z",
"trace_id": "d234311a-b2ce-8cb2-fe4f-9193f7822db6"
} | {
"account_age_days": 903,
"account_id": "ACCT-C05DF82F1F86",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.882
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 418,
"timestamp": "2026-01-06T11:58:00Z",
"transaction_amount_usd": 6229.94
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.721,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3605.43,
"financial_exposure_usd": 4770.17,
"recoverable_pct": 0.5
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101770",
"label": "fraudulent",
"label_confidence": 0.764,
"severity": "high",
"timestamp": "2026-01-02T05:30:00Z",
"trace_id": "7e1bf364-2888-7faf-6bd3-8454d3df881c"
} | {
"account_age_days": 591,
"account_id": "ACCT-BEF6AA057432",
"baseline_risk_score": 0.26,
"kyc_tier": "tier_2",
"session_entropy": 0.913
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 209,
"timestamp": "2026-01-01T17:07:00Z",
"transaction_amount_usd": 7.14
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.824,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 374903.36,
"financial_exposure_usd": 470308.52,
"recoverable_pct": 0.061
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102126",
"label": "fraudulent",
"label_confidence": 0.781,
"severity": "critical",
"timestamp": "2026-01-02T11:26:00Z",
"trace_id": "be1c5ce0-5f9e-943b-2ddf-7eea3738c219"
} | {
"account_age_days": 257,
"account_id": "ACCT-AF623F63CABA",
"baseline_risk_score": 0.606,
"kyc_tier": "tier_3",
"session_entropy": 0.554
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 283,
"timestamp": "2026-01-02T11:26:00Z",
"transaction_amount_usd": 46261.83
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.729,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 1056745.02,
"financial_exposure_usd": 1158631.11,
"recoverable_pct": 0.813
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106621",
"label": "fraudulent",
"label_confidence": 0.733,
"severity": "low",
"timestamp": "2026-01-05T14:21:00Z",
"trace_id": "0389edf9-a98f-a59f-9847-9c8929c7317e"
} | {
"account_age_days": 1102,
"account_id": "ACCT-BE5434C65B8E",
"baseline_risk_score": 0.113,
"kyc_tier": "tier_1",
"session_entropy": 0.813
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 886,
"timestamp": "2026-01-05T14:21:00Z",
"transaction_amount_usd": 2925342.84
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.407,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3519986.42,
"financial_exposure_usd": 4110906.05,
"recoverable_pct": 0.574
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103576",
"label": "fraudulent",
"label_confidence": 0.84,
"severity": "medium",
"timestamp": "2026-01-03T11:36:00Z",
"trace_id": "5fd56825-8db1-c7d8-67f1-313c24be91ac"
} | {
"account_age_days": 63,
"account_id": "ACCT-F1037211344C",
"baseline_risk_score": 0.159,
"kyc_tier": "tier_1",
"session_entropy": 0.55
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 450,
"timestamp": "2026-01-03T11:36:00Z",
"transaction_amount_usd": 2639948.64
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.899,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5982885.21,
"financial_exposure_usd": 6827770.01,
"recoverable_pct": 0.751
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101763",
"label": "fraudulent",
"label_confidence": 0.827,
"severity": "medium",
"timestamp": "2026-01-02T05:23:00Z",
"trace_id": "1d932918-96d8-8d39-5cc7-d5abc42d5b97"
} | {
"account_age_days": 1922,
"account_id": "ACCT-9A06253261FD",
"baseline_risk_score": 0.633,
"kyc_tier": "tier_1",
"session_entropy": 0.568
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "GB",
"latency_ms": 1193,
"timestamp": "2026-01-02T05:23:00Z",
"transaction_amount_usd": 75125.95
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.763,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 595776,
"financial_exposure_usd": 880807.07,
"recoverable_pct": 0.303
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100820",
"label": "fraudulent",
"label_confidence": 0.955,
"severity": "critical",
"timestamp": "2026-01-01T13:40:00Z",
"trace_id": "059e9837-2b11-c1f1-e02b-eeab4c7e8b29"
} | {
"account_age_days": 1225,
"account_id": "ACCT-117240366B5B",
"baseline_risk_score": 0.58,
"kyc_tier": "tier_3",
"session_entropy": 0.496
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 359,
"timestamp": "2026-01-01T11:00:00Z",
"transaction_amount_usd": 22.18
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.421,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 395176.52,
"financial_exposure_usd": 746698.42,
"recoverable_pct": 0.714
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106484",
"label": "fraudulent",
"label_confidence": 0.676,
"severity": "low",
"timestamp": "2026-01-05T12:04:00Z",
"trace_id": "b82e1e95-015b-a66e-8cca-6df7bafecbf8"
} | {
"account_age_days": 195,
"account_id": "ACCT-F1F90E5A51AD",
"baseline_risk_score": 0.226,
"kyc_tier": "tier_1",
"session_entropy": 0.132
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 497,
"timestamp": "2026-01-05T12:04:00Z",
"transaction_amount_usd": 962949.64
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.443,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1554449.31,
"financial_exposure_usd": 2707834.52,
"recoverable_pct": 0.674
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107943",
"label": "benign",
"label_confidence": 0.471,
"severity": "high",
"timestamp": "2026-01-06T12:23:00Z",
"trace_id": "6225d203-9ac1-9fdd-cd73-349a56667d58"
} | {
"account_age_days": 992,
"account_id": "ACCT-72DD9C6AF1D7",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.333
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 541,
"timestamp": "2026-01-06T12:23:00Z",
"transaction_amount_usd": 11442.64
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.58,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 736.38,
"financial_exposure_usd": 847.22,
"recoverable_pct": 0.525
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107673",
"label": "benign",
"label_confidence": 0.705,
"severity": "high",
"timestamp": "2026-01-06T07:53:00Z",
"trace_id": "1a4434ce-6bd3-7d7e-4ae7-53d82814328a"
} | {
"account_age_days": 441,
"account_id": "ACCT-D4BA792B52D1",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.442
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 609,
"timestamp": "2026-01-06T07:53:00Z",
"transaction_amount_usd": 4876.84
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.717,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1288.35,
"financial_exposure_usd": 1448.26,
"recoverable_pct": 0.436
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102904",
"label": "fraudulent",
"label_confidence": 0.975,
"severity": "medium",
"timestamp": "2026-01-03T00:24:00Z",
"trace_id": "aafd1da3-ff32-2db4-0b64-7f7c023b7690"
} | {
"account_age_days": 264,
"account_id": "ACCT-2C3E2999B7FB",
"baseline_risk_score": 0.532,
"kyc_tier": "tier_2",
"session_entropy": 0.898
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 168,
"timestamp": "2026-01-02T23:09:00Z",
"transaction_amount_usd": 23.26
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.535,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 397490.82,
"financial_exposure_usd": 960249.82,
"recoverable_pct": 0.147
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101014",
"label": "fraudulent",
"label_confidence": 0.978,
"severity": "high",
"timestamp": "2026-01-01T16:54:00Z",
"trace_id": "ab4f2c5b-d193-21f1-be06-36e3e3e94379"
} | {
"account_age_days": 1500,
"account_id": "ACCT-42B2DB4F0ADF",
"baseline_risk_score": 0.44,
"kyc_tier": "tier_1",
"session_entropy": 0.159
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 378,
"timestamp": "2026-01-01T13:29:00Z",
"transaction_amount_usd": 15.53
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.406,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 209231.75,
"financial_exposure_usd": 448780.42,
"recoverable_pct": 0.077
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108232",
"label": "benign",
"label_confidence": 0.697,
"severity": "low",
"timestamp": "2026-01-06T17:12:00Z",
"trace_id": "a1132802-ca1b-c97a-4281-ae6cb6175aa4"
} | {
"account_age_days": 372,
"account_id": "ACCT-603654501C8C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.499
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 122,
"timestamp": "2026-01-06T17:12:00Z",
"transaction_amount_usd": 2423.97
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.794,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1428.73,
"financial_exposure_usd": 1467.38,
"recoverable_pct": 0.643
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100609",
"label": "fraudulent",
"label_confidence": 0.774,
"severity": "medium",
"timestamp": "2026-01-01T10:09:00Z",
"trace_id": "971e940c-e117-e144-b778-323b172efc79"
} | {
"account_age_days": 396,
"account_id": "ACCT-E2E8D232DEEC",
"baseline_risk_score": 0.339,
"kyc_tier": "tier_3",
"session_entropy": 0.462
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 1093,
"timestamp": "2026-01-01T10:09:00Z",
"transaction_amount_usd": 4598.73
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.847,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 303824.64,
"financial_exposure_usd": 422908.52,
"recoverable_pct": 0.028
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108104",
"label": "benign",
"label_confidence": 0.628,
"severity": "high",
"timestamp": "2026-01-06T15:04:00Z",
"trace_id": "d1f9617a-2761-254d-a470-13f62ee4a3df"
} | {
"account_age_days": 1447,
"account_id": "ACCT-B4934EAFD74C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.854
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 959,
"timestamp": "2026-01-06T15:04:00Z",
"transaction_amount_usd": 10566.07
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.477,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3348.27,
"financial_exposure_usd": 3366.78,
"recoverable_pct": 0.859
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109908",
"label": "benign",
"label_confidence": 0.536,
"severity": "medium",
"timestamp": "2026-01-07T21:08:00Z",
"trace_id": "1c1ad94f-eef2-e5c4-8084-a12af35abc8e"
} | {
"account_age_days": 67,
"account_id": "ACCT-6DE3B3B6D3A0",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.139
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 213,
"timestamp": "2026-01-07T11:00:00Z",
"transaction_amount_usd": 0.5
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.566,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 6805.46,
"financial_exposure_usd": 10425.66,
"recoverable_pct": 0.563
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109270",
"label": "benign",
"label_confidence": 0.593,
"severity": "medium",
"timestamp": "2026-01-07T10:30:00Z",
"trace_id": "78f568d1-00ad-b3d0-2a8e-f22ae81749ec"
} | {
"account_age_days": 1836,
"account_id": "ACCT-B26C892FFFC4",
"baseline_risk_score": 0.143,
"kyc_tier": "tier_2",
"session_entropy": 0.274
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 116,
"timestamp": "2026-01-07T02:43:00Z",
"transaction_amount_usd": 16.64
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.744,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2128.19,
"financial_exposure_usd": 3767.23,
"recoverable_pct": 0.459
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104587",
"label": "fraudulent",
"label_confidence": 0.759,
"severity": "low",
"timestamp": "2026-01-04T04:27:00Z",
"trace_id": "63c93267-0726-aa96-aac5-8af3330f666d"
} | {
"account_age_days": 103,
"account_id": "ACCT-402BAA62B84A",
"baseline_risk_score": 0.215,
"kyc_tier": "tier_3",
"session_entropy": 0.759
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 167,
"timestamp": "2026-01-04T04:27:00Z",
"transaction_amount_usd": 133410.71
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.874,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1648601.01,
"financial_exposure_usd": 2567167.95,
"recoverable_pct": 0.831
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104028",
"label": "fraudulent",
"label_confidence": 0.76,
"severity": "low",
"timestamp": "2026-01-03T19:08:00Z",
"trace_id": "a53b877f-eddb-0348-8312-104f2e0c8b5e"
} | {
"account_age_days": 1697,
"account_id": "ACCT-5FEF0DAD7884",
"baseline_risk_score": 0.133,
"kyc_tier": "tier_3",
"session_entropy": 0.631
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 686,
"timestamp": "2026-01-03T19:08:00Z",
"transaction_amount_usd": 2807810.11
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.431,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2191821.19,
"financial_exposure_usd": 3494458.76,
"recoverable_pct": 0.948
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105626",
"label": "fraudulent",
"label_confidence": 0.91,
"severity": "high",
"timestamp": "2026-01-04T21:46:00Z",
"trace_id": "c631ba56-46a6-a926-29fc-d87c3c8c9c29"
} | {
"account_age_days": 1740,
"account_id": "ACCT-8309B5B74537",
"baseline_risk_score": 0.148,
"kyc_tier": "tier_1",
"session_entropy": 0.471
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 384,
"timestamp": "2026-01-04T21:46:00Z",
"transaction_amount_usd": 1209975.37
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.437,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3023224.07,
"financial_exposure_usd": 3801939.48,
"recoverable_pct": 0.481
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100792",
"label": "fraudulent",
"label_confidence": 0.762,
"severity": "low",
"timestamp": "2026-01-01T13:12:00Z",
"trace_id": "f011494d-3567-6efb-32f6-94069985b988"
} | {
"account_age_days": 309,
"account_id": "ACCT-1B598BF1BE79",
"baseline_risk_score": 0.403,
"kyc_tier": "tier_3",
"session_entropy": 0.585
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 326,
"timestamp": "2026-01-01T11:29:00Z",
"transaction_amount_usd": 8.18
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.382,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 673054.55,
"financial_exposure_usd": 795031.44,
"recoverable_pct": 0.449
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105882",
"label": "fraudulent",
"label_confidence": 0.692,
"severity": "high",
"timestamp": "2026-01-05T02:02:00Z",
"trace_id": "acdb1e97-8757-01e2-df19-20c9a0820f94"
} | {
"account_age_days": 1888,
"account_id": "ACCT-2BD73A976C82",
"baseline_risk_score": 0.148,
"kyc_tier": "tier_1",
"session_entropy": 0.758
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 243,
"timestamp": "2026-01-04T18:43:00Z",
"transaction_amount_usd": 1.36
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.525,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 5981584.03,
"financial_exposure_usd": 6753588.4,
"recoverable_pct": 0.778
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103841",
"label": "fraudulent",
"label_confidence": 0.664,
"severity": "critical",
"timestamp": "2026-01-03T16:01:00Z",
"trace_id": "8a6951dc-7d8d-36d1-3288-66c325cc2be0"
} | {
"account_age_days": 203,
"account_id": "ACCT-FE20BB2D3E41",
"baseline_risk_score": 0.316,
"kyc_tier": "tier_1",
"session_entropy": 0.335
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 995,
"timestamp": "2026-01-03T16:01:00Z",
"transaction_amount_usd": 808892.14
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.541,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2454440.48,
"financial_exposure_usd": 2543510.26,
"recoverable_pct": 0.601
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102842",
"label": "fraudulent",
"label_confidence": 0.847,
"severity": "medium",
"timestamp": "2026-01-02T23:22:00Z",
"trace_id": "ee0ede2d-0fb7-a602-344e-a7d6903377eb"
} | {
"account_age_days": 1187,
"account_id": "ACCT-1E596F9CF82D",
"baseline_risk_score": 0.329,
"kyc_tier": "tier_3",
"session_entropy": 0.578
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 392,
"timestamp": "2026-01-02T12:34:00Z",
"transaction_amount_usd": 18.64
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.885,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 459263.71,
"financial_exposure_usd": 829269.69,
"recoverable_pct": 0.314
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108169",
"label": "benign",
"label_confidence": 0.745,
"severity": "low",
"timestamp": "2026-01-06T16:09:00Z",
"trace_id": "b78596e6-0f00-a6da-f336-f437ac8b2ea1"
} | {
"account_age_days": 680,
"account_id": "ACCT-1899769A1A60",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.283
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 249,
"timestamp": "2026-01-06T16:09:00Z",
"transaction_amount_usd": 9128.41
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.613,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 2",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1982.91,
"financial_exposure_usd": 2484.76,
"recoverable_pct": 0.945
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101218",
"label": "fraudulent",
"label_confidence": 0.899,
"severity": "low",
"timestamp": "2026-01-01T20:18:00Z",
"trace_id": "0d7830e2-70ec-3df4-853d-50e3eb2b7275"
} | {
"account_age_days": 186,
"account_id": "ACCT-4A86DBFE0736",
"baseline_risk_score": 0.534,
"kyc_tier": "tier_1",
"session_entropy": 0.372
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 97,
"timestamp": "2026-01-01T20:18:00Z",
"transaction_amount_usd": 117656.27
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.452,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 565946.4,
"financial_exposure_usd": 980873.3,
"recoverable_pct": 0.316
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107729",
"label": "benign",
"label_confidence": 0.64,
"severity": "medium",
"timestamp": "2026-01-06T08:49:00Z",
"trace_id": "e659e9a6-2323-205a-9d87-211851e94974"
} | {
"account_age_days": 615,
"account_id": "ACCT-80A529C07D19",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.266
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 913,
"timestamp": "2026-01-06T08:49:00Z",
"transaction_amount_usd": 7554.63
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.595,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2742.61,
"financial_exposure_usd": 3133.96,
"recoverable_pct": 0.446
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104076",
"label": "fraudulent",
"label_confidence": 0.746,
"severity": "high",
"timestamp": "2026-01-03T19:56:00Z",
"trace_id": "86081afb-6d3e-c0c6-af1e-ad6e30b2f8c7"
} | {
"account_age_days": 1305,
"account_id": "ACCT-4C82C8B0A9FA",
"baseline_risk_score": 0.362,
"kyc_tier": "tier_1",
"session_entropy": 0.139
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 933,
"timestamp": "2026-01-03T19:56:00Z",
"transaction_amount_usd": 2881145.85
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.895,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3985725.28,
"financial_exposure_usd": 4355687.79,
"recoverable_pct": 0.594
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103900",
"label": "fraudulent",
"label_confidence": 0.894,
"severity": "low",
"timestamp": "2026-01-03T17:00:00Z",
"trace_id": "771b4465-7107-dbf4-40b4-b60018bab61e"
} | {
"account_age_days": 755,
"account_id": "ACCT-042DEAE9E475",
"baseline_risk_score": 0.407,
"kyc_tier": "tier_1",
"session_entropy": 0.357
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 128,
"timestamp": "2026-01-03T15:13:00Z",
"transaction_amount_usd": 10.41
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.784,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1446340.87,
"financial_exposure_usd": 2969427.7,
"recoverable_pct": 0.746
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105871",
"label": "fraudulent",
"label_confidence": 0.817,
"severity": "high",
"timestamp": "2026-01-05T01:51:00Z",
"trace_id": "c47df0e4-7493-7378-230d-2c5572820b8c"
} | {
"account_age_days": 767,
"account_id": "ACCT-CDD3C77CFDE8",
"baseline_risk_score": 0.236,
"kyc_tier": "tier_3",
"session_entropy": 0.845
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 1020,
"timestamp": "2026-01-05T01:51:00Z",
"transaction_amount_usd": 1296618.37
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.626,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 917712.79,
"financial_exposure_usd": 1023601.63,
"recoverable_pct": 0.619
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100005",
"label": "fraudulent",
"label_confidence": 0.85,
"severity": "medium",
"timestamp": "2026-01-01T00:05:00Z",
"trace_id": "0a368ce7-dc57-0131-f8e1-daa7cbceabde"
} | {
"account_age_days": 392,
"account_id": "ACCT-629C2AE31D9A",
"baseline_risk_score": 0.565,
"kyc_tier": "tier_2",
"session_entropy": 0.865
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 397,
"timestamp": "2025-12-31T17:31:00Z",
"transaction_amount_usd": 19.5
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.775,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 747632.68,
"financial_exposure_usd": 1050116.38,
"recoverable_pct": 0.686
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109279",
"label": "benign",
"label_confidence": 0.585,
"severity": "high",
"timestamp": "2026-01-07T10:39:00Z",
"trace_id": "485201be-2369-0798-7648-8985fc85584a"
} | {
"account_age_days": 876,
"account_id": "ACCT-76727FEE6495",
"baseline_risk_score": 0.133,
"kyc_tier": "tier_3",
"session_entropy": 0.805
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 500,
"timestamp": "2026-01-07T10:39:00Z",
"transaction_amount_usd": 4876.39
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.798,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2540.02,
"financial_exposure_usd": 4770.83,
"recoverable_pct": 0.582
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106765",
"label": "benign",
"label_confidence": 0.569,
"severity": "high",
"timestamp": "2026-01-05T16:45:00Z",
"trace_id": "890d8ff7-0e5c-9c30-ed3d-f6b613f0afb8"
} | {
"account_age_days": 620,
"account_id": "ACCT-5B32024F58BC",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.628
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 231,
"timestamp": "2026-01-05T16:45:00Z",
"transaction_amount_usd": 8508.55
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.781,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 700.08,
"financial_exposure_usd": 1355,
"recoverable_pct": 0.919
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109090",
"label": "benign",
"label_confidence": 0.713,
"severity": "medium",
"timestamp": "2026-01-07T07:30:00Z",
"trace_id": "6aa8b0fc-dae9-d572-c498-6019e6eae57b"
} | {
"account_age_days": 1345,
"account_id": "ACCT-1915C419A48B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.334
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 756,
"timestamp": "2026-01-07T07:30:00Z",
"transaction_amount_usd": 5789.04
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.583,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1361.39,
"financial_exposure_usd": 2073.93,
"recoverable_pct": 0.833
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107905",
"label": "benign",
"label_confidence": 0.457,
"severity": "low",
"timestamp": "2026-01-06T11:45:00Z",
"trace_id": "a9f25864-98a6-f70a-2746-f56b990f19c2"
} | {
"account_age_days": 1659,
"account_id": "ACCT-C78F60F0F454",
"baseline_risk_score": 0.106,
"kyc_tier": "tier_1",
"session_entropy": 0.147
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 579,
"timestamp": "2026-01-06T11:45:00Z",
"transaction_amount_usd": 4135.51
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.606,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 322.82,
"financial_exposure_usd": 323.13,
"recoverable_pct": 0.866
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100766",
"label": "fraudulent",
"label_confidence": 0.755,
"severity": "medium",
"timestamp": "2026-01-01T12:46:00Z",
"trace_id": "68cac2f4-2ad8-5816-202c-bf4dd852cb52"
} | {
"account_age_days": 1254,
"account_id": "ACCT-D732C46F36B3",
"baseline_risk_score": 0.287,
"kyc_tier": "tier_1",
"session_entropy": 0.643
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "LU",
"latency_ms": 808,
"timestamp": "2026-01-01T12:46:00Z",
"transaction_amount_usd": 59414.79
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.6,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING ... | {
"customer_funds_at_risk_usd": 611636.37,
"financial_exposure_usd": 850990.98,
"recoverable_pct": 0.435
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106316",
"label": "fraudulent",
"label_confidence": 0.9,
"severity": "low",
"timestamp": "2026-01-05T09:16:00Z",
"trace_id": "48769e3f-6db7-0235-2366-ba7649fe2fef"
} | {
"account_age_days": 633,
"account_id": "ACCT-B622E16670E2",
"baseline_risk_score": 0.313,
"kyc_tier": "tier_1",
"session_entropy": 0.9
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 891,
"timestamp": "2026-01-05T09:16:00Z",
"transaction_amount_usd": 265777.35
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.474,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2840021.85,
"financial_exposure_usd": 4789555.68,
"recoverable_pct": 0.741
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107534",
"label": "benign",
"label_confidence": 0.704,
"severity": "low",
"timestamp": "2026-01-06T05:34:00Z",
"trace_id": "294a9f21-8636-0040-2abe-6046bebd8792"
} | {
"account_age_days": 700,
"account_id": "ACCT-BE76B3A59A57",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.406
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 530,
"timestamp": "2026-01-06T05:34:00Z",
"transaction_amount_usd": 10969.66
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.574,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 5557.3,
"financial_exposure_usd": 6599.44,
"recoverable_pct": 0.619
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107225",
"label": "benign",
"label_confidence": 0.566,
"severity": "medium",
"timestamp": "2026-01-06T00:25:00Z",
"trace_id": "0ec07a03-8a59-7fe2-a42e-e2d4a69a62a2"
} | {
"account_age_days": 494,
"account_id": "ACCT-EFC730A53DDB",
"baseline_risk_score": 0.106,
"kyc_tier": "tier_1",
"session_entropy": 0.634
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 197,
"timestamp": "2026-01-06T00:25:00Z",
"transaction_amount_usd": 3002.57
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.675,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1322.36,
"financial_exposure_usd": 2002.58,
"recoverable_pct": 0.974
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106798",
"label": "benign",
"label_confidence": 0.5,
"severity": "low",
"timestamp": "2026-01-05T17:18:00Z",
"trace_id": "01464d7a-27a0-6a37-4602-99b83b0990f8"
} | {
"account_age_days": 887,
"account_id": "ACCT-E550B8AE9407",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.869
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 216,
"timestamp": "2026-01-05T17:18:00Z",
"transaction_amount_usd": 4430.59
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.458,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1124.85,
"financial_exposure_usd": 1468.45,
"recoverable_pct": 0.75
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108567",
"label": "benign",
"label_confidence": 0.627,
"severity": "low",
"timestamp": "2026-01-06T22:47:00Z",
"trace_id": "9c6b8a6c-c928-5bc9-add5-fe941024198d"
} | {
"account_age_days": 479,
"account_id": "ACCT-43837EC54332",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.395
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 457,
"timestamp": "2026-01-06T22:47:00Z",
"transaction_amount_usd": 2998.67
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.557,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 753.99,
"financial_exposure_usd": 1063.91,
"recoverable_pct": 0.488
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105917",
"label": "fraudulent",
"label_confidence": 0.732,
"severity": "medium",
"timestamp": "2026-01-05T02:37:00Z",
"trace_id": "f079e0a2-cf71-6e18-0a57-44fa0703d173"
} | {
"account_age_days": 811,
"account_id": "ACCT-2D3F3283A83C",
"baseline_risk_score": 0.428,
"kyc_tier": "tier_1",
"session_entropy": 0.343
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 140,
"timestamp": "2026-01-04T21:00:00Z",
"transaction_amount_usd": 18.93
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.827,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2915567.33,
"financial_exposure_usd": 5382457.39,
"recoverable_pct": 0.993
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100722",
"label": "fraudulent",
"label_confidence": 0.781,
"severity": "high",
"timestamp": "2026-01-01T12:02:00Z",
"trace_id": "265b5501-3951-252a-bc0d-b6b76f3e8469"
} | {
"account_age_days": 582,
"account_id": "ACCT-7899EC2CFF57",
"baseline_risk_score": 0.354,
"kyc_tier": "tier_2",
"session_entropy": 0.748
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 400,
"timestamp": "2026-01-01T12:02:00Z",
"transaction_amount_usd": 50181.32
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.882,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 479871.96,
"financial_exposure_usd": 851549.84,
"recoverable_pct": 0.746
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100433",
"label": "fraudulent",
"label_confidence": 0.751,
"severity": "critical",
"timestamp": "2026-01-01T07:13:00Z",
"trace_id": "e63ab8e8-e6e7-23a2-08c0-31d77b046535"
} | {
"account_age_days": 1942,
"account_id": "ACCT-5C60D1307D35",
"baseline_risk_score": 0.512,
"kyc_tier": "tier_2",
"session_entropy": 0.353
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 507,
"timestamp": "2026-01-01T07:13:00Z",
"transaction_amount_usd": 86191.28
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.589,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 3",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 583008.98,
"financial_exposure_usd": 755478.35,
"recoverable_pct": 0.56
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109111",
"label": "benign",
"label_confidence": 0.503,
"severity": "low",
"timestamp": "2026-01-07T07:51:00Z",
"trace_id": "1ef9b13c-52ea-1d7d-050d-697cc857c1d2"
} | {
"account_age_days": 1145,
"account_id": "ACCT-1BF97660B1FF",
"baseline_risk_score": 0.053,
"kyc_tier": "tier_1",
"session_entropy": 0.81
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 298,
"timestamp": "2026-01-06T22:07:00Z",
"transaction_amount_usd": 1.81
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.709,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 165.66,
"financial_exposure_usd": 189.43,
"recoverable_pct": 0.455
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107478",
"label": "benign",
"label_confidence": 0.558,
"severity": "medium",
"timestamp": "2026-01-06T04:38:00Z",
"trace_id": "89376e94-02b1-94db-4240-1dd35418fbb6"
} | {
"account_age_days": 509,
"account_id": "ACCT-3A2DA8586473",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.537
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 294,
"timestamp": "2026-01-05T18:12:00Z",
"transaction_amount_usd": 15.03
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.718,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2802.51,
"financial_exposure_usd": 5084.51,
"recoverable_pct": 0.784
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101741",
"label": "fraudulent",
"label_confidence": 0.809,
"severity": "low",
"timestamp": "2026-01-02T05:01:00Z",
"trace_id": "e348b8ea-4c05-bad2-0acf-59cd2162bdd5"
} | {
"account_age_days": 1096,
"account_id": "ACCT-CE9D0044FADC",
"baseline_risk_score": 0.492,
"kyc_tier": "tier_1",
"session_entropy": 0.498
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NL",
"latency_ms": 549,
"timestamp": "2026-01-02T05:01:00Z",
"transaction_amount_usd": 24390.45
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.921,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 79592.46,
"financial_exposure_usd": 95163.05,
"recoverable_pct": 0.698
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100584",
"label": "fraudulent",
"label_confidence": 0.937,
"severity": "high",
"timestamp": "2026-01-01T09:44:00Z",
"trace_id": "2bb34bc0-10e4-9202-cf74-f43cbc4c8151"
} | {
"account_age_days": 1969,
"account_id": "ACCT-8FA7C6C23D5D",
"baseline_risk_score": 0.49,
"kyc_tier": "tier_2",
"session_entropy": 0.296
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 444,
"timestamp": "2026-01-01T09:44:00Z",
"transaction_amount_usd": 104030.76
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.378,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 767549.39,
"financial_exposure_usd": 1113845.23,
"recoverable_pct": 0.334
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107867",
"label": "benign",
"label_confidence": 0.679,
"severity": "high",
"timestamp": "2026-01-06T11:07:00Z",
"trace_id": "350765b4-1e04-377e-6be3-3ecb447dd5c8"
} | {
"account_age_days": 2000,
"account_id": "ACCT-03FF4EB3043C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.727
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 370,
"timestamp": "2026-01-06T09:44:00Z",
"transaction_amount_usd": 22.07
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.791,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3618.41,
"financial_exposure_usd": 3827.88,
"recoverable_pct": 0.543
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108644",
"label": "benign",
"label_confidence": 0.724,
"severity": "medium",
"timestamp": "2026-01-07T00:04:00Z",
"trace_id": "479a25f1-a119-87f0-4c52-a9ecec2f8627"
} | {
"account_age_days": 778,
"account_id": "ACCT-42B793B4DFCC",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.447
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 866,
"timestamp": "2026-01-07T00:04:00Z",
"transaction_amount_usd": 5385.19
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.731,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 440.66,
"financial_exposure_usd": 824.46,
"recoverable_pct": 0.672
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107990",
"label": "benign",
"label_confidence": 0.47,
"severity": "high",
"timestamp": "2026-01-06T13:10:00Z",
"trace_id": "50d32abd-e6e6-64df-23f4-96c68d259254"
} | {
"account_age_days": 1676,
"account_id": "ACCT-707E1C4DF677",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.706
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 394,
"timestamp": "2026-01-06T13:10:00Z",
"transaction_amount_usd": 6459.92
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.624,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3095.36,
"financial_exposure_usd": 3527.77,
"recoverable_pct": 0.777
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109431",
"label": "benign",
"label_confidence": 0.742,
"severity": "low",
"timestamp": "2026-01-07T13:11:00Z",
"trace_id": "79ac2ebd-6e97-459c-a83a-eb04fb80085e"
} | {
"account_age_days": 1362,
"account_id": "ACCT-586B99E34892",
"baseline_risk_score": 0.09,
"kyc_tier": "tier_2",
"session_entropy": 0.713
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 581,
"timestamp": "2026-01-07T13:11:00Z",
"transaction_amount_usd": 3185.41
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.794,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 2",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3920.9,
"financial_exposure_usd": 5142.67,
"recoverable_pct": 0.696
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102095",
"label": "fraudulent",
"label_confidence": 0.793,
"severity": "high",
"timestamp": "2026-01-02T10:55:00Z",
"trace_id": "5fedd8ff-a557-caa4-d27e-ad174ba2c0ce"
} | {
"account_age_days": 1607,
"account_id": "ACCT-6D14231F29EF",
"baseline_risk_score": 0.646,
"kyc_tier": "tier_3",
"session_entropy": 0.721
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "MY",
"latency_ms": 875,
"timestamp": "2026-01-02T10:55:00Z",
"transaction_amount_usd": 60340.58
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.589,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 499666.9,
"financial_exposure_usd": 764705.6,
"recoverable_pct": 0.59
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108209",
"label": "benign",
"label_confidence": 0.462,
"severity": "low",
"timestamp": "2026-01-06T16:49:00Z",
"trace_id": "2da72c18-bb1c-a4fb-fc58-321e2eb3bf4d"
} | {
"account_age_days": 1507,
"account_id": "ACCT-E7FB5091D8BD",
"baseline_risk_score": 0.164,
"kyc_tier": "tier_3",
"session_entropy": 0.312
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 119,
"timestamp": "2026-01-06T16:49:00Z",
"transaction_amount_usd": 10310.12
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.616,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2001.86,
"financial_exposure_usd": 2156.58,
"recoverable_pct": 0.851
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101069",
"label": "fraudulent",
"label_confidence": 0.83,
"severity": "medium",
"timestamp": "2026-01-01T17:49:00Z",
"trace_id": "d2cff14f-ae01-9a88-8cd3-b7e4b0767aa8"
} | {
"account_age_days": 1298,
"account_id": "ACCT-FEFA977B137F",
"baseline_risk_score": 0.431,
"kyc_tier": "tier_3",
"session_entropy": 0.455
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 689,
"timestamp": "2026-01-01T17:49:00Z",
"transaction_amount_usd": 8255.38
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.424,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 61910.93,
"financial_exposure_usd": 120269.75,
"recoverable_pct": 0.364
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105367",
"label": "fraudulent",
"label_confidence": 0.807,
"severity": "critical",
"timestamp": "2026-01-04T17:27:00Z",
"trace_id": "eac821ed-f5ea-46da-381d-44301ee91658"
} | {
"account_age_days": 423,
"account_id": "ACCT-65F61BDF3524",
"baseline_risk_score": 0.36,
"kyc_tier": "tier_3",
"session_entropy": 0.482
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 550,
"timestamp": "2026-01-04T17:27:00Z",
"transaction_amount_usd": 1690168.03
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.759,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1277785.45,
"financial_exposure_usd": 1828838.17,
"recoverable_pct": 0.718
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109151",
"label": "benign",
"label_confidence": 0.702,
"severity": "low",
"timestamp": "2026-01-07T08:31:00Z",
"trace_id": "0fca9aed-2d1f-d06d-2fb2-cec909755822"
} | {
"account_age_days": 1411,
"account_id": "ACCT-96ECA2297029",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.647
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 1142,
"timestamp": "2026-01-07T08:31:00Z",
"transaction_amount_usd": 8890.78
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.622,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1942.25,
"financial_exposure_usd": 2580.53,
"recoverable_pct": 0.648
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101565",
"label": "fraudulent",
"label_confidence": 0.819,
"severity": "medium",
"timestamp": "2026-01-02T02:05:00Z",
"trace_id": "b04df885-d52e-b3c3-11d0-31d5f3bc234a"
} | {
"account_age_days": 1739,
"account_id": "ACCT-2E4B54AF5462",
"baseline_risk_score": 0.367,
"kyc_tier": "tier_2",
"session_entropy": 0.934
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 153,
"timestamp": "2026-01-01T22:47:00Z",
"transaction_amount_usd": 5.4
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"ge... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.465,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 285811.16,
"financial_exposure_usd": 633953.84,
"recoverable_pct": 0.811
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100788",
"label": "fraudulent",
"label_confidence": 0.809,
"severity": "low",
"timestamp": "2026-01-01T13:08:00Z",
"trace_id": "1cfb0c3f-45d8-8d95-6db7-167ec2054454"
} | {
"account_age_days": 1906,
"account_id": "ACCT-07CD93D86764",
"baseline_risk_score": 0.627,
"kyc_tier": "tier_1",
"session_entropy": 0.667
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 1059,
"timestamp": "2026-01-01T13:08:00Z",
"transaction_amount_usd": 70710.65
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.456,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 288243.4,
"financial_exposure_usd": 663378.54,
"recoverable_pct": 0.335
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104142",
"label": "fraudulent",
"label_confidence": 0.8,
"severity": "medium",
"timestamp": "2026-01-03T21:02:00Z",
"trace_id": "82380302-3e2f-6362-9da1-5bfb9ffe5071"
} | {
"account_age_days": 1303,
"account_id": "ACCT-D2FB0EE1E689",
"baseline_risk_score": 0.336,
"kyc_tier": "tier_3",
"session_entropy": 0.727
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 391,
"timestamp": "2026-01-03T11:32:00Z",
"transaction_amount_usd": 5.71
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.512,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1395071.79,
"financial_exposure_usd": 1410936.48,
"recoverable_pct": 0.419
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103947",
"label": "fraudulent",
"label_confidence": 0.78,
"severity": "high",
"timestamp": "2026-01-03T17:47:00Z",
"trace_id": "228c623a-96cd-656a-aece-926f915f2a2a"
} | {
"account_age_days": 1625,
"account_id": "ACCT-904BF17A88AF",
"baseline_risk_score": 0.328,
"kyc_tier": "tier_1",
"session_entropy": 0.88
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 1157,
"timestamp": "2026-01-03T17:47:00Z",
"transaction_amount_usd": 170343.72
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.642,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4573311.68,
"financial_exposure_usd": 5439637.09,
"recoverable_pct": 0.922
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102016",
"label": "fraudulent",
"label_confidence": 0.766,
"severity": "high",
"timestamp": "2026-01-02T09:36:00Z",
"trace_id": "33829ad3-292e-ca53-095a-7dda7ab2b8a8"
} | {
"account_age_days": 1957,
"account_id": "ACCT-E5F0A58051B5",
"baseline_risk_score": 0.529,
"kyc_tier": "tier_1",
"session_entropy": 0.863
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 893,
"timestamp": "2026-01-02T09:36:00Z",
"transaction_amount_usd": 96475.42
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.693,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 263929.32,
"financial_exposure_usd": 418914.93,
"recoverable_pct": 0.478
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105301",
"label": "fraudulent",
"label_confidence": 0.651,
"severity": "high",
"timestamp": "2026-01-04T16:21:00Z",
"trace_id": "99fc7416-6020-6b7f-cf1d-54fd50e19887"
} | {
"account_age_days": 1555,
"account_id": "ACCT-08D9CE3ACEB1",
"baseline_risk_score": 0.389,
"kyc_tier": "tier_3",
"session_entropy": 0.572
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 206,
"timestamp": "2026-01-04T10:34:00Z",
"transaction_amount_usd": 0.45
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.625,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2102043.3,
"financial_exposure_usd": 3540094.62,
"recoverable_pct": 0.831
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108520",
"label": "benign",
"label_confidence": 0.497,
"severity": "low",
"timestamp": "2026-01-06T22:00:00Z",
"trace_id": "29caea8d-6c9b-e97f-44a6-8ed246458b28"
} | {
"account_age_days": 764,
"account_id": "ACCT-B536A7BDD25D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.92
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 276,
"timestamp": "2026-01-06T22:00:00Z",
"transaction_amount_usd": 11205.32
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.711,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1738.94,
"financial_exposure_usd": 1792.12,
"recoverable_pct": 0.848
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109027",
"label": "benign",
"label_confidence": 0.485,
"severity": "low",
"timestamp": "2026-01-07T06:27:00Z",
"trace_id": "a9c3b501-672a-a85b-c99a-36ccaa8d5622"
} | {
"account_age_days": 5,
"account_id": "ACCT-00C8F71E2D8F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.103
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 245,
"timestamp": "2026-01-07T04:19:00Z",
"transaction_amount_usd": 14.73
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.675,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 4255.7,
"financial_exposure_usd": 7081.9,
"recoverable_pct": 0.642
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104865",
"label": "fraudulent",
"label_confidence": 0.826,
"severity": "medium",
"timestamp": "2026-01-04T09:05:00Z",
"trace_id": "7f8008ec-3a50-e686-1624-6cf333dcabce"
} | {
"account_age_days": 1807,
"account_id": "ACCT-3FF3770F8DF4",
"baseline_risk_score": 0.333,
"kyc_tier": "tier_2",
"session_entropy": 0.249
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 1104,
"timestamp": "2026-01-04T09:05:00Z",
"transaction_amount_usd": 340190.28
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.412,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3927352.01,
"financial_exposure_usd": 4927994.06,
"recoverable_pct": 0.656
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102582",
"label": "fraudulent",
"label_confidence": 0.971,
"severity": "high",
"timestamp": "2026-01-02T19:02:00Z",
"trace_id": "ae8107f0-5c43-a149-2615-9111cc53efcd"
} | {
"account_age_days": 1718,
"account_id": "ACCT-56B72D171DA6",
"baseline_risk_score": 0.425,
"kyc_tier": "tier_3",
"session_entropy": 0.235
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 665,
"timestamp": "2026-01-02T19:02:00Z",
"transaction_amount_usd": 28478.21
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.782,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 459671.7,
"financial_exposure_usd": 589362.01,
"recoverable_pct": 0.439
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108075",
"label": "benign",
"label_confidence": 0.464,
"severity": "low",
"timestamp": "2026-01-06T14:35:00Z",
"trace_id": "bbf2fb93-f5bb-25b3-589c-38c1edc5a490"
} | {
"account_age_days": 1125,
"account_id": "ACCT-D76A56D21A38",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.529
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 1031,
"timestamp": "2026-01-06T14:35:00Z",
"transaction_amount_usd": 7444.61
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.721,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2524.47,
"financial_exposure_usd": 3048.75,
"recoverable_pct": 0.866
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105536",
"label": "fraudulent",
"label_confidence": 0.636,
"severity": "critical",
"timestamp": "2026-01-04T20:16:00Z",
"trace_id": "918c2c5a-ae90-33ef-6b70-278bdfa0d40a"
} | {
"account_age_days": 130,
"account_id": "ACCT-8E35EDDEA2D3",
"baseline_risk_score": 0.197,
"kyc_tier": "tier_3",
"session_entropy": 0.914
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 798,
"timestamp": "2026-01-04T20:16:00Z",
"transaction_amount_usd": 752208.22
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.735,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 984704.72,
"financial_exposure_usd": 1998400.28,
"recoverable_pct": 0.536
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101714",
"label": "fraudulent",
"label_confidence": 0.768,
"severity": "high",
"timestamp": "2026-01-02T04:34:00Z",
"trace_id": "a580f83c-b9d9-883e-1ed0-566c0219578a"
} | {
"account_age_days": 1112,
"account_id": "ACCT-3F481FE1E235",
"baseline_risk_score": 0.367,
"kyc_tier": "tier_3",
"session_entropy": 0.94
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "BR",
"latency_ms": 387,
"timestamp": "2026-01-02T04:34:00Z",
"transaction_amount_usd": 84800.06
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.942,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 306438.69,
"financial_exposure_usd": 485540.54,
"recoverable_pct": 0.654
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102133",
"label": "fraudulent",
"label_confidence": 0.897,
"severity": "critical",
"timestamp": "2026-01-02T11:33:00Z",
"trace_id": "de2874ad-efb8-72f9-0f8f-d7753fe7a74a"
} | {
"account_age_days": 411,
"account_id": "ACCT-1F5A834CE5E3",
"baseline_risk_score": 0.415,
"kyc_tier": "tier_2",
"session_entropy": 0.689
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 189,
"timestamp": "2026-01-02T07:40:00Z",
"transaction_amount_usd": 20.56
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.715,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 240169.2,
"financial_exposure_usd": 291672.19,
"recoverable_pct": 0.472
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101820",
"label": "fraudulent",
"label_confidence": 0.969,
"severity": "critical",
"timestamp": "2026-01-02T06:20:00Z",
"trace_id": "aa6fd925-0d3c-ef4c-a15b-a9fd61c20927"
} | {
"account_age_days": 385,
"account_id": "ACCT-5205A134D9BF",
"baseline_risk_score": 0.613,
"kyc_tier": "tier_2",
"session_entropy": 0.927
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 230,
"timestamp": "2026-01-02T00:46:00Z",
"transaction_amount_usd": 14.3
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.729,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 62738.93,
"financial_exposure_usd": 117819.34,
"recoverable_pct": 0.234
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100408",
"label": "fraudulent",
"label_confidence": 0.78,
"severity": "medium",
"timestamp": "2026-01-01T06:48:00Z",
"trace_id": "5367210c-ba57-5e20-6ea0-682e6b3887b0"
} | {
"account_age_days": 1106,
"account_id": "ACCT-AEB7976FDCB9",
"baseline_risk_score": 0.263,
"kyc_tier": "tier_2",
"session_entropy": 0.83
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 276,
"timestamp": "2026-01-01T06:48:00Z",
"transaction_amount_usd": 9650.54
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.607,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 1034669.3,
"financial_exposure_usd": 1212490.86,
"recoverable_pct": 0.743
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105037",
"label": "fraudulent",
"label_confidence": 0.783,
"severity": "medium",
"timestamp": "2026-01-04T11:57:00Z",
"trace_id": "9e6b1517-af6a-4d8a-f118-4ad364b2e55a"
} | {
"account_age_days": 13,
"account_id": "ACCT-168CB8777A25",
"baseline_risk_score": 0.289,
"kyc_tier": "tier_1",
"session_entropy": 0.316
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 184,
"timestamp": "2026-01-04T11:57:00Z",
"transaction_amount_usd": 145606.59
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.894,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4263522.85,
"financial_exposure_usd": 6231892.34,
"recoverable_pct": 0.795
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101576",
"label": "fraudulent",
"label_confidence": 0.899,
"severity": "medium",
"timestamp": "2026-01-02T02:16:00Z",
"trace_id": "3f4e743a-68e0-9107-35b5-319794eb063f"
} | {
"account_age_days": 1787,
"account_id": "ACCT-049627C5D52C",
"baseline_risk_score": 0.396,
"kyc_tier": "tier_2",
"session_entropy": 0.931
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 1118,
"timestamp": "2026-01-02T02:16:00Z",
"transaction_amount_usd": 101828.7
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.355,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 439999.32,
"financial_exposure_usd": 862913.7,
"recoverable_pct": 0.006
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107191",
"label": "benign",
"label_confidence": 0.507,
"severity": "medium",
"timestamp": "2026-01-05T23:51:00Z",
"trace_id": "358c39d9-fc9f-bcbb-e4e2-9983da0c201f"
} | {
"account_age_days": 1008,
"account_id": "ACCT-DD7ABE88FC43",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.481
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 994,
"timestamp": "2026-01-05T23:51:00Z",
"transaction_amount_usd": 5692.68
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.575,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2633.39,
"financial_exposure_usd": 3449.82,
"recoverable_pct": 0.879
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100461",
"label": "fraudulent",
"label_confidence": 0.825,
"severity": "medium",
"timestamp": "2026-01-01T07:41:00Z",
"trace_id": "eaed87d9-0614-f005-7654-865eea7f7f6b"
} | {
"account_age_days": 344,
"account_id": "ACCT-E39E930C8913",
"baseline_risk_score": 0.498,
"kyc_tier": "tier_3",
"session_entropy": 0.478
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 507,
"timestamp": "2026-01-01T07:41:00Z",
"transaction_amount_usd": 81546.72
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.387,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 377797.59,
"financial_exposure_usd": 770330.78,
"recoverable_pct": 0.589
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100041",
"label": "fraudulent",
"label_confidence": 0.899,
"severity": "low",
"timestamp": "2026-01-01T00:41:00Z",
"trace_id": "17d50f59-c4d5-98f7-e14f-e093cb6ad0c7"
} | {
"account_age_days": 1549,
"account_id": "ACCT-4E35DA80A027",
"baseline_risk_score": 0.516,
"kyc_tier": "tier_1",
"session_entropy": 0.717
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 1079,
"timestamp": "2026-01-01T00:41:00Z",
"transaction_amount_usd": 33747.97
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.743,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 243974.4,
"financial_exposure_usd": 608943.76,
"recoverable_pct": 0.405
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103892",
"label": "fraudulent",
"label_confidence": 0.938,
"severity": "high",
"timestamp": "2026-01-03T16:52:00Z",
"trace_id": "3df7d4b0-e299-5b32-5195-0e1dcc347f31"
} | {
"account_age_days": 685,
"account_id": "ACCT-AD5551466014",
"baseline_risk_score": 0.074,
"kyc_tier": "tier_1",
"session_entropy": 0.717
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 468,
"timestamp": "2026-01-03T16:52:00Z",
"transaction_amount_usd": 415124.91
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.777,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3530269.02,
"financial_exposure_usd": 3652447.96,
"recoverable_pct": 0.938
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106033",
"label": "fraudulent",
"label_confidence": 0.787,
"severity": "medium",
"timestamp": "2026-01-05T04:33:00Z",
"trace_id": "d2732ff6-c223-e9fa-6939-d70e4c9b9877"
} | {
"account_age_days": 1848,
"account_id": "ACCT-7E7A37AD0719",
"baseline_risk_score": 0.411,
"kyc_tier": "tier_2",
"session_entropy": 0.795
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 928,
"timestamp": "2026-01-05T04:33:00Z",
"transaction_amount_usd": 1746882.66
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.792,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2054587.16,
"financial_exposure_usd": 3509514.56,
"recoverable_pct": 0.837
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109498",
"label": "benign",
"label_confidence": 0.725,
"severity": "low",
"timestamp": "2026-01-07T14:18:00Z",
"trace_id": "8f2f2462-d6be-0cf7-a70e-cfb11f093d3b"
} | {
"account_age_days": 940,
"account_id": "ACCT-F48A448B1DEC",
"baseline_risk_score": 0.19,
"kyc_tier": "tier_3",
"session_entropy": 0.908
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 934,
"timestamp": "2026-01-07T14:18:00Z",
"transaction_amount_usd": 11310.8
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.528,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 4404.68,
"financial_exposure_usd": 6281.17,
"recoverable_pct": 0.698
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100646",
"label": "fraudulent",
"label_confidence": 0.937,
"severity": "high",
"timestamp": "2026-01-01T10:46:00Z",
"trace_id": "989f4a98-f813-c1eb-b167-613350ab86ed"
} | {
"account_age_days": 953,
"account_id": "ACCT-0AF689DD6381",
"baseline_risk_score": 0.437,
"kyc_tier": "tier_2",
"session_entropy": 0.727
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 1192,
"timestamp": "2026-01-01T10:46:00Z",
"transaction_amount_usd": 50775.19
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.79,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 382784.87,
"financial_exposure_usd": 394047.45,
"recoverable_pct": 0.172
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105545",
"label": "fraudulent",
"label_confidence": 0.692,
"severity": "medium",
"timestamp": "2026-01-04T20:25:00Z",
"trace_id": "a7c6b0e7-96b2-e242-6a19-bfce9fd42d56"
} | {
"account_age_days": 1052,
"account_id": "ACCT-3FA67822F606",
"baseline_risk_score": 0.4,
"kyc_tier": "tier_1",
"session_entropy": 0.731
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 116,
"timestamp": "2026-01-04T20:25:00Z",
"transaction_amount_usd": 191950.04
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.658,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3694789.42,
"financial_exposure_usd": 7760636.38,
"recoverable_pct": 0.444
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101370",
"label": "fraudulent",
"label_confidence": 0.947,
"severity": "high",
"timestamp": "2026-01-01T22:50:00Z",
"trace_id": "f65187a9-ba17-e46f-e736-227f7a688fee"
} | {
"account_age_days": 1552,
"account_id": "ACCT-8F61EB24590D",
"baseline_risk_score": 0.461,
"kyc_tier": "tier_1",
"session_entropy": 0.616
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 758,
"timestamp": "2026-01-01T22:50:00Z",
"transaction_amount_usd": 56574.75
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.855,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 406763.02,
"financial_exposure_usd": 636680.36,
"recoverable_pct": 0.343
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105576",
"label": "fraudulent",
"label_confidence": 0.777,
"severity": "high",
"timestamp": "2026-01-04T20:56:00Z",
"trace_id": "b3520fb6-e89c-5254-6d81-52fe9e4733b6"
} | {
"account_age_days": 1993,
"account_id": "ACCT-FBACE2585CDE",
"baseline_risk_score": 0.112,
"kyc_tier": "tier_2",
"session_entropy": 0.82
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 999,
"timestamp": "2026-01-04T20:56:00Z",
"transaction_amount_usd": 1162383.27
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.437,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5278515.45,
"financial_exposure_usd": 6065658.64,
"recoverable_pct": 0.45
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105860",
"label": "fraudulent",
"label_confidence": 0.767,
"severity": "medium",
"timestamp": "2026-01-05T01:40:00Z",
"trace_id": "6cfa7930-7ee3-e2dc-e64b-5eeca2efeb2a"
} | {
"account_age_days": 1575,
"account_id": "ACCT-336557C77DFD",
"baseline_risk_score": 0.371,
"kyc_tier": "tier_2",
"session_entropy": 0.598
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 381,
"timestamp": "2026-01-04T15:48:00Z",
"transaction_amount_usd": 6.26
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.584,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3742739.73,
"financial_exposure_usd": 5556076.81,
"recoverable_pct": 0.669
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106593",
"label": "fraudulent",
"label_confidence": 0.92,
"severity": "medium",
"timestamp": "2026-01-05T13:53:00Z",
"trace_id": "00d7ef77-0315-1ab8-a74c-a0c0f5175846"
} | {
"account_age_days": 1520,
"account_id": "ACCT-EEC5DA66FA22",
"baseline_risk_score": 0.334,
"kyc_tier": "tier_1",
"session_entropy": 0.37
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 427,
"timestamp": "2026-01-05T13:53:00Z",
"transaction_amount_usd": 2970268.66
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.462,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3818588.7,
"financial_exposure_usd": 5208786.61,
"recoverable_pct": 0.869
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103931",
"label": "fraudulent",
"label_confidence": 0.662,
"severity": "medium",
"timestamp": "2026-01-03T17:31:00Z",
"trace_id": "34373eb8-6b45-a64a-69c5-3c805f136dff"
} | {
"account_age_days": 55,
"account_id": "ACCT-0362F8ED8322",
"baseline_risk_score": 0.053,
"kyc_tier": "tier_2",
"session_entropy": 0.188
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 974,
"timestamp": "2026-01-03T17:31:00Z",
"transaction_amount_usd": 607972.12
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.461,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4057512.95,
"financial_exposure_usd": 4178488.15,
"recoverable_pct": 0.868
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100510",
"label": "fraudulent",
"label_confidence": 0.77,
"severity": "medium",
"timestamp": "2026-01-01T08:30:00Z",
"trace_id": "7da65190-272d-dbc4-fc58-cd22c69b5d9e"
} | {
"account_age_days": 1571,
"account_id": "ACCT-78B7720FAE34",
"baseline_risk_score": 0.282,
"kyc_tier": "tier_1",
"session_entropy": 0.575
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 833,
"timestamp": "2026-01-01T08:30:00Z",
"transaction_amount_usd": 47977.45
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.725,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 936031.19,
"financial_exposure_usd": 1248303.62,
"recoverable_pct": 0.19
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109806",
"label": "benign",
"label_confidence": 0.717,
"severity": "low",
"timestamp": "2026-01-07T19:26:00Z",
"trace_id": "2d1c1fbb-2531-c498-6fe8-61036713a958"
} | {
"account_age_days": 250,
"account_id": "ACCT-B10DB2B4A6DB",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.223
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 99,
"timestamp": "2026-01-07T19:26:00Z",
"transaction_amount_usd": 9675.14
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.481,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3265.24,
"financial_exposure_usd": 3389,
"recoverable_pct": 0.517
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106589",
"label": "fraudulent",
"label_confidence": 0.853,
"severity": "medium",
"timestamp": "2026-01-05T13:49:00Z",
"trace_id": "41544398-4968-68fe-abbb-f41660c51b14"
} | {
"account_age_days": 1593,
"account_id": "ACCT-083A205EC609",
"baseline_risk_score": 0.054,
"kyc_tier": "tier_2",
"session_entropy": 0.334
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 368,
"timestamp": "2026-01-05T09:11:00Z",
"transaction_amount_usd": 0.69
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.383,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1849208.15,
"financial_exposure_usd": 3653825.24,
"recoverable_pct": 0.612
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105194",
"label": "fraudulent",
"label_confidence": 0.713,
"severity": "medium",
"timestamp": "2026-01-04T14:34:00Z",
"trace_id": "33a744a6-8f8a-06cf-fc05-8eca811a2bc3"
} | {
"account_age_days": 1527,
"account_id": "ACCT-EB06EF189A6C",
"baseline_risk_score": 0.256,
"kyc_tier": "tier_1",
"session_entropy": 0.131
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 517,
"timestamp": "2026-01-04T14:34:00Z",
"transaction_amount_usd": 1989465.1
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.417,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1323237.44,
"financial_exposure_usd": 2671411.85,
"recoverable_pct": 0.855
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106688",
"label": "benign",
"label_confidence": 0.489,
"severity": "high",
"timestamp": "2026-01-05T15:28:00Z",
"trace_id": "d3022e7e-268c-8aec-c0ec-3603e5f42f48"
} | {
"account_age_days": 937,
"account_id": "ACCT-906153A608E4",
"baseline_risk_score": 0.153,
"kyc_tier": "tier_1",
"session_entropy": 0.395
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 308,
"timestamp": "2026-01-05T07:40:00Z",
"transaction_amount_usd": 20.62
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.653,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2738.76,
"financial_exposure_usd": 3729.68,
"recoverable_pct": 0.676
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107241",
"label": "benign",
"label_confidence": 0.683,
"severity": "medium",
"timestamp": "2026-01-06T00:41:00Z",
"trace_id": "098d599c-efeb-f724-779a-51dff5dbb9d3"
} | {
"account_age_days": 513,
"account_id": "ACCT-24BD33693183",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.724
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 152,
"timestamp": "2026-01-06T00:41:00Z",
"transaction_amount_usd": 8029.46
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.467,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 670.13,
"financial_exposure_usd": 1618.9,
"recoverable_pct": 0.898
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109344",
"label": "benign",
"label_confidence": 0.702,
"severity": "low",
"timestamp": "2026-01-07T11:44:00Z",
"trace_id": "91f56687-adb4-200a-8663-7cbaf24c0f76"
} | {
"account_age_days": 639,
"account_id": "ACCT-9B625AA06C7C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.717
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 595,
"timestamp": "2026-01-07T11:44:00Z",
"transaction_amount_usd": 588.42
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.464,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 0, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 0,
"financial_exposure_usd": 0,
"recoverable_pct": 0.632
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109101",
"label": "benign",
"label_confidence": 0.666,
"severity": "medium",
"timestamp": "2026-01-07T07:41:00Z",
"trace_id": "57a8ac25-97b4-171f-8eb9-2151242ff86c"
} | {
"account_age_days": 695,
"account_id": "ACCT-4AF7D0BDF66E",
"baseline_risk_score": 0.166,
"kyc_tier": "tier_3",
"session_entropy": 0.672
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 124,
"timestamp": "2026-01-07T07:41:00Z",
"transaction_amount_usd": 4051.75
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.778,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 4125.64,
"financial_exposure_usd": 4558.23,
"recoverable_pct": 0.734
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109445",
"label": "benign",
"label_confidence": 0.663,
"severity": "low",
"timestamp": "2026-01-07T13:25:00Z",
"trace_id": "b82b2f08-7f9a-d951-7537-b3dc0243f4f2"
} | {
"account_age_days": 1585,
"account_id": "ACCT-C0350216A219",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.884
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 290,
"timestamp": "2026-01-07T13:25:00Z",
"transaction_amount_usd": 10803.94
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.593,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1543.01,
"financial_exposure_usd": 2285.06,
"recoverable_pct": 0.682
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.