schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103175",
"label": "fraudulent",
"label_confidence": 0.824,
"severity": "high",
"timestamp": "2026-01-03T04:55:00Z",
"trace_id": "e58aafcd-6ffa-e33b-b125-fab9fec15fb6"
} | {
"account_age_days": 1754,
"account_id": "ACCT-93FA77012BE6",
"baseline_risk_score": 0.301,
"kyc_tier": "tier_3",
"session_entropy": 0.532
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 333,
"timestamp": "2026-01-02T17:48:00Z",
"transaction_amount_usd": 7.08
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.621,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 721956.21,
"financial_exposure_usd": 1122568.55,
"recoverable_pct": 0.633
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108470",
"label": "benign",
"label_confidence": 0.732,
"severity": "medium",
"timestamp": "2026-01-06T21:10:00Z",
"trace_id": "5e88c836-0bbb-6997-ad6e-ae32cab1224a"
} | {
"account_age_days": 1514,
"account_id": "ACCT-5EB608767310",
"baseline_risk_score": 0.082,
"kyc_tier": "tier_2",
"session_entropy": 0.901
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 519,
"timestamp": "2026-01-06T21:10:00Z",
"transaction_amount_usd": 6632.97
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.594,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 473.28,
"financial_exposure_usd": 938.94,
"recoverable_pct": 0.506
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100359",
"label": "fraudulent",
"label_confidence": 0.971,
"severity": "high",
"timestamp": "2026-01-01T05:59:00Z",
"trace_id": "0e7e41b6-92bd-d0ed-d3d8-a5bdade73cc0"
} | {
"account_age_days": 1218,
"account_id": "ACCT-144B45A4660A",
"baseline_risk_score": 0.594,
"kyc_tier": "tier_2",
"session_entropy": 0.228
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "BR",
"latency_ms": 1190,
"timestamp": "2026-01-01T05:59:00Z",
"transaction_amount_usd": 95690.84
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.458,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 691573.57,
"financial_exposure_usd": 887519.28,
"recoverable_pct": 0.284
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101435",
"label": "fraudulent",
"label_confidence": 0.942,
"severity": "medium",
"timestamp": "2026-01-01T23:55:00Z",
"trace_id": "fe30ef51-71ea-dc92-0383-30813f68f7cb"
} | {
"account_age_days": 1072,
"account_id": "ACCT-91A91A5D3A88",
"baseline_risk_score": 0.617,
"kyc_tier": "tier_1",
"session_entropy": 0.145
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 901,
"timestamp": "2026-01-01T23:55:00Z",
"transaction_amount_usd": 37327.45
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.714,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 823334.8,
"financial_exposure_usd": 1045218.59,
"recoverable_pct": 0.129
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108478",
"label": "benign",
"label_confidence": 0.73,
"severity": "medium",
"timestamp": "2026-01-06T21:18:00Z",
"trace_id": "94f3294a-a8ff-fce9-4b6a-e5386655c1b3"
} | {
"account_age_days": 1068,
"account_id": "ACCT-EBA11524FAD1",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.777
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 493,
"timestamp": "2026-01-06T21:18:00Z",
"transaction_amount_usd": 2445.81
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.774,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2504.35,
"financial_exposure_usd": 2567.22,
"recoverable_pct": 0.492
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108364",
"label": "benign",
"label_confidence": 0.571,
"severity": "medium",
"timestamp": "2026-01-06T19:24:00Z",
"trace_id": "8c4d575e-06e3-b8d3-d490-6145cfac53ef"
} | {
"account_age_days": 148,
"account_id": "ACCT-B72BF5B9D908",
"baseline_risk_score": 0.143,
"kyc_tier": "tier_3",
"session_entropy": 0.249
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 87,
"timestamp": "2026-01-06T19:24:00Z",
"transaction_amount_usd": 9033.53
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.737,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3924.22,
"financial_exposure_usd": 4940.81,
"recoverable_pct": 0.952
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102783",
"label": "fraudulent",
"label_confidence": 0.819,
"severity": "medium",
"timestamp": "2026-01-02T22:23:00Z",
"trace_id": "aff6fdf5-bb2d-6e83-5060-6e464e1dda8f"
} | {
"account_age_days": 1293,
"account_id": "ACCT-F86B4670FE22",
"baseline_risk_score": 0.315,
"kyc_tier": "tier_2",
"session_entropy": 0.709
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 341,
"timestamp": "2026-01-02T14:50:00Z",
"transaction_amount_usd": 3.63
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.68,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 979825.01,
"financial_exposure_usd": 1268778.22,
"recoverable_pct": 0.46
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108759",
"label": "benign",
"label_confidence": 0.607,
"severity": "high",
"timestamp": "2026-01-07T01:59:00Z",
"trace_id": "9c0b8783-99f7-88d6-52e4-8191da181a16"
} | {
"account_age_days": 45,
"account_id": "ACCT-CC0C62DBA1D1",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.713
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 179,
"timestamp": "2026-01-06T15:36:00Z",
"transaction_amount_usd": 16.53
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.574,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3745.1,
"financial_exposure_usd": 5838.27,
"recoverable_pct": 0.583
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108920",
"label": "benign",
"label_confidence": 0.464,
"severity": "medium",
"timestamp": "2026-01-07T04:40:00Z",
"trace_id": "59e2027d-1e75-d6cb-472d-333adbcf5a17"
} | {
"account_age_days": 491,
"account_id": "ACCT-2A6441345544",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.358
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 87,
"timestamp": "2026-01-06T18:22:00Z",
"transaction_amount_usd": 11.91
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.644,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 853.75,
"financial_exposure_usd": 1975.76,
"recoverable_pct": 0.505
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100844",
"label": "fraudulent",
"label_confidence": 0.915,
"severity": "critical",
"timestamp": "2026-01-01T14:04:00Z",
"trace_id": "d6680668-5c72-2c55-d80c-6d2a22dd7bf3"
} | {
"account_age_days": 227,
"account_id": "ACCT-93EDD23F4A2D",
"baseline_risk_score": 0.483,
"kyc_tier": "tier_1",
"session_entropy": 0.339
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "MY",
"latency_ms": 593,
"timestamp": "2026-01-01T14:04:00Z",
"transaction_amount_usd": 94864.96
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.416,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 475000.16,
"financial_exposure_usd": 878286.45,
"recoverable_pct": 0.251
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109095",
"label": "benign",
"label_confidence": 0.516,
"severity": "medium",
"timestamp": "2026-01-07T07:35:00Z",
"trace_id": "d29609e7-9249-3635-e933-941338d67ea8"
} | {
"account_age_days": 1038,
"account_id": "ACCT-318C1C2F71BD",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.72
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 616,
"timestamp": "2026-01-07T07:35:00Z",
"transaction_amount_usd": 9380.89
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.736,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1341.26,
"financial_exposure_usd": 2277.85,
"recoverable_pct": 0.736
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109941",
"label": "benign",
"label_confidence": 0.679,
"severity": "low",
"timestamp": "2026-01-07T21:41:00Z",
"trace_id": "85c990f1-e770-6e43-17df-58bb907fdc08"
} | {
"account_age_days": 301,
"account_id": "ACCT-32B06E5D9170",
"baseline_risk_score": 0.083,
"kyc_tier": "tier_3",
"session_entropy": 0.888
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 640,
"timestamp": "2026-01-07T21:41:00Z",
"transaction_amount_usd": 9601.34
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.758,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2582.71,
"financial_exposure_usd": 5416.69,
"recoverable_pct": 0.991
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105566",
"label": "fraudulent",
"label_confidence": 0.921,
"severity": "medium",
"timestamp": "2026-01-04T20:46:00Z",
"trace_id": "621d7c46-5d31-68c3-3b46-5d275906ce10"
} | {
"account_age_days": 1649,
"account_id": "ACCT-A3F9F6BAF483",
"baseline_risk_score": 0.41,
"kyc_tier": "tier_2",
"session_entropy": 0.721
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 799,
"timestamp": "2026-01-04T20:46:00Z",
"transaction_amount_usd": 1198516.71
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.807,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1397824.75,
"financial_exposure_usd": 1902853.67,
"recoverable_pct": 0.767
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108810",
"label": "benign",
"label_confidence": 0.612,
"severity": "high",
"timestamp": "2026-01-07T02:50:00Z",
"trace_id": "510653dd-0564-79b5-1c69-b89dccd359d0"
} | {
"account_age_days": 1607,
"account_id": "ACCT-F6FE463919C1",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.312
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 811,
"timestamp": "2026-01-07T02:50:00Z",
"transaction_amount_usd": 4795.17
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.725,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 578.97,
"financial_exposure_usd": 1003.17,
"recoverable_pct": 0.742
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103005",
"label": "fraudulent",
"label_confidence": 0.957,
"severity": "critical",
"timestamp": "2026-01-03T02:05:00Z",
"trace_id": "b21aa55f-378d-a6c3-f334-a19b41e06324"
} | {
"account_age_days": 555,
"account_id": "ACCT-B023C61957D4",
"baseline_risk_score": 0.272,
"kyc_tier": "tier_1",
"session_entropy": 0.249
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 206,
"timestamp": "2026-01-02T23:58:00Z",
"transaction_amount_usd": 1.86
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.569,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 936226.04,
"financial_exposure_usd": 1050827.45,
"recoverable_pct": 0.184
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100555",
"label": "fraudulent",
"label_confidence": 0.809,
"severity": "critical",
"timestamp": "2026-01-01T09:15:00Z",
"trace_id": "9476f617-3d8e-cdff-273d-fd6fa08f1019"
} | {
"account_age_days": 988,
"account_id": "ACCT-82A3DF65DD26",
"baseline_risk_score": 0.462,
"kyc_tier": "tier_1",
"session_entropy": 0.873
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "JP",
"latency_ms": 888,
"timestamp": "2026-01-01T09:15:00Z",
"transaction_amount_usd": 26341.77
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.898,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 507442.99,
"financial_exposure_usd": 888992.36,
"recoverable_pct": 0.419
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108050",
"label": "benign",
"label_confidence": 0.551,
"severity": "medium",
"timestamp": "2026-01-06T14:10:00Z",
"trace_id": "db05604e-45cc-4ee1-afb8-2da819423799"
} | {
"account_age_days": 78,
"account_id": "ACCT-CA040D99D0D2",
"baseline_risk_score": 0.13,
"kyc_tier": "tier_1",
"session_entropy": 0.332
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 466,
"timestamp": "2026-01-06T14:10:00Z",
"transaction_amount_usd": 1126.22
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.591,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1100.39,
"financial_exposure_usd": 1184.64,
"recoverable_pct": 0.603
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100805",
"label": "fraudulent",
"label_confidence": 0.819,
"severity": "medium",
"timestamp": "2026-01-01T13:25:00Z",
"trace_id": "af358777-5d18-f6a8-bbeb-5066670f08e3"
} | {
"account_age_days": 1146,
"account_id": "ACCT-5BB7CA76008B",
"baseline_risk_score": 0.569,
"kyc_tier": "tier_2",
"session_entropy": 0.769
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 172,
"timestamp": "2026-01-01T13:25:00Z",
"transaction_amount_usd": 9841.53
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.749,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 669276.38,
"financial_exposure_usd": 831708.92,
"recoverable_pct": 0.407
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103894",
"label": "fraudulent",
"label_confidence": 0.775,
"severity": "medium",
"timestamp": "2026-01-03T16:54:00Z",
"trace_id": "ce139611-9b59-7d80-e059-bd98023c1f9c"
} | {
"account_age_days": 1446,
"account_id": "ACCT-0C3E0F4B4323",
"baseline_risk_score": 0.091,
"kyc_tier": "tier_2",
"session_entropy": 0.24
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 103,
"timestamp": "2026-01-03T10:15:00Z",
"transaction_amount_usd": 21.2
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.364,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 9",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3478316.32,
"financial_exposure_usd": 6070044.93,
"recoverable_pct": 0.528
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103208",
"label": "fraudulent",
"label_confidence": 0.787,
"severity": "critical",
"timestamp": "2026-01-03T05:28:00Z",
"trace_id": "69063bd0-59bd-ad39-c8cd-7929799c8259"
} | {
"account_age_days": 284,
"account_id": "ACCT-452DA88A293A",
"baseline_risk_score": 0.447,
"kyc_tier": "tier_2",
"session_entropy": 0.291
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 1055,
"timestamp": "2026-01-03T05:28:00Z",
"transaction_amount_usd": 114800.31
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.527,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 350095.94,
"financial_exposure_usd": 419904.53,
"recoverable_pct": 0.658
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103764",
"label": "fraudulent",
"label_confidence": 0.93,
"severity": "high",
"timestamp": "2026-01-03T14:44:00Z",
"trace_id": "95eba731-a0da-3e4e-4707-6e7e7937640d"
} | {
"account_age_days": 750,
"account_id": "ACCT-EB00BC49F7A5",
"baseline_risk_score": 0.244,
"kyc_tier": "tier_3",
"session_entropy": 0.572
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 292,
"timestamp": "2026-01-03T14:44:00Z",
"transaction_amount_usd": 1242060.88
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.478,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3086168.41,
"financial_exposure_usd": 3660674.07,
"recoverable_pct": 0.487
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101171",
"label": "fraudulent",
"label_confidence": 0.903,
"severity": "high",
"timestamp": "2026-01-01T19:31:00Z",
"trace_id": "748b7514-dfe9-e998-55d6-42d34ba06cec"
} | {
"account_age_days": 630,
"account_id": "ACCT-A50D174C1D84",
"baseline_risk_score": 0.312,
"kyc_tier": "tier_3",
"session_entropy": 0.384
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 314,
"timestamp": "2026-01-01T19:02:00Z",
"transaction_amount_usd": 24.46
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.463,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 578984.59,
"financial_exposure_usd": 823826.18,
"recoverable_pct": 0.517
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109134",
"label": "benign",
"label_confidence": 0.57,
"severity": "medium",
"timestamp": "2026-01-07T08:14:00Z",
"trace_id": "223a9a0f-2449-fc2b-5b80-7cd2a92e2afc"
} | {
"account_age_days": 1360,
"account_id": "ACCT-C28F2E235712",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.167
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 195,
"timestamp": "2026-01-07T03:14:00Z",
"transaction_amount_usd": 11.2
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.591,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 4073.68,
"financial_exposure_usd": 4144.29,
"recoverable_pct": 0.681
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107953",
"label": "benign",
"label_confidence": 0.58,
"severity": "low",
"timestamp": "2026-01-06T12:33:00Z",
"trace_id": "4f05555d-7643-c100-9041-f73521347bc9"
} | {
"account_age_days": 145,
"account_id": "ACCT-61B81A7C58D8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.141
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 406,
"timestamp": "2026-01-06T12:33:00Z",
"transaction_amount_usd": 14892.93
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.775,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1334.01,
"financial_exposure_usd": 2698.21,
"recoverable_pct": 0.571
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106237",
"label": "fraudulent",
"label_confidence": 0.797,
"severity": "low",
"timestamp": "2026-01-05T07:57:00Z",
"trace_id": "e1f26b79-0f75-c913-485d-df1b1b23f89a"
} | {
"account_age_days": 1891,
"account_id": "ACCT-E3FE1A30E7C7",
"baseline_risk_score": 0.412,
"kyc_tier": "tier_1",
"session_entropy": 0.2
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 176,
"timestamp": "2026-01-05T07:57:00Z",
"transaction_amount_usd": 204461.53
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.45,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 2051535.95,
"financial_exposure_usd": 4279792.28,
"recoverable_pct": 0.678
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107939",
"label": "benign",
"label_confidence": 0.726,
"severity": "low",
"timestamp": "2026-01-06T12:19:00Z",
"trace_id": "5b88bee2-da66-89a6-d932-67ca96e1b6db"
} | {
"account_age_days": 726,
"account_id": "ACCT-9C0C80CFD5C2",
"baseline_risk_score": 0.17,
"kyc_tier": "tier_1",
"session_entropy": 0.816
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 548,
"timestamp": "2026-01-06T12:19:00Z",
"transaction_amount_usd": 5120.52
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.756,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 2",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1240.92,
"financial_exposure_usd": 1815.23,
"recoverable_pct": 0.603
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103083",
"label": "fraudulent",
"label_confidence": 0.76,
"severity": "medium",
"timestamp": "2026-01-03T03:23:00Z",
"trace_id": "c4cabde6-4031-5ba2-1b26-5e138b28e1fe"
} | {
"account_age_days": 303,
"account_id": "ACCT-A8ADA3A7959E",
"baseline_risk_score": 0.474,
"kyc_tier": "tier_2",
"session_entropy": 0.603
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 819,
"timestamp": "2026-01-03T03:23:00Z",
"transaction_amount_usd": 3374.18
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.776,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 714103.99,
"financial_exposure_usd": 1262548.21,
"recoverable_pct": 0.765
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103353",
"label": "fraudulent",
"label_confidence": 0.825,
"severity": "medium",
"timestamp": "2026-01-03T07:53:00Z",
"trace_id": "894b34e1-9ee8-eb71-d61f-d90e40512313"
} | {
"account_age_days": 1014,
"account_id": "ACCT-F335B124A3F4",
"baseline_risk_score": 0.31,
"kyc_tier": "tier_1",
"session_entropy": 0.452
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 324,
"timestamp": "2026-01-03T07:53:00Z",
"transaction_amount_usd": 1022644.96
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.496,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3036012.79,
"financial_exposure_usd": 4248542.32,
"recoverable_pct": 0.584
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101408",
"label": "fraudulent",
"label_confidence": 0.76,
"severity": "low",
"timestamp": "2026-01-01T23:28:00Z",
"trace_id": "e85b1115-f84f-ac90-eddf-d4ac693d0814"
} | {
"account_age_days": 1084,
"account_id": "ACCT-E12FE6A4A7BF",
"baseline_risk_score": 0.347,
"kyc_tier": "tier_2",
"session_entropy": 0.286
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 301,
"timestamp": "2026-01-01T23:28:00Z",
"transaction_amount_usd": 86654.98
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.7,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING ... | {
"customer_funds_at_risk_usd": 1148322.31,
"financial_exposure_usd": 1181086.25,
"recoverable_pct": 0.477
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107514",
"label": "benign",
"label_confidence": 0.65,
"severity": "medium",
"timestamp": "2026-01-06T05:14:00Z",
"trace_id": "fa17a56d-91d7-eb09-8b45-01ded397c6ee"
} | {
"account_age_days": 419,
"account_id": "ACCT-4E5EA9BF965D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.525
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 365,
"timestamp": "2026-01-05T16:46:00Z",
"transaction_amount_usd": 15.95
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.699,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1996.75,
"financial_exposure_usd": 4034.31,
"recoverable_pct": 0.465
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102829",
"label": "fraudulent",
"label_confidence": 0.844,
"severity": "critical",
"timestamp": "2026-01-02T23:09:00Z",
"trace_id": "b1aa868d-b73b-5f9b-3b46-99bb26ce4cc8"
} | {
"account_age_days": 1848,
"account_id": "ACCT-66E914F37900",
"baseline_risk_score": 0.593,
"kyc_tier": "tier_2",
"session_entropy": 0.259
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "JP",
"latency_ms": 317,
"timestamp": "2026-01-02T23:09:00Z",
"transaction_amount_usd": 50288.53
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.869,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 736223.43,
"financial_exposure_usd": 1236141.9,
"recoverable_pct": 0.468
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109136",
"label": "benign",
"label_confidence": 0.71,
"severity": "low",
"timestamp": "2026-01-07T08:16:00Z",
"trace_id": "ee85baa5-b874-ee29-c8aa-7b7ea74824de"
} | {
"account_age_days": 1729,
"account_id": "ACCT-C35F7BAA819A",
"baseline_risk_score": 0.194,
"kyc_tier": "tier_2",
"session_entropy": 0.494
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 326,
"timestamp": "2026-01-07T05:09:00Z",
"transaction_amount_usd": 11.34
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.591,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1150.73,
"financial_exposure_usd": 1466.22,
"recoverable_pct": 0.425
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104661",
"label": "fraudulent",
"label_confidence": 0.846,
"severity": "high",
"timestamp": "2026-01-04T05:41:00Z",
"trace_id": "2b122c6e-8eb3-3a29-f0b3-c71936a862cf"
} | {
"account_age_days": 1975,
"account_id": "ACCT-E3CF304EDFF5",
"baseline_risk_score": 0.144,
"kyc_tier": "tier_2",
"session_entropy": 0.847
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 158,
"timestamp": "2026-01-04T05:41:00Z",
"transaction_amount_usd": 2743173.49
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.411,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1470156.76,
"financial_exposure_usd": 2758767.47,
"recoverable_pct": 0.707
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108997",
"label": "benign",
"label_confidence": 0.648,
"severity": "medium",
"timestamp": "2026-01-07T05:57:00Z",
"trace_id": "f442f9a8-43be-d32e-60f5-abbf628d9b09"
} | {
"account_age_days": 550,
"account_id": "ACCT-7B6F558AB848",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.349
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 695,
"timestamp": "2026-01-07T05:57:00Z",
"transaction_amount_usd": 13416.1
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.459,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2637.8,
"financial_exposure_usd": 3000.44,
"recoverable_pct": 0.782
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108100",
"label": "benign",
"label_confidence": 0.734,
"severity": "medium",
"timestamp": "2026-01-06T15:00:00Z",
"trace_id": "5f7e3bfd-0b7b-28d6-d6a7-3be143e9c362"
} | {
"account_age_days": 1721,
"account_id": "ACCT-AA6D3CDD707B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.498
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 300,
"timestamp": "2026-01-06T07:32:00Z",
"transaction_amount_usd": 6.69
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.784,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 0, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 0,
"financial_exposure_usd": 0,
"recoverable_pct": 0.676
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103800",
"label": "fraudulent",
"label_confidence": 0.86,
"severity": "high",
"timestamp": "2026-01-03T15:20:00Z",
"trace_id": "93620939-7a89-c3fd-363c-65b23a56280e"
} | {
"account_age_days": 1322,
"account_id": "ACCT-A5F9D605C52D",
"baseline_risk_score": 0.15,
"kyc_tier": "tier_2",
"session_entropy": 0.263
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 306,
"timestamp": "2026-01-03T12:15:00Z",
"transaction_amount_usd": 4.48
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.813,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 6124419.98,
"financial_exposure_usd": 8690505.56,
"recoverable_pct": 0.804
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108281",
"label": "benign",
"label_confidence": 0.5,
"severity": "low",
"timestamp": "2026-01-06T18:01:00Z",
"trace_id": "032fc7d7-ffdd-0b32-e2bb-8c75230fab84"
} | {
"account_age_days": 1630,
"account_id": "ACCT-2B757D4B040E",
"baseline_risk_score": 0.066,
"kyc_tier": "tier_3",
"session_entropy": 0.461
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 469,
"timestamp": "2026-01-06T18:01:00Z",
"transaction_amount_usd": 13095.81
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.54,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 2772.45,
"financial_exposure_usd": 3419.88,
"recoverable_pct": 0.713
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100927",
"label": "fraudulent",
"label_confidence": 0.955,
"severity": "medium",
"timestamp": "2026-01-01T15:27:00Z",
"trace_id": "da212725-15f2-4b9d-e7bb-ec67e78721d0"
} | {
"account_age_days": 885,
"account_id": "ACCT-0F264FEC76DA",
"baseline_risk_score": 0.274,
"kyc_tier": "tier_2",
"session_entropy": 0.735
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 1084,
"timestamp": "2026-01-01T15:27:00Z",
"transaction_amount_usd": 21624.67
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.81,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 583541.11,
"financial_exposure_usd": 989794.78,
"recoverable_pct": 0.022
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102190",
"label": "fraudulent",
"label_confidence": 0.851,
"severity": "low",
"timestamp": "2026-01-02T12:30:00Z",
"trace_id": "58179fc9-6360-5e4d-c1a2-4454f70e12ca"
} | {
"account_age_days": 126,
"account_id": "ACCT-5F6FBDC1A531",
"baseline_risk_score": 0.52,
"kyc_tier": "tier_3",
"session_entropy": 0.62
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 245,
"timestamp": "2026-01-02T12:30:00Z",
"transaction_amount_usd": 89453.12
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.838,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 612499.08,
"financial_exposure_usd": 650621.44,
"recoverable_pct": 0.792
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102311",
"label": "fraudulent",
"label_confidence": 0.944,
"severity": "low",
"timestamp": "2026-01-02T14:31:00Z",
"trace_id": "981e4967-a950-580b-02f9-c894d7d02559"
} | {
"account_age_days": 1451,
"account_id": "ACCT-6FBDCFB7246A",
"baseline_risk_score": 0.554,
"kyc_tier": "tier_1",
"session_entropy": 0.458
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 131,
"timestamp": "2026-01-02T02:41:00Z",
"transaction_amount_usd": 21.61
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.541,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 524007.93,
"financial_exposure_usd": 1254318.24,
"recoverable_pct": 0.27
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104018",
"label": "fraudulent",
"label_confidence": 0.826,
"severity": "critical",
"timestamp": "2026-01-03T18:58:00Z",
"trace_id": "1d7037fc-d184-c4c8-3998-6d39ecec7723"
} | {
"account_age_days": 895,
"account_id": "ACCT-05FE67637EEE",
"baseline_risk_score": 0.322,
"kyc_tier": "tier_2",
"session_entropy": 0.34
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 195,
"timestamp": "2026-01-03T18:58:00Z",
"transaction_amount_usd": 573355.42
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.366,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2255645.44,
"financial_exposure_usd": 3666447.38,
"recoverable_pct": 0.863
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105181",
"label": "fraudulent",
"label_confidence": 0.92,
"severity": "medium",
"timestamp": "2026-01-04T14:21:00Z",
"trace_id": "5667338b-1795-ff7f-35b8-0ac792c82af3"
} | {
"account_age_days": 190,
"account_id": "ACCT-88C6084E756E",
"baseline_risk_score": 0.315,
"kyc_tier": "tier_3",
"session_entropy": 0.523
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 1174,
"timestamp": "2026-01-04T14:21:00Z",
"transaction_amount_usd": 385591.44
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.71,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 5780390.9,
"financial_exposure_usd": 5987079.18,
"recoverable_pct": 0.756
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108206",
"label": "benign",
"label_confidence": 0.61,
"severity": "low",
"timestamp": "2026-01-06T16:46:00Z",
"trace_id": "2b87e501-8edf-287f-7a5d-8e9d351a4813"
} | {
"account_age_days": 1903,
"account_id": "ACCT-890F43A91BF0",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.129
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 189,
"timestamp": "2026-01-06T13:03:00Z",
"transaction_amount_usd": 24.49
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.746,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2008.75,
"financial_exposure_usd": 5015.07,
"recoverable_pct": 0.416
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102535",
"label": "fraudulent",
"label_confidence": 0.858,
"severity": "high",
"timestamp": "2026-01-02T18:15:00Z",
"trace_id": "d004abaf-1053-1e75-ac9f-f6d6de16b62b"
} | {
"account_age_days": 1929,
"account_id": "ACCT-BE0C6D54CA0F",
"baseline_risk_score": 0.279,
"kyc_tier": "tier_3",
"session_entropy": 0.306
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 151,
"timestamp": "2026-01-02T15:54:00Z",
"transaction_amount_usd": 21
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.729,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 396906.88,
"financial_exposure_usd": 408851.91,
"recoverable_pct": 0.344
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100683",
"label": "fraudulent",
"label_confidence": 0.891,
"severity": "critical",
"timestamp": "2026-01-01T11:23:00Z",
"trace_id": "0d8d6572-9c22-b839-4909-922b9f8b946c"
} | {
"account_age_days": 626,
"account_id": "ACCT-7A679F88FE0E",
"baseline_risk_score": 0.431,
"kyc_tier": "tier_3",
"session_entropy": 0.688
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 311,
"timestamp": "2025-12-31T22:46:00Z",
"transaction_amount_usd": 4.66
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.839,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 678447.31,
"financial_exposure_usd": 790874.54,
"recoverable_pct": 0.407
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103211",
"label": "fraudulent",
"label_confidence": 0.924,
"severity": "medium",
"timestamp": "2026-01-03T05:31:00Z",
"trace_id": "9c546bdb-b8f1-95a9-54e4-3f833bac4b14"
} | {
"account_age_days": 630,
"account_id": "ACCT-BDCE51EF014C",
"baseline_risk_score": 0.498,
"kyc_tier": "tier_3",
"session_entropy": 0.334
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 212,
"timestamp": "2026-01-02T19:11:00Z",
"transaction_amount_usd": 4.22
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.61,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 9",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 277386.81,
"financial_exposure_usd": 349191.09,
"recoverable_pct": 0.368
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108709",
"label": "benign",
"label_confidence": 0.638,
"severity": "medium",
"timestamp": "2026-01-07T01:09:00Z",
"trace_id": "cf9ffbca-0e92-2a53-4427-8697fc43cc73"
} | {
"account_age_days": 1410,
"account_id": "ACCT-4CEA1641B8C6",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.761
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 376,
"timestamp": "2026-01-06T19:15:00Z",
"transaction_amount_usd": 18.23
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.457,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3228.06,
"financial_exposure_usd": 3923.4,
"recoverable_pct": 0.808
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106175",
"label": "fraudulent",
"label_confidence": 0.747,
"severity": "high",
"timestamp": "2026-01-05T06:55:00Z",
"trace_id": "93cdab86-aac3-ee7e-95ec-f7cbb4bcd1fd"
} | {
"account_age_days": 1176,
"account_id": "ACCT-AA74EB7C2C9B",
"baseline_risk_score": 0.432,
"kyc_tier": "tier_2",
"session_entropy": 0.448
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 1016,
"timestamp": "2026-01-05T06:55:00Z",
"transaction_amount_usd": 308789.41
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.692,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2351613.4,
"financial_exposure_usd": 5444937.44,
"recoverable_pct": 0.972
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102982",
"label": "fraudulent",
"label_confidence": 0.871,
"severity": "critical",
"timestamp": "2026-01-03T01:42:00Z",
"trace_id": "891469c8-4502-e019-deda-6a799d7e94bf"
} | {
"account_age_days": 559,
"account_id": "ACCT-A13FF68DD8A7",
"baseline_risk_score": 0.562,
"kyc_tier": "tier_3",
"session_entropy": 0.944
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "FR",
"latency_ms": 775,
"timestamp": "2026-01-03T01:42:00Z",
"transaction_amount_usd": 3844.61
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.545,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 536416.01,
"financial_exposure_usd": 690298.8,
"recoverable_pct": 0.417
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109515",
"label": "benign",
"label_confidence": 0.566,
"severity": "low",
"timestamp": "2026-01-07T14:35:00Z",
"trace_id": "a8e56b33-a1c8-4e23-effe-12bb0959ad55"
} | {
"account_age_days": 1294,
"account_id": "ACCT-CB0FBE3DAFCC",
"baseline_risk_score": 0.141,
"kyc_tier": "tier_1",
"session_entropy": 0.57
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 328,
"timestamp": "2026-01-07T14:35:00Z",
"transaction_amount_usd": 8578.43
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.586,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3303.76,
"financial_exposure_usd": 4613.8,
"recoverable_pct": 0.91
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108071",
"label": "benign",
"label_confidence": 0.566,
"severity": "low",
"timestamp": "2026-01-06T14:31:00Z",
"trace_id": "a7d8e23a-969d-734a-f199-76a615a19113"
} | {
"account_age_days": 515,
"account_id": "ACCT-DCECAA47E8C4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.48
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 187,
"timestamp": "2026-01-06T14:31:00Z",
"transaction_amount_usd": 13489.7
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.701,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1484.08,
"financial_exposure_usd": 1988.14,
"recoverable_pct": 0.436
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101854",
"label": "fraudulent",
"label_confidence": 0.932,
"severity": "high",
"timestamp": "2026-01-02T06:54:00Z",
"trace_id": "4f60bfcb-e762-dd3f-42b7-322dd18f8d66"
} | {
"account_age_days": 295,
"account_id": "ACCT-F77DF484A30D",
"baseline_risk_score": 0.647,
"kyc_tier": "tier_3",
"session_entropy": 0.568
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 343,
"timestamp": "2026-01-02T03:46:00Z",
"transaction_amount_usd": 22.49
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.942,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 871722.02,
"financial_exposure_usd": 1152037.84,
"recoverable_pct": 0.691
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101715",
"label": "fraudulent",
"label_confidence": 0.917,
"severity": "critical",
"timestamp": "2026-01-02T04:35:00Z",
"trace_id": "c2efb5ba-7ae2-eab2-a9c1-2c19fea08344"
} | {
"account_age_days": 1835,
"account_id": "ACCT-A0DDE96C10A0",
"baseline_risk_score": 0.583,
"kyc_tier": "tier_2",
"session_entropy": 0.285
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 353,
"timestamp": "2026-01-02T04:35:00Z",
"transaction_amount_usd": 75241.88
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.716,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 347841.91,
"financial_exposure_usd": 703017.97,
"recoverable_pct": 0.117
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100621",
"label": "fraudulent",
"label_confidence": 0.965,
"severity": "high",
"timestamp": "2026-01-01T10:21:00Z",
"trace_id": "85cbad8d-e9a5-aa16-f1a1-fe4176ef5c6a"
} | {
"account_age_days": 795,
"account_id": "ACCT-16DEAD77E806",
"baseline_risk_score": 0.568,
"kyc_tier": "tier_1",
"session_entropy": 0.492
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 901,
"timestamp": "2026-01-01T10:21:00Z",
"transaction_amount_usd": 101352.97
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.74,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 412671.8,
"financial_exposure_usd": 881752.61,
"recoverable_pct": 0.571
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108496",
"label": "benign",
"label_confidence": 0.702,
"severity": "low",
"timestamp": "2026-01-06T21:36:00Z",
"trace_id": "cb6b7909-7222-1b1e-5bfa-859a36d16524"
} | {
"account_age_days": 1583,
"account_id": "ACCT-982D4C09A453",
"baseline_risk_score": 0.077,
"kyc_tier": "tier_1",
"session_entropy": 0.524
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 788,
"timestamp": "2026-01-06T21:36:00Z",
"transaction_amount_usd": 2853.87
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.793,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1512.21,
"financial_exposure_usd": 2267.9,
"recoverable_pct": 0.91
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100438",
"label": "fraudulent",
"label_confidence": 0.76,
"severity": "low",
"timestamp": "2026-01-01T07:18:00Z",
"trace_id": "0d7079bd-f037-13d6-a89d-db8c4282c052"
} | {
"account_age_days": 1685,
"account_id": "ACCT-0C56B0286656",
"baseline_risk_score": 0.342,
"kyc_tier": "tier_1",
"session_entropy": 0.207
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 111,
"timestamp": "2026-01-01T01:25:00Z",
"transaction_amount_usd": 12.32
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.408,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 333772.31,
"financial_exposure_usd": 481992.66,
"recoverable_pct": 0.076
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108212",
"label": "benign",
"label_confidence": 0.713,
"severity": "medium",
"timestamp": "2026-01-06T16:52:00Z",
"trace_id": "3e5a2b56-371d-1ea1-e21e-0f2fdf0a80fa"
} | {
"account_age_days": 440,
"account_id": "ACCT-269C02D5E165",
"baseline_risk_score": 0.056,
"kyc_tier": "tier_3",
"session_entropy": 0.774
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 200,
"timestamp": "2026-01-06T08:49:00Z",
"transaction_amount_usd": 15.64
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.614,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1538.98,
"financial_exposure_usd": 2064.81,
"recoverable_pct": 0.756
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102299",
"label": "fraudulent",
"label_confidence": 0.875,
"severity": "medium",
"timestamp": "2026-01-02T14:19:00Z",
"trace_id": "627da923-5449-9195-b56e-e302a23ab036"
} | {
"account_age_days": 1560,
"account_id": "ACCT-A37AAACF3CC0",
"baseline_risk_score": 0.527,
"kyc_tier": "tier_2",
"session_entropy": 0.58
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 359,
"timestamp": "2026-01-02T06:42:00Z",
"transaction_amount_usd": 5.6
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"ge... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.882,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 543837.31,
"financial_exposure_usd": 585856.96,
"recoverable_pct": 0.534
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106693",
"label": "benign",
"label_confidence": 0.514,
"severity": "medium",
"timestamp": "2026-01-05T15:33:00Z",
"trace_id": "aafeadcf-d555-9096-02ca-bf41b81d0fb5"
} | {
"account_age_days": 1287,
"account_id": "ACCT-853903AC2284",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.873
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 988,
"timestamp": "2026-01-05T15:33:00Z",
"transaction_amount_usd": 10973.4
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.781,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3098.51,
"financial_exposure_usd": 5351.39,
"recoverable_pct": 0.651
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104557",
"label": "fraudulent",
"label_confidence": 0.715,
"severity": "medium",
"timestamp": "2026-01-04T03:57:00Z",
"trace_id": "7d961cdc-ca6f-74cc-95f8-58b8bd02b1aa"
} | {
"account_age_days": 914,
"account_id": "ACCT-80CD54F7BD8F",
"baseline_risk_score": 0.095,
"kyc_tier": "tier_1",
"session_entropy": 0.463
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 983,
"timestamp": "2026-01-04T03:57:00Z",
"transaction_amount_usd": 1242871.29
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.92,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 1669162.89,
"financial_exposure_usd": 2667158.66,
"recoverable_pct": 0.68
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100110",
"label": "fraudulent",
"label_confidence": 0.777,
"severity": "medium",
"timestamp": "2026-01-01T01:50:00Z",
"trace_id": "732fc932-ab96-2697-c1e1-f813747ac231"
} | {
"account_age_days": 996,
"account_id": "ACCT-B3DD7820BD20",
"baseline_risk_score": 0.419,
"kyc_tier": "tier_2",
"session_entropy": 0.478
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NL",
"latency_ms": 240,
"timestamp": "2026-01-01T01:50:00Z",
"transaction_amount_usd": 41289.46
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.866,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 539971.97,
"financial_exposure_usd": 1036806.46,
"recoverable_pct": 0.484
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104976",
"label": "fraudulent",
"label_confidence": 0.641,
"severity": "high",
"timestamp": "2026-01-04T10:56:00Z",
"trace_id": "1b457872-a336-7a30-fb12-9f59e0db689c"
} | {
"account_age_days": 1555,
"account_id": "ACCT-732C11154002",
"baseline_risk_score": 0.288,
"kyc_tier": "tier_3",
"session_entropy": 0.225
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 869,
"timestamp": "2026-01-04T10:56:00Z",
"transaction_amount_usd": 467327.81
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.429,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4585764.24,
"financial_exposure_usd": 5447873.36,
"recoverable_pct": 0.547
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109040",
"label": "benign",
"label_confidence": 0.656,
"severity": "medium",
"timestamp": "2026-01-07T06:40:00Z",
"trace_id": "89a4bd47-863c-1dc0-d2fa-6c1f3905d42f"
} | {
"account_age_days": 575,
"account_id": "ACCT-9D8BFFED6B2E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.854
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 793,
"timestamp": "2026-01-07T06:40:00Z",
"transaction_amount_usd": 7270.27
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.594,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 182.88,
"financial_exposure_usd": 197.18,
"recoverable_pct": 0.498
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100463",
"label": "fraudulent",
"label_confidence": 0.858,
"severity": "low",
"timestamp": "2026-01-01T07:43:00Z",
"trace_id": "41d51311-60ae-027d-c181-f88fa4d6b520"
} | {
"account_age_days": 998,
"account_id": "ACCT-B9538558C789",
"baseline_risk_score": 0.531,
"kyc_tier": "tier_1",
"session_entropy": 0.682
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 1136,
"timestamp": "2026-01-01T07:43:00Z",
"transaction_amount_usd": 656.52
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.452,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 495518.78,
"financial_exposure_usd": 728271.87,
"recoverable_pct": 0.088
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107309",
"label": "benign",
"label_confidence": 0.587,
"severity": "medium",
"timestamp": "2026-01-06T01:49:00Z",
"trace_id": "4337266d-daa9-a46f-8e04-543d17d2ecc5"
} | {
"account_age_days": 1859,
"account_id": "ACCT-4C319FD08F90",
"baseline_risk_score": 0.147,
"kyc_tier": "tier_3",
"session_entropy": 0.762
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 706,
"timestamp": "2026-01-06T01:49:00Z",
"transaction_amount_usd": 3989.09
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.474,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3127.94,
"financial_exposure_usd": 5775.18,
"recoverable_pct": 0.965
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101197",
"label": "fraudulent",
"label_confidence": 0.973,
"severity": "high",
"timestamp": "2026-01-01T19:57:00Z",
"trace_id": "7d6d67c6-6a48-ee73-51ad-3af7246273bf"
} | {
"account_age_days": 1425,
"account_id": "ACCT-3C3F7CD74528",
"baseline_risk_score": 0.342,
"kyc_tier": "tier_2",
"session_entropy": 0.798
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 416,
"timestamp": "2026-01-01T19:57:00Z",
"transaction_amount_usd": 21917.88
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.404,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 719330.04,
"financial_exposure_usd": 1040759.65,
"recoverable_pct": 0.618
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107053",
"label": "benign",
"label_confidence": 0.56,
"severity": "high",
"timestamp": "2026-01-05T21:33:00Z",
"trace_id": "69b70e96-9fc7-7988-af44-9e11bac953ad"
} | {
"account_age_days": 1542,
"account_id": "ACCT-33784327213A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.652
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 146,
"timestamp": "2026-01-05T21:33:00Z",
"transaction_amount_usd": 13645.02
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.631,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2706.83,
"financial_exposure_usd": 2889.87,
"recoverable_pct": 0.675
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106000",
"label": "fraudulent",
"label_confidence": 0.681,
"severity": "high",
"timestamp": "2026-01-05T04:00:00Z",
"trace_id": "c176ac35-69b7-0a68-52fd-8266da2bbd93"
} | {
"account_age_days": 82,
"account_id": "ACCT-E01B04FF88DF",
"baseline_risk_score": 0.21,
"kyc_tier": "tier_1",
"session_entropy": 0.536
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 358,
"timestamp": "2026-01-04T19:25:00Z",
"transaction_amount_usd": 22.96
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.792,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4255642.06,
"financial_exposure_usd": 4483292.21,
"recoverable_pct": 0.599
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109373",
"label": "benign",
"label_confidence": 0.548,
"severity": "low",
"timestamp": "2026-01-07T12:13:00Z",
"trace_id": "c8cc3281-81c8-845c-6130-1762ce02484f"
} | {
"account_age_days": 1448,
"account_id": "ACCT-59DE09FCC820",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.582
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 308,
"timestamp": "2026-01-07T12:13:00Z",
"transaction_amount_usd": 10635.38
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.464,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2044.16,
"financial_exposure_usd": 2508.5,
"recoverable_pct": 0.568
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103871",
"label": "fraudulent",
"label_confidence": 0.807,
"severity": "critical",
"timestamp": "2026-01-03T16:31:00Z",
"trace_id": "3c715e26-cff1-ad6a-2685-fe62ef1a0550"
} | {
"account_age_days": 1449,
"account_id": "ACCT-F3776EB10173",
"baseline_risk_score": 0.317,
"kyc_tier": "tier_3",
"session_entropy": 0.156
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 506,
"timestamp": "2026-01-03T16:31:00Z",
"transaction_amount_usd": 2649545.85
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.414,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3937474.08,
"financial_exposure_usd": 4227836.03,
"recoverable_pct": 0.57
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102049",
"label": "fraudulent",
"label_confidence": 0.827,
"severity": "high",
"timestamp": "2026-01-02T10:09:00Z",
"trace_id": "6eccfcc6-5ae8-54dc-c38f-c4508c7ca68b"
} | {
"account_age_days": 1826,
"account_id": "ACCT-16163BF96708",
"baseline_risk_score": 0.501,
"kyc_tier": "tier_2",
"session_entropy": 0.315
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 176,
"timestamp": "2026-01-01T21:40:00Z",
"transaction_amount_usd": 22.49
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.539,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 331108.57,
"financial_exposure_usd": 552744.91,
"recoverable_pct": 0.598
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103457",
"label": "fraudulent",
"label_confidence": 0.795,
"severity": "high",
"timestamp": "2026-01-03T09:37:00Z",
"trace_id": "9d304d9c-beb9-b7d7-3cd6-8ccc914856e3"
} | {
"account_age_days": 1865,
"account_id": "ACCT-B300B34CF71A",
"baseline_risk_score": 0.188,
"kyc_tier": "tier_1",
"session_entropy": 0.372
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 1151,
"timestamp": "2026-01-03T09:37:00Z",
"transaction_amount_usd": 664956.92
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.424,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4545983.18,
"financial_exposure_usd": 4813739.26,
"recoverable_pct": 0.841
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103163",
"label": "fraudulent",
"label_confidence": 0.967,
"severity": "high",
"timestamp": "2026-01-03T04:43:00Z",
"trace_id": "8d4dfee4-f3f7-402a-dc9f-e91c1591e71a"
} | {
"account_age_days": 1009,
"account_id": "ACCT-A7876D91E931",
"baseline_risk_score": 0.553,
"kyc_tier": "tier_1",
"session_entropy": 0.707
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 377,
"timestamp": "2026-01-03T04:43:00Z",
"transaction_amount_usd": 25216.25
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.775,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 509284.24,
"financial_exposure_usd": 566348.48,
"recoverable_pct": 0.588
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105413",
"label": "fraudulent",
"label_confidence": 0.83,
"severity": "high",
"timestamp": "2026-01-04T18:13:00Z",
"trace_id": "5dc02eb0-6453-d653-fb7a-66c9d1875015"
} | {
"account_age_days": 1871,
"account_id": "ACCT-C94F36D0A2AE",
"baseline_risk_score": 0.07,
"kyc_tier": "tier_1",
"session_entropy": 0.302
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 291,
"timestamp": "2026-01-04T11:18:00Z",
"transaction_amount_usd": 6.89
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.525,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2181071.91,
"financial_exposure_usd": 4042864.39,
"recoverable_pct": 0.89
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100288",
"label": "fraudulent",
"label_confidence": 0.831,
"severity": "medium",
"timestamp": "2026-01-01T04:48:00Z",
"trace_id": "b819544a-20b8-d865-580e-60e43f027521"
} | {
"account_age_days": 1831,
"account_id": "ACCT-FB0100D9D2D9",
"baseline_risk_score": 0.409,
"kyc_tier": "tier_3",
"session_entropy": 0.571
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "SG",
"latency_ms": 383,
"timestamp": "2026-01-01T04:48:00Z",
"transaction_amount_usd": 42593.74
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.729,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 758165.74,
"financial_exposure_usd": 920492.59,
"recoverable_pct": 0.819
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109276",
"label": "benign",
"label_confidence": 0.511,
"severity": "low",
"timestamp": "2026-01-07T10:36:00Z",
"trace_id": "41ff9569-0ecc-214d-fef0-b1130075f957"
} | {
"account_age_days": 258,
"account_id": "ACCT-1990F0C2D01C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.894
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 1198,
"timestamp": "2026-01-07T10:36:00Z",
"transaction_amount_usd": 14719.51
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.656,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 990.66,
"financial_exposure_usd": 1445.8,
"recoverable_pct": 0.499
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101221",
"label": "fraudulent",
"label_confidence": 0.975,
"severity": "critical",
"timestamp": "2026-01-01T20:21:00Z",
"trace_id": "cc66341b-165d-1e22-c497-0b47313286b6"
} | {
"account_age_days": 1361,
"account_id": "ACCT-6B6E44E64A71",
"baseline_risk_score": 0.544,
"kyc_tier": "tier_2",
"session_entropy": 0.123
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "GB",
"latency_ms": 1123,
"timestamp": "2026-01-01T20:21:00Z",
"transaction_amount_usd": 102468.61
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.56,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 451274.54,
"financial_exposure_usd": 553350.05,
"recoverable_pct": 0.081
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107508",
"label": "benign",
"label_confidence": 0.737,
"severity": "medium",
"timestamp": "2026-01-06T05:08:00Z",
"trace_id": "49805c48-cce8-9beb-e3d6-8303e910e247"
} | {
"account_age_days": 631,
"account_id": "ACCT-764FC6246011",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.754
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 149,
"timestamp": "2026-01-06T05:08:00Z",
"transaction_amount_usd": 5411.77
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.756,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2486.9,
"financial_exposure_usd": 4836.03,
"recoverable_pct": 0.667
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103462",
"label": "fraudulent",
"label_confidence": 0.866,
"severity": "high",
"timestamp": "2026-01-03T09:42:00Z",
"trace_id": "081bb1f8-1bf9-e499-5010-81e3bbb5c83e"
} | {
"account_age_days": 1574,
"account_id": "ACCT-83C3A6569CE4",
"baseline_risk_score": 0.187,
"kyc_tier": "tier_3",
"session_entropy": 0.803
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 208,
"timestamp": "2026-01-03T09:42:00Z",
"transaction_amount_usd": 445501.36
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.806,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4909535.31,
"financial_exposure_usd": 5895200.79,
"recoverable_pct": 0.749
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107536",
"label": "benign",
"label_confidence": 0.538,
"severity": "low",
"timestamp": "2026-01-06T05:36:00Z",
"trace_id": "fd116ac9-cb10-b447-48a4-53e6628fe268"
} | {
"account_age_days": 1002,
"account_id": "ACCT-DE96D3C0EBCD",
"baseline_risk_score": 0.182,
"kyc_tier": "tier_2",
"session_entropy": 0.625
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 287,
"timestamp": "2026-01-06T05:36:00Z",
"transaction_amount_usd": 4488.34
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.586,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1377.05,
"financial_exposure_usd": 1520.74,
"recoverable_pct": 0.827
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103809",
"label": "fraudulent",
"label_confidence": 0.748,
"severity": "critical",
"timestamp": "2026-01-03T15:29:00Z",
"trace_id": "8719cd4b-55e2-5a59-94c7-5fb7ca7a4dff"
} | {
"account_age_days": 1890,
"account_id": "ACCT-D21FD98E8CEF",
"baseline_risk_score": 0.413,
"kyc_tier": "tier_1",
"session_entropy": 0.125
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 191,
"timestamp": "2026-01-03T15:29:00Z",
"transaction_amount_usd": 2088066.15
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.874,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3675377.23,
"financial_exposure_usd": 4298627.46,
"recoverable_pct": 0.953
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101569",
"label": "fraudulent",
"label_confidence": 0.926,
"severity": "critical",
"timestamp": "2026-01-02T02:09:00Z",
"trace_id": "e28ae0fc-797e-f304-c7a3-94bc5b36a424"
} | {
"account_age_days": 1832,
"account_id": "ACCT-DA0808ABD7AE",
"baseline_risk_score": 0.383,
"kyc_tier": "tier_3",
"session_entropy": 0.531
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 1119,
"timestamp": "2026-01-02T02:09:00Z",
"transaction_amount_usd": 49801.36
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.896,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 462807.85,
"financial_exposure_usd": 470595.23,
"recoverable_pct": 0.822
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100855",
"label": "fraudulent",
"label_confidence": 0.84,
"severity": "medium",
"timestamp": "2026-01-01T14:15:00Z",
"trace_id": "f37e0979-ec80-3df5-bd62-c9165dee6318"
} | {
"account_age_days": 851,
"account_id": "ACCT-AF47A214180B",
"baseline_risk_score": 0.395,
"kyc_tier": "tier_1",
"session_entropy": 0.174
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "DE",
"latency_ms": 984,
"timestamp": "2026-01-01T14:15:00Z",
"transaction_amount_usd": 107610.48
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.932,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 69827.03,
"financial_exposure_usd": 109589.7,
"recoverable_pct": 0.833
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102115",
"label": "fraudulent",
"label_confidence": 0.901,
"severity": "critical",
"timestamp": "2026-01-02T11:15:00Z",
"trace_id": "dd9b6816-0e40-da3d-63f7-30b6555c998c"
} | {
"account_age_days": 1893,
"account_id": "ACCT-D4F14A576505",
"baseline_risk_score": 0.388,
"kyc_tier": "tier_3",
"session_entropy": 0.744
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 96,
"timestamp": "2026-01-02T10:13:00Z",
"transaction_amount_usd": 11.64
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.738,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 247052.33,
"financial_exposure_usd": 431276.86,
"recoverable_pct": 0.679
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103944",
"label": "fraudulent",
"label_confidence": 0.795,
"severity": "low",
"timestamp": "2026-01-03T17:44:00Z",
"trace_id": "46539681-c857-b167-9f8a-899e14fbaeda"
} | {
"account_age_days": 1648,
"account_id": "ACCT-A34BF326B43E",
"baseline_risk_score": 0.157,
"kyc_tier": "tier_2",
"session_entropy": 0.289
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 224,
"timestamp": "2026-01-03T14:40:00Z",
"transaction_amount_usd": 0.07
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.585,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3671124.92,
"financial_exposure_usd": 5299337.55,
"recoverable_pct": 0.588
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103187",
"label": "fraudulent",
"label_confidence": 0.893,
"severity": "high",
"timestamp": "2026-01-03T05:07:00Z",
"trace_id": "a0f457f6-6221-474b-6ff4-b2629a8511d2"
} | {
"account_age_days": 473,
"account_id": "ACCT-026D775F6DC7",
"baseline_risk_score": 0.426,
"kyc_tier": "tier_3",
"session_entropy": 0.777
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 84,
"timestamp": "2026-01-02T21:00:00Z",
"transaction_amount_usd": 10.98
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.752,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 715899.1,
"financial_exposure_usd": 879715.76,
"recoverable_pct": 0.065
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100084",
"label": "fraudulent",
"label_confidence": 0.914,
"severity": "high",
"timestamp": "2026-01-01T01:24:00Z",
"trace_id": "48843b5b-cdd3-214c-b450-8610f17aa7a9"
} | {
"account_age_days": 621,
"account_id": "ACCT-A64272A28E5F",
"baseline_risk_score": 0.412,
"kyc_tier": "tier_3",
"session_entropy": 0.16
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 105,
"timestamp": "2025-12-31T14:46:00Z",
"transaction_amount_usd": 8.47
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.59,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 443025.13,
"financial_exposure_usd": 815666.14,
"recoverable_pct": 0.207
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104734",
"label": "fraudulent",
"label_confidence": 0.911,
"severity": "high",
"timestamp": "2026-01-04T06:54:00Z",
"trace_id": "3d73fa86-a681-af49-6fd2-bf6227325aa9"
} | {
"account_age_days": 1454,
"account_id": "ACCT-A26C5FB41ADB",
"baseline_risk_score": 0.15,
"kyc_tier": "tier_1",
"session_entropy": 0.602
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 736,
"timestamp": "2026-01-04T06:54:00Z",
"transaction_amount_usd": 2242947.48
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.812,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 923398.47,
"financial_exposure_usd": 1913837.29,
"recoverable_pct": 0.976
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106609",
"label": "fraudulent",
"label_confidence": 0.65,
"severity": "medium",
"timestamp": "2026-01-05T14:09:00Z",
"trace_id": "ec1027ce-82c9-2f1f-2082-109373b7ba01"
} | {
"account_age_days": 1797,
"account_id": "ACCT-4BA145B8BAB7",
"baseline_risk_score": 0.418,
"kyc_tier": "tier_2",
"session_entropy": 0.896
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 657,
"timestamp": "2026-01-05T14:09:00Z",
"transaction_amount_usd": 2450946.74
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.374,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1256893.71,
"financial_exposure_usd": 2449416.95,
"recoverable_pct": 0.583
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103997",
"label": "fraudulent",
"label_confidence": 0.933,
"severity": "high",
"timestamp": "2026-01-03T18:37:00Z",
"trace_id": "18804478-ab32-9b43-1309-055226271d79"
} | {
"account_age_days": 793,
"account_id": "ACCT-C82355E27483",
"baseline_risk_score": 0.326,
"kyc_tier": "tier_2",
"session_entropy": 0.623
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 419,
"timestamp": "2026-01-03T18:37:00Z",
"transaction_amount_usd": 1929715.6
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.941,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2397179.3,
"financial_exposure_usd": 3798482.71,
"recoverable_pct": 0.524
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101641",
"label": "fraudulent",
"label_confidence": 0.891,
"severity": "medium",
"timestamp": "2026-01-02T03:21:00Z",
"trace_id": "7351be70-eef5-c2dc-2af6-9309b46d3137"
} | {
"account_age_days": 1487,
"account_id": "ACCT-29A79D2FA4FC",
"baseline_risk_score": 0.634,
"kyc_tier": "tier_1",
"session_entropy": 0.457
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 84,
"timestamp": "2026-01-01T16:43:00Z",
"transaction_amount_usd": 12.17
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.934,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 543630.56,
"financial_exposure_usd": 781038.01,
"recoverable_pct": 0.594
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105311",
"label": "fraudulent",
"label_confidence": 0.856,
"severity": "high",
"timestamp": "2026-01-04T16:31:00Z",
"trace_id": "27a3605a-db48-a665-da0f-95debb82b4b6"
} | {
"account_age_days": 175,
"account_id": "ACCT-DF4E756C972C",
"baseline_risk_score": 0.113,
"kyc_tier": "tier_2",
"session_entropy": 0.364
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 665,
"timestamp": "2026-01-04T16:31:00Z",
"transaction_amount_usd": 885076.05
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.918,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4243887.58,
"financial_exposure_usd": 7739473.65,
"recoverable_pct": 0.546
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100659",
"label": "fraudulent",
"label_confidence": 0.849,
"severity": "critical",
"timestamp": "2026-01-01T10:59:00Z",
"trace_id": "262076c3-6af8-ef62-d507-017fe4162f2c"
} | {
"account_age_days": 386,
"account_id": "ACCT-40EE43BBFC8C",
"baseline_risk_score": 0.465,
"kyc_tier": "tier_3",
"session_entropy": 0.883
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 105,
"timestamp": "2026-01-01T00:04:00Z",
"transaction_amount_usd": 1.4
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.357,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 835630.59,
"financial_exposure_usd": 1126295.66,
"recoverable_pct": 0.374
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108444",
"label": "benign",
"label_confidence": 0.596,
"severity": "medium",
"timestamp": "2026-01-06T20:44:00Z",
"trace_id": "5d1bf064-e826-140a-35f3-bbbd2ad70ea5"
} | {
"account_age_days": 1574,
"account_id": "ACCT-9D21E119095A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.177
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 868,
"timestamp": "2026-01-06T20:44:00Z",
"transaction_amount_usd": 4252.39
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.785,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2879.36,
"financial_exposure_usd": 5312.58,
"recoverable_pct": 0.636
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100662",
"label": "fraudulent",
"label_confidence": 0.843,
"severity": "high",
"timestamp": "2026-01-01T11:02:00Z",
"trace_id": "afaeb523-26ff-28c3-c5ee-d8b02d96364e"
} | {
"account_age_days": 1784,
"account_id": "ACCT-AC1552B41982",
"baseline_risk_score": 0.386,
"kyc_tier": "tier_1",
"session_entropy": 0.921
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 285,
"timestamp": "2026-01-01T11:02:00Z",
"transaction_amount_usd": 76223.29
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.724,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 850928.49,
"financial_exposure_usd": 859868.95,
"recoverable_pct": 0.685
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106763",
"label": "benign",
"label_confidence": 0.507,
"severity": "low",
"timestamp": "2026-01-05T16:43:00Z",
"trace_id": "0461af8b-b41d-2436-ef13-71cbf254f0ce"
} | {
"account_age_days": 971,
"account_id": "ACCT-832ACEE1E3A4",
"baseline_risk_score": 0.165,
"kyc_tier": "tier_3",
"session_entropy": 0.29
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 264,
"timestamp": "2026-01-05T16:43:00Z",
"transaction_amount_usd": 1006.56
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.538,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 4059.09,
"financial_exposure_usd": 4098.49,
"recoverable_pct": 0.873
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102386",
"label": "fraudulent",
"label_confidence": 0.959,
"severity": "low",
"timestamp": "2026-01-02T15:46:00Z",
"trace_id": "af025fcb-7b34-9ce2-6ba5-094e4a1276b5"
} | {
"account_age_days": 1623,
"account_id": "ACCT-16C60F808FDA",
"baseline_risk_score": 0.614,
"kyc_tier": "tier_3",
"session_entropy": 0.93
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 224,
"timestamp": "2026-01-02T04:29:00Z",
"transaction_amount_usd": 13.47
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.489,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 223734.97,
"financial_exposure_usd": 283951.53,
"recoverable_pct": 0.539
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109935",
"label": "benign",
"label_confidence": 0.475,
"severity": "medium",
"timestamp": "2026-01-07T21:35:00Z",
"trace_id": "5479e51f-ce6f-8dad-355c-32bc33e9494b"
} | {
"account_age_days": 734,
"account_id": "ACCT-F17A457559F8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.913
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 378,
"timestamp": "2026-01-07T18:12:00Z",
"transaction_amount_usd": 24.72
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.508,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1035.99,
"financial_exposure_usd": 1261.96,
"recoverable_pct": 0.668
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104831",
"label": "fraudulent",
"label_confidence": 0.892,
"severity": "medium",
"timestamp": "2026-01-04T08:31:00Z",
"trace_id": "6c9cdcb0-0a18-d5f6-d3b5-4b04661a9ff1"
} | {
"account_age_days": 1837,
"account_id": "ACCT-8379DD60B54A",
"baseline_risk_score": 0.235,
"kyc_tier": "tier_1",
"session_entropy": 0.763
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 606,
"timestamp": "2026-01-04T08:31:00Z",
"transaction_amount_usd": 177556.55
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.892,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1391682.4,
"financial_exposure_usd": 3265498.17,
"recoverable_pct": 0.562
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107221",
"label": "benign",
"label_confidence": 0.574,
"severity": "high",
"timestamp": "2026-01-06T00:21:00Z",
"trace_id": "92511027-44ea-8746-24a5-6d192eba0a44"
} | {
"account_age_days": 288,
"account_id": "ACCT-A0706E01FADE",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.873
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 226,
"timestamp": "2026-01-05T17:04:00Z",
"transaction_amount_usd": 18.35
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.779,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 360.72,
"financial_exposure_usd": 630.14,
"recoverable_pct": 0.613
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.