schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103837",
"label": "fraudulent",
"label_confidence": 0.827,
"severity": "medium",
"timestamp": "2026-01-03T15:57:00Z",
"trace_id": "37d13843-12a1-e46b-7123-8f3a68826509"
} | {
"account_age_days": 7,
"account_id": "ACCT-186C6FE016C4",
"baseline_risk_score": 0.38,
"kyc_tier": "tier_3",
"session_entropy": 0.332
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 221,
"timestamp": "2026-01-03T11:47:00Z",
"transaction_amount_usd": 18.8
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.815,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4655348.58,
"financial_exposure_usd": 6513773.29,
"recoverable_pct": 0.555
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103342",
"label": "fraudulent",
"label_confidence": 0.628,
"severity": "medium",
"timestamp": "2026-01-03T07:42:00Z",
"trace_id": "f2887ddd-9a70-1948-bff6-34ed6637fcd1"
} | {
"account_age_days": 748,
"account_id": "ACCT-07BCCD22E2B3",
"baseline_risk_score": 0.108,
"kyc_tier": "tier_2",
"session_entropy": 0.466
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 84,
"timestamp": "2026-01-03T06:13:00Z",
"transaction_amount_usd": 18.2
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.844,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1355215.38,
"financial_exposure_usd": 2887606.47,
"recoverable_pct": 0.707
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100894",
"label": "fraudulent",
"label_confidence": 0.756,
"severity": "critical",
"timestamp": "2026-01-01T14:54:00Z",
"trace_id": "01d68d62-eb26-54f8-1336-06a0b03cbb07"
} | {
"account_age_days": 298,
"account_id": "ACCT-FBABB543270C",
"baseline_risk_score": 0.61,
"kyc_tier": "tier_2",
"session_entropy": 0.823
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 233,
"timestamp": "2026-01-01T06:18:00Z",
"transaction_amount_usd": 16.35
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.543,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 441982.45,
"financial_exposure_usd": 846693.96,
"recoverable_pct": 0.048
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109475",
"label": "benign",
"label_confidence": 0.569,
"severity": "low",
"timestamp": "2026-01-07T13:55:00Z",
"trace_id": "49a6de1b-a26e-009b-a389-c7712fa3117f"
} | {
"account_age_days": 793,
"account_id": "ACCT-0A29953AA67C",
"baseline_risk_score": 0.152,
"kyc_tier": "tier_1",
"session_entropy": 0.437
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 1029,
"timestamp": "2026-01-07T13:55:00Z",
"transaction_amount_usd": 10603.58
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.565,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2620.64,
"financial_exposure_usd": 2802.77,
"recoverable_pct": 0.96
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102057",
"label": "fraudulent",
"label_confidence": 0.782,
"severity": "high",
"timestamp": "2026-01-02T10:17:00Z",
"trace_id": "8e6a1b87-b18f-0e65-d13c-fb10477533ef"
} | {
"account_age_days": 325,
"account_id": "ACCT-3D5D0583775E",
"baseline_risk_score": 0.486,
"kyc_tier": "tier_3",
"session_entropy": 0.714
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "GB",
"latency_ms": 736,
"timestamp": "2026-01-02T10:17:00Z",
"transaction_amount_usd": 81976.59
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.397,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 535222.96,
"financial_exposure_usd": 607890.17,
"recoverable_pct": 0.52
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104783",
"label": "fraudulent",
"label_confidence": 0.725,
"severity": "high",
"timestamp": "2026-01-04T07:43:00Z",
"trace_id": "19a8c4bd-2a9d-ae10-17e4-30a2ae3e6620"
} | {
"account_age_days": 118,
"account_id": "ACCT-993E087B6F9F",
"baseline_risk_score": 0.261,
"kyc_tier": "tier_3",
"session_entropy": 0.815
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 297,
"timestamp": "2026-01-03T21:52:00Z",
"transaction_amount_usd": 3.05
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.787,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1448780.21,
"financial_exposure_usd": 2079979.92,
"recoverable_pct": 0.588
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108546",
"label": "benign",
"label_confidence": 0.576,
"severity": "medium",
"timestamp": "2026-01-06T22:26:00Z",
"trace_id": "19786049-2f9b-8284-9269-a86ea43c4a2f"
} | {
"account_age_days": 1980,
"account_id": "ACCT-1B7FE6F7585B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.742
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 286,
"timestamp": "2026-01-06T17:54:00Z",
"transaction_amount_usd": 4.19
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.589,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 4810.32,
"financial_exposure_usd": 5644.8,
"recoverable_pct": 0.625
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101315",
"label": "fraudulent",
"label_confidence": 0.896,
"severity": "critical",
"timestamp": "2026-01-01T21:55:00Z",
"trace_id": "182fee4e-1954-6197-a94a-5a65e8790a4d"
} | {
"account_age_days": 1145,
"account_id": "ACCT-B0C03B1D5D7F",
"baseline_risk_score": 0.549,
"kyc_tier": "tier_1",
"session_entropy": 0.315
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 979,
"timestamp": "2026-01-01T21:55:00Z",
"transaction_amount_usd": 27014.76
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.794,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 226889.74,
"financial_exposure_usd": 519151.74,
"recoverable_pct": 0.36
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102428",
"label": "fraudulent",
"label_confidence": 0.796,
"severity": "critical",
"timestamp": "2026-01-02T16:28:00Z",
"trace_id": "4df77f35-635d-67d4-cab4-7de6b7aec6a5"
} | {
"account_age_days": 757,
"account_id": "ACCT-3360B2CB939A",
"baseline_risk_score": 0.37,
"kyc_tier": "tier_1",
"session_entropy": 0.613
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "US",
"latency_ms": 92,
"timestamp": "2026-01-02T16:28:00Z",
"transaction_amount_usd": 38416.73
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.834,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 396643.41,
"financial_exposure_usd": 545907.68,
"recoverable_pct": 0.105
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106762",
"label": "benign",
"label_confidence": 0.735,
"severity": "low",
"timestamp": "2026-01-05T16:42:00Z",
"trace_id": "f43271f4-f8b6-d8d3-1960-02eed4b982e3"
} | {
"account_age_days": 91,
"account_id": "ACCT-6EA0E8DDFB5B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.589
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 1059,
"timestamp": "2026-01-05T16:42:00Z",
"transaction_amount_usd": 8655.66
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.745,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 4067.76,
"financial_exposure_usd": 5781.93,
"recoverable_pct": 0.919
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103236",
"label": "fraudulent",
"label_confidence": 0.804,
"severity": "high",
"timestamp": "2026-01-03T05:56:00Z",
"trace_id": "fe08d365-9b51-d4ad-1e56-9ae6197fc188"
} | {
"account_age_days": 1960,
"account_id": "ACCT-A50E782EB3DC",
"baseline_risk_score": 0.272,
"kyc_tier": "tier_1",
"session_entropy": 0.237
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 717,
"timestamp": "2026-01-03T05:56:00Z",
"transaction_amount_usd": 50142.49
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.779,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 522480.75,
"financial_exposure_usd": 732621.02,
"recoverable_pct": 0.284
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105468",
"label": "fraudulent",
"label_confidence": 0.64,
"severity": "medium",
"timestamp": "2026-01-04T19:08:00Z",
"trace_id": "c6b49351-58e9-39a7-b803-6075a0cd92ca"
} | {
"account_age_days": 1055,
"account_id": "ACCT-C2213E95761A",
"baseline_risk_score": 0.236,
"kyc_tier": "tier_1",
"session_entropy": 0.407
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 429,
"timestamp": "2026-01-04T19:08:00Z",
"transaction_amount_usd": 1692882.32
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.825,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2755133.11,
"financial_exposure_usd": 6482677.65,
"recoverable_pct": 0.74
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100890",
"label": "fraudulent",
"label_confidence": 0.972,
"severity": "critical",
"timestamp": "2026-01-01T14:50:00Z",
"trace_id": "d5a19fbc-d489-9b95-0bcb-3af7abb67078"
} | {
"account_age_days": 846,
"account_id": "ACCT-919772380D7F",
"baseline_risk_score": 0.452,
"kyc_tier": "tier_1",
"session_entropy": 0.466
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 223,
"timestamp": "2026-01-01T07:18:00Z",
"transaction_amount_usd": 14.21
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.575,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 552390.81,
"financial_exposure_usd": 779468.68,
"recoverable_pct": 0.836
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105218",
"label": "fraudulent",
"label_confidence": 0.85,
"severity": "medium",
"timestamp": "2026-01-04T14:58:00Z",
"trace_id": "336d60a7-cf7f-0bd4-5ceb-c4783bf4409f"
} | {
"account_age_days": 375,
"account_id": "ACCT-165C079A4AEC",
"baseline_risk_score": 0.214,
"kyc_tier": "tier_1",
"session_entropy": 0.48
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 597,
"timestamp": "2026-01-04T14:58:00Z",
"transaction_amount_usd": 1890590.34
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.934,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 7746623.1,
"financial_exposure_usd": 9837358.19,
"recoverable_pct": 0.851
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103868",
"label": "fraudulent",
"label_confidence": 0.668,
"severity": "medium",
"timestamp": "2026-01-03T16:28:00Z",
"trace_id": "c8302cae-4178-d201-b37d-7827bb693021"
} | {
"account_age_days": 1623,
"account_id": "ACCT-D7AD8DD90663",
"baseline_risk_score": 0.276,
"kyc_tier": "tier_1",
"session_entropy": 0.61
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 668,
"timestamp": "2026-01-03T16:28:00Z",
"transaction_amount_usd": 601487.39
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.829,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3656451.16,
"financial_exposure_usd": 5712098.56,
"recoverable_pct": 0.456
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106865",
"label": "benign",
"label_confidence": 0.476,
"severity": "critical",
"timestamp": "2026-01-05T18:25:00Z",
"trace_id": "34d60093-33de-195b-c240-8f2298617f9c"
} | {
"account_age_days": 254,
"account_id": "ACCT-4A6E43DD1DF7",
"baseline_risk_score": 0.137,
"kyc_tier": "tier_2",
"session_entropy": 0.458
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 961,
"timestamp": "2026-01-05T18:25:00Z",
"transaction_amount_usd": 2218.39
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.535,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1622.76,
"financial_exposure_usd": 3083.23,
"recoverable_pct": 0.738
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106513",
"label": "fraudulent",
"label_confidence": 0.892,
"severity": "high",
"timestamp": "2026-01-05T12:33:00Z",
"trace_id": "f49a6c71-6276-bbac-1038-55e56ea45a09"
} | {
"account_age_days": 1260,
"account_id": "ACCT-E335F6BC057B",
"baseline_risk_score": 0.177,
"kyc_tier": "tier_2",
"session_entropy": 0.545
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 356,
"timestamp": "2026-01-05T12:33:00Z",
"transaction_amount_usd": 79841.68
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.757,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3213269.45,
"financial_exposure_usd": 5334875.86,
"recoverable_pct": 0.585
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100699",
"label": "fraudulent",
"label_confidence": 0.792,
"severity": "high",
"timestamp": "2026-01-01T11:39:00Z",
"trace_id": "6f46e775-e332-4380-18f2-3b989be61235"
} | {
"account_age_days": 1508,
"account_id": "ACCT-F85C49CF844A",
"baseline_risk_score": 0.32,
"kyc_tier": "tier_3",
"session_entropy": 0.438
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 505,
"timestamp": "2026-01-01T11:39:00Z",
"transaction_amount_usd": 3695.96
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.938,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 479815.72,
"financial_exposure_usd": 604247.38,
"recoverable_pct": 0.839
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103192",
"label": "fraudulent",
"label_confidence": 0.794,
"severity": "high",
"timestamp": "2026-01-03T05:12:00Z",
"trace_id": "3b52a091-aa99-8ad9-29b9-2134a2a22234"
} | {
"account_age_days": 849,
"account_id": "ACCT-9F279F5CFD80",
"baseline_risk_score": 0.501,
"kyc_tier": "tier_2",
"session_entropy": 0.464
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 210,
"timestamp": "2026-01-02T23:15:00Z",
"transaction_amount_usd": 23.22
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.514,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 347072.48,
"financial_exposure_usd": 402705.3,
"recoverable_pct": 0.722
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104938",
"label": "fraudulent",
"label_confidence": 0.837,
"severity": "medium",
"timestamp": "2026-01-04T10:18:00Z",
"trace_id": "9f5ded81-f933-8b10-ecde-4ccec2884b81"
} | {
"account_age_days": 712,
"account_id": "ACCT-5C344532D27A",
"baseline_risk_score": 0.356,
"kyc_tier": "tier_1",
"session_entropy": 0.855
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 393,
"timestamp": "2026-01-03T23:48:00Z",
"transaction_amount_usd": 6.93
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.372,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3632999.36,
"financial_exposure_usd": 4075661.18,
"recoverable_pct": 0.833
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103369",
"label": "fraudulent",
"label_confidence": 0.823,
"severity": "medium",
"timestamp": "2026-01-03T08:09:00Z",
"trace_id": "652c90d9-e85a-e992-04ef-919a2fb842bb"
} | {
"account_age_days": 1533,
"account_id": "ACCT-F397145293E4",
"baseline_risk_score": 0.424,
"kyc_tier": "tier_1",
"session_entropy": 0.695
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 242,
"timestamp": "2026-01-02T19:32:00Z",
"transaction_amount_usd": 12.04
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.75,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2367922.57,
"financial_exposure_usd": 2863958.31,
"recoverable_pct": 0.54
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105573",
"label": "fraudulent",
"label_confidence": 0.749,
"severity": "high",
"timestamp": "2026-01-04T20:53:00Z",
"trace_id": "7f233b47-3c42-2dd2-0036-f08ae61c723d"
} | {
"account_age_days": 1415,
"account_id": "ACCT-D599B70D3B55",
"baseline_risk_score": 0.283,
"kyc_tier": "tier_3",
"session_entropy": 0.3
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 1112,
"timestamp": "2026-01-04T20:53:00Z",
"transaction_amount_usd": 1752657.31
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.825,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 740242.41,
"financial_exposure_usd": 1666697.21,
"recoverable_pct": 0.458
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109509",
"label": "benign",
"label_confidence": 0.471,
"severity": "low",
"timestamp": "2026-01-07T14:29:00Z",
"trace_id": "7028f5d2-a73c-53f5-d5c5-dde413476e0e"
} | {
"account_age_days": 363,
"account_id": "ACCT-605D5FB9CC0B",
"baseline_risk_score": 0.16,
"kyc_tier": "tier_3",
"session_entropy": 0.468
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 134,
"timestamp": "2026-01-07T14:29:00Z",
"transaction_amount_usd": 3292
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.685,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1661.13,
"financial_exposure_usd": 3189.76,
"recoverable_pct": 0.486
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101566",
"label": "fraudulent",
"label_confidence": 0.879,
"severity": "high",
"timestamp": "2026-01-02T02:06:00Z",
"trace_id": "8486994b-00c1-b778-8082-e5f3ebceacd6"
} | {
"account_age_days": 1131,
"account_id": "ACCT-9F8245B80AED",
"baseline_risk_score": 0.611,
"kyc_tier": "tier_3",
"session_entropy": 0.83
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "BR",
"latency_ms": 510,
"timestamp": "2026-01-02T02:06:00Z",
"transaction_amount_usd": 96263.95
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.372,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 451422.05,
"financial_exposure_usd": 756147.6,
"recoverable_pct": 0.462
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106030",
"label": "fraudulent",
"label_confidence": 0.621,
"severity": "critical",
"timestamp": "2026-01-05T04:30:00Z",
"trace_id": "72d4a33d-b709-a8b0-5ad5-a558bb97ddbb"
} | {
"account_age_days": 278,
"account_id": "ACCT-5E84703C169A",
"baseline_risk_score": 0.311,
"kyc_tier": "tier_1",
"session_entropy": 0.548
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 266,
"timestamp": "2026-01-05T02:20:00Z",
"transaction_amount_usd": 23.56
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.875,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 6153614.43,
"financial_exposure_usd": 8395902.58,
"recoverable_pct": 0.66
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104252",
"label": "fraudulent",
"label_confidence": 0.919,
"severity": "high",
"timestamp": "2026-01-03T22:52:00Z",
"trace_id": "bc817ce9-1210-a2b2-7b6c-869b662b69b0"
} | {
"account_age_days": 1430,
"account_id": "ACCT-7C1352C9BB3C",
"baseline_risk_score": 0.178,
"kyc_tier": "tier_2",
"session_entropy": 0.108
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 215,
"timestamp": "2026-01-03T13:10:00Z",
"transaction_amount_usd": 17.54
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.534,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2000849.94,
"financial_exposure_usd": 3601503.53,
"recoverable_pct": 0.422
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104813",
"label": "fraudulent",
"label_confidence": 0.676,
"severity": "high",
"timestamp": "2026-01-04T08:13:00Z",
"trace_id": "ccf97c10-3270-16a4-b002-752df7211992"
} | {
"account_age_days": 1992,
"account_id": "ACCT-69C9B99B2E19",
"baseline_risk_score": 0.249,
"kyc_tier": "tier_1",
"session_entropy": 0.755
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 242,
"timestamp": "2026-01-04T08:13:00Z",
"transaction_amount_usd": 434096.68
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.392,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3331302.55,
"financial_exposure_usd": 4156358.06,
"recoverable_pct": 0.802
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104448",
"label": "fraudulent",
"label_confidence": 0.768,
"severity": "medium",
"timestamp": "2026-01-04T02:08:00Z",
"trace_id": "7029a2a7-1a07-4402-1c0d-955bba3779f7"
} | {
"account_age_days": 860,
"account_id": "ACCT-EFCC6A08151A",
"baseline_risk_score": 0.132,
"kyc_tier": "tier_2",
"session_entropy": 0.379
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 1060,
"timestamp": "2026-01-04T02:08:00Z",
"transaction_amount_usd": 2523481.63
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.855,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 6272456.77,
"financial_exposure_usd": 7779538.08,
"recoverable_pct": 0.735
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102456",
"label": "fraudulent",
"label_confidence": 0.903,
"severity": "critical",
"timestamp": "2026-01-02T16:56:00Z",
"trace_id": "bd925b81-ac36-d170-01c8-3cecd1b7daa5"
} | {
"account_age_days": 951,
"account_id": "ACCT-0C789B6FA4D8",
"baseline_risk_score": 0.428,
"kyc_tier": "tier_2",
"session_entropy": 0.617
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 991,
"timestamp": "2026-01-02T16:56:00Z",
"transaction_amount_usd": 88304.3
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.837,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 423127.18,
"financial_exposure_usd": 680960.46,
"recoverable_pct": 0.025
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107639",
"label": "benign",
"label_confidence": 0.733,
"severity": "medium",
"timestamp": "2026-01-06T07:19:00Z",
"trace_id": "7d384561-d2ca-f5fa-2f57-31277eeb2e00"
} | {
"account_age_days": 675,
"account_id": "ACCT-3E14D3DD69A0",
"baseline_risk_score": 0.183,
"kyc_tier": "tier_2",
"session_entropy": 0.76
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 324,
"timestamp": "2026-01-05T21:34:00Z",
"transaction_amount_usd": 14.28
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.672,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1216.45,
"financial_exposure_usd": 1705.77,
"recoverable_pct": 0.863
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107426",
"label": "benign",
"label_confidence": 0.597,
"severity": "critical",
"timestamp": "2026-01-06T03:46:00Z",
"trace_id": "65e85118-4d18-6533-baab-82bb39f50659"
} | {
"account_age_days": 1579,
"account_id": "ACCT-6DC852F33870",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.471
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 300,
"timestamp": "2026-01-06T03:46:00Z",
"transaction_amount_usd": 14060.56
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.67,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 1477.12,
"financial_exposure_usd": 2939.85,
"recoverable_pct": 0.683
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102053",
"label": "fraudulent",
"label_confidence": 0.851,
"severity": "high",
"timestamp": "2026-01-02T10:13:00Z",
"trace_id": "cd2aa674-ee9c-5d3d-4166-02d5a866112d"
} | {
"account_age_days": 347,
"account_id": "ACCT-6B2CD21CB3E5",
"baseline_risk_score": 0.474,
"kyc_tier": "tier_2",
"session_entropy": 0.428
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "JP",
"latency_ms": 821,
"timestamp": "2026-01-02T10:13:00Z",
"transaction_amount_usd": 100919.78
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.658,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 830034.73,
"financial_exposure_usd": 1397496.39,
"recoverable_pct": 0.65
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109654",
"label": "benign",
"label_confidence": 0.745,
"severity": "critical",
"timestamp": "2026-01-07T16:54:00Z",
"trace_id": "be4b5040-86a3-4322-bfb0-fc2aa9f57832"
} | {
"account_age_days": 1306,
"account_id": "ACCT-4E37699E320F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.502
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 594,
"timestamp": "2026-01-07T16:54:00Z",
"transaction_amount_usd": 2219.69
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.627,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1599.1,
"financial_exposure_usd": 2334.36,
"recoverable_pct": 0.697
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104186",
"label": "fraudulent",
"label_confidence": 0.663,
"severity": "low",
"timestamp": "2026-01-03T21:46:00Z",
"trace_id": "5a3318ee-8abc-81fe-d1fa-4e0394adbf75"
} | {
"account_age_days": 1674,
"account_id": "ACCT-1E45D7933925",
"baseline_risk_score": 0.319,
"kyc_tier": "tier_1",
"session_entropy": 0.906
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 294,
"timestamp": "2026-01-03T21:46:00Z",
"transaction_amount_usd": 2009426.99
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.844,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3605676.07,
"financial_exposure_usd": 5102792.46,
"recoverable_pct": 0.455
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106167",
"label": "fraudulent",
"label_confidence": 0.792,
"severity": "low",
"timestamp": "2026-01-05T06:47:00Z",
"trace_id": "4baa447b-cb58-6b2b-9eb4-db2f78a72124"
} | {
"account_age_days": 796,
"account_id": "ACCT-6590FF46E783",
"baseline_risk_score": 0.113,
"kyc_tier": "tier_1",
"session_entropy": 0.829
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 709,
"timestamp": "2026-01-05T06:47:00Z",
"transaction_amount_usd": 294304.78
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.416,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3323139.14,
"financial_exposure_usd": 4654233.97,
"recoverable_pct": 0.776
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104406",
"label": "fraudulent",
"label_confidence": 0.88,
"severity": "critical",
"timestamp": "2026-01-04T01:26:00Z",
"trace_id": "1d398023-9f80-6617-0254-94570b6fc786"
} | {
"account_age_days": 699,
"account_id": "ACCT-74C4F3DE8757",
"baseline_risk_score": 0.329,
"kyc_tier": "tier_3",
"session_entropy": 0.734
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 1092,
"timestamp": "2026-01-04T01:26:00Z",
"transaction_amount_usd": 1614011.17
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.519,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3281634.99,
"financial_exposure_usd": 6693634.84,
"recoverable_pct": 0.788
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106630",
"label": "fraudulent",
"label_confidence": 0.934,
"severity": "critical",
"timestamp": "2026-01-05T14:30:00Z",
"trace_id": "dafce49d-6889-f8ee-4c09-2ae1d870989e"
} | {
"account_age_days": 10,
"account_id": "ACCT-BC1D58D26109",
"baseline_risk_score": 0.235,
"kyc_tier": "tier_3",
"session_entropy": 0.622
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 244,
"timestamp": "2026-01-05T12:39:00Z",
"transaction_amount_usd": 17
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.595,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2317390.72,
"financial_exposure_usd": 3153360.44,
"recoverable_pct": 0.483
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107510",
"label": "benign",
"label_confidence": 0.635,
"severity": "low",
"timestamp": "2026-01-06T05:10:00Z",
"trace_id": "ba8e01ed-7210-8b92-f123-bac4e28efb53"
} | {
"account_age_days": 420,
"account_id": "ACCT-6587B0E01FFF",
"baseline_risk_score": 0.177,
"kyc_tier": "tier_2",
"session_entropy": 0.818
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 233,
"timestamp": "2026-01-06T05:10:00Z",
"transaction_amount_usd": 507.37
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.467,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2116.95,
"financial_exposure_usd": 2743.92,
"recoverable_pct": 0.528
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104777",
"label": "fraudulent",
"label_confidence": 0.747,
"severity": "medium",
"timestamp": "2026-01-04T07:37:00Z",
"trace_id": "deed50ce-a3db-a465-a329-3c53979c5534"
} | {
"account_age_days": 1982,
"account_id": "ACCT-FC04E33D428E",
"baseline_risk_score": 0.109,
"kyc_tier": "tier_2",
"session_entropy": 0.222
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 953,
"timestamp": "2026-01-04T07:37:00Z",
"transaction_amount_usd": 271928.79
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.816,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1295229.48,
"financial_exposure_usd": 2852052.48,
"recoverable_pct": 0.856
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101978",
"label": "fraudulent",
"label_confidence": 0.9,
"severity": "medium",
"timestamp": "2026-01-02T08:58:00Z",
"trace_id": "385a2da0-d6c9-5c26-54d8-98c370162e14"
} | {
"account_age_days": 582,
"account_id": "ACCT-C8D5F389EBFC",
"baseline_risk_score": 0.604,
"kyc_tier": "tier_2",
"session_entropy": 0.308
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "HK",
"latency_ms": 987,
"timestamp": "2026-01-02T08:58:00Z",
"transaction_amount_usd": 56971.75
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.827,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 242985.54,
"financial_exposure_usd": 526752.4,
"recoverable_pct": 0.184
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107113",
"label": "benign",
"label_confidence": 0.653,
"severity": "low",
"timestamp": "2026-01-05T22:33:00Z",
"trace_id": "a8fdffd9-41f0-16df-d3bc-18f4515a1503"
} | {
"account_age_days": 602,
"account_id": "ACCT-1D143A94C255",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.616
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 91,
"timestamp": "2026-01-05T13:12:00Z",
"transaction_amount_usd": 4.78
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.663,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 4629.43,
"financial_exposure_usd": 5945.56,
"recoverable_pct": 0.61
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103051",
"label": "fraudulent",
"label_confidence": 0.803,
"severity": "critical",
"timestamp": "2026-01-03T02:51:00Z",
"trace_id": "253ad5fb-9908-7672-cba4-52ad0ba82a22"
} | {
"account_age_days": 512,
"account_id": "ACCT-1A403F8DC231",
"baseline_risk_score": 0.469,
"kyc_tier": "tier_1",
"session_entropy": 0.527
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "DE",
"latency_ms": 438,
"timestamp": "2026-01-03T02:51:00Z",
"transaction_amount_usd": 118787.9
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.713,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 251391.6,
"financial_exposure_usd": 367718.25,
"recoverable_pct": 0.671
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102120",
"label": "fraudulent",
"label_confidence": 0.849,
"severity": "high",
"timestamp": "2026-01-02T11:20:00Z",
"trace_id": "b6439cc0-4f6e-7a5b-d298-d68c57c1c060"
} | {
"account_age_days": 880,
"account_id": "ACCT-76B59A528943",
"baseline_risk_score": 0.549,
"kyc_tier": "tier_2",
"session_entropy": 0.542
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 706,
"timestamp": "2026-01-02T11:20:00Z",
"transaction_amount_usd": 34100.98
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.715,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 443642.09,
"financial_exposure_usd": 507460.72,
"recoverable_pct": 0.707
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102572",
"label": "fraudulent",
"label_confidence": 0.897,
"severity": "low",
"timestamp": "2026-01-02T18:52:00Z",
"trace_id": "aab2a2cb-c93d-a21d-05a7-957c1f3c0632"
} | {
"account_age_days": 603,
"account_id": "ACCT-2EF46BEC33D0",
"baseline_risk_score": 0.595,
"kyc_tier": "tier_1",
"session_entropy": 0.833
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 457,
"timestamp": "2026-01-02T18:52:00Z",
"transaction_amount_usd": 8878.76
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.369,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 713054.99,
"financial_exposure_usd": 822432.88,
"recoverable_pct": 0.773
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100835",
"label": "fraudulent",
"label_confidence": 0.907,
"severity": "medium",
"timestamp": "2026-01-01T13:55:00Z",
"trace_id": "a47d7534-c553-3759-c987-57b1d5ac585e"
} | {
"account_age_days": 1731,
"account_id": "ACCT-BACAB7F76291",
"baseline_risk_score": 0.411,
"kyc_tier": "tier_3",
"session_entropy": 0.819
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 377,
"timestamp": "2026-01-01T03:43:00Z",
"transaction_amount_usd": 21.61
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.787,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 664828.26,
"financial_exposure_usd": 721403.98,
"recoverable_pct": 0.573
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109074",
"label": "benign",
"label_confidence": 0.651,
"severity": "low",
"timestamp": "2026-01-07T07:14:00Z",
"trace_id": "a6e9a191-3d6a-9bdd-f429-cefc4bf948c3"
} | {
"account_age_days": 879,
"account_id": "ACCT-227E8249C783",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.287
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 636,
"timestamp": "2026-01-07T07:14:00Z",
"transaction_amount_usd": 1777.36
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.609,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 616.63,
"financial_exposure_usd": 857.99,
"recoverable_pct": 0.985
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103167",
"label": "fraudulent",
"label_confidence": 0.811,
"severity": "high",
"timestamp": "2026-01-03T04:47:00Z",
"trace_id": "4961c582-7439-d8ba-0cc1-7507e872eac5"
} | {
"account_age_days": 792,
"account_id": "ACCT-C2193002E03F",
"baseline_risk_score": 0.354,
"kyc_tier": "tier_3",
"session_entropy": 0.141
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 91,
"timestamp": "2026-01-03T01:09:00Z",
"transaction_amount_usd": 20.03
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.817,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 92177.31,
"financial_exposure_usd": 195717.95,
"recoverable_pct": 0.024
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100519",
"label": "fraudulent",
"label_confidence": 0.88,
"severity": "critical",
"timestamp": "2026-01-01T08:39:00Z",
"trace_id": "a9611c5d-94ba-3bf2-1c54-2d78733e2137"
} | {
"account_age_days": 1864,
"account_id": "ACCT-C5DD5187A7F2",
"baseline_risk_score": 0.29,
"kyc_tier": "tier_2",
"session_entropy": 0.725
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 212,
"timestamp": "2026-01-01T08:39:00Z",
"transaction_amount_usd": 91330.39
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.61,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 272047.82,
"financial_exposure_usd": 406187.7,
"recoverable_pct": 0.54
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106402",
"label": "fraudulent",
"label_confidence": 0.662,
"severity": "high",
"timestamp": "2026-01-05T10:42:00Z",
"trace_id": "97803f9b-8aa8-6a24-a941-0e5d7e35487c"
} | {
"account_age_days": 1510,
"account_id": "ACCT-D1CD7775B0D4",
"baseline_risk_score": 0.41,
"kyc_tier": "tier_3",
"session_entropy": 0.172
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 225,
"timestamp": "2026-01-05T10:42:00Z",
"transaction_amount_usd": 1999270.88
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.494,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4944548.22,
"financial_exposure_usd": 8124512.48,
"recoverable_pct": 0.467
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104002",
"label": "fraudulent",
"label_confidence": 0.606,
"severity": "medium",
"timestamp": "2026-01-03T18:42:00Z",
"trace_id": "60d5cce1-8587-ce33-d99c-89f58d4e64d6"
} | {
"account_age_days": 1997,
"account_id": "ACCT-E774C8F39B04",
"baseline_risk_score": 0.203,
"kyc_tier": "tier_3",
"session_entropy": 0.504
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 683,
"timestamp": "2026-01-03T18:42:00Z",
"transaction_amount_usd": 127061.2
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.514,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2803690.85,
"financial_exposure_usd": 4803058.08,
"recoverable_pct": 0.916
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106990",
"label": "benign",
"label_confidence": 0.516,
"severity": "high",
"timestamp": "2026-01-05T20:30:00Z",
"trace_id": "2bdf27a3-e0ee-6ee7-189c-d61fa608a85e"
} | {
"account_age_days": 1736,
"account_id": "ACCT-3120A465897E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.759
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 136,
"timestamp": "2026-01-05T17:37:00Z",
"transaction_amount_usd": 2.01
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.745,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2111.69,
"financial_exposure_usd": 2676.99,
"recoverable_pct": 0.934
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103128",
"label": "fraudulent",
"label_confidence": 0.874,
"severity": "high",
"timestamp": "2026-01-03T04:08:00Z",
"trace_id": "c8c8c99f-e15b-bbed-cb60-639b21781764"
} | {
"account_age_days": 974,
"account_id": "ACCT-0B3B0CC52BDB",
"baseline_risk_score": 0.564,
"kyc_tier": "tier_3",
"session_entropy": 0.496
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "JP",
"latency_ms": 1133,
"timestamp": "2026-01-03T04:08:00Z",
"transaction_amount_usd": 33545.31
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.503,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 397857.19,
"financial_exposure_usd": 898967.72,
"recoverable_pct": 0.046
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108620",
"label": "benign",
"label_confidence": 0.652,
"severity": "low",
"timestamp": "2026-01-06T23:40:00Z",
"trace_id": "de46cbcc-9d44-9f57-8dea-f377c2bf6620"
} | {
"account_age_days": 481,
"account_id": "ACCT-E16680BE264C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.733
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 490,
"timestamp": "2026-01-06T23:40:00Z",
"transaction_amount_usd": 14088.66
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.573,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1273.08,
"financial_exposure_usd": 2188.4,
"recoverable_pct": 0.731
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104624",
"label": "fraudulent",
"label_confidence": 0.75,
"severity": "high",
"timestamp": "2026-01-04T05:04:00Z",
"trace_id": "e94ffeda-a0f4-09b6-613a-b58e1f4f3d96"
} | {
"account_age_days": 1580,
"account_id": "ACCT-8F54EE90A9B1",
"baseline_risk_score": 0.292,
"kyc_tier": "tier_1",
"session_entropy": 0.685
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 285,
"timestamp": "2026-01-04T05:04:00Z",
"transaction_amount_usd": 1049069.4
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.504,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2561419.96,
"financial_exposure_usd": 5291863.43,
"recoverable_pct": 0.806
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102125",
"label": "fraudulent",
"label_confidence": 0.835,
"severity": "low",
"timestamp": "2026-01-02T11:25:00Z",
"trace_id": "ee4d6812-ec3c-befc-1bde-c17789e38573"
} | {
"account_age_days": 1130,
"account_id": "ACCT-C52EA6AB2BF1",
"baseline_risk_score": 0.337,
"kyc_tier": "tier_3",
"session_entropy": 0.153
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 162,
"timestamp": "2026-01-02T04:34:00Z",
"transaction_amount_usd": 12.87
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.799,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 196697.07,
"financial_exposure_usd": 361240.45,
"recoverable_pct": 0.671
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108204",
"label": "benign",
"label_confidence": 0.529,
"severity": "low",
"timestamp": "2026-01-06T16:44:00Z",
"trace_id": "71c7c6ff-e095-8a34-d19d-c6bf9b06a7f2"
} | {
"account_age_days": 919,
"account_id": "ACCT-4EB83A0AAC6C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.49
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 121,
"timestamp": "2026-01-06T16:44:00Z",
"transaction_amount_usd": 4699.73
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.651,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 769.18,
"financial_exposure_usd": 977.38,
"recoverable_pct": 0.746
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100918",
"label": "fraudulent",
"label_confidence": 0.98,
"severity": "high",
"timestamp": "2026-01-01T15:18:00Z",
"trace_id": "daa4340d-b16a-0f1a-4fc7-11d295343ce2"
} | {
"account_age_days": 493,
"account_id": "ACCT-BEB182C6E28B",
"baseline_risk_score": 0.483,
"kyc_tier": "tier_1",
"session_entropy": 0.228
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 264,
"timestamp": "2026-01-01T15:18:00Z",
"transaction_amount_usd": 66395.59
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.425,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 702090.61,
"financial_exposure_usd": 1096990.18,
"recoverable_pct": 0.653
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100360",
"label": "fraudulent",
"label_confidence": 0.804,
"severity": "low",
"timestamp": "2026-01-01T06:00:00Z",
"trace_id": "198a6a0c-8bfc-946c-cea9-e905e0e4fb32"
} | {
"account_age_days": 1843,
"account_id": "ACCT-D701597C2BBA",
"baseline_risk_score": 0.445,
"kyc_tier": "tier_1",
"session_entropy": 0.785
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 281,
"timestamp": "2026-01-01T06:00:00Z",
"transaction_amount_usd": 77821.36
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.544,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 635575.06,
"financial_exposure_usd": 815597.52,
"recoverable_pct": 0.579
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100291",
"label": "fraudulent",
"label_confidence": 0.879,
"severity": "low",
"timestamp": "2026-01-01T04:51:00Z",
"trace_id": "85f1bc46-f473-bdb4-90ff-3e09094d4b8a"
} | {
"account_age_days": 894,
"account_id": "ACCT-8B75190C4F26",
"baseline_risk_score": 0.418,
"kyc_tier": "tier_2",
"session_entropy": 0.666
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 388,
"timestamp": "2025-12-31T20:03:00Z",
"transaction_amount_usd": 12.1
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.529,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 715433.83,
"financial_exposure_usd": 946526.95,
"recoverable_pct": 0.785
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101265",
"label": "fraudulent",
"label_confidence": 0.925,
"severity": "medium",
"timestamp": "2026-01-01T21:05:00Z",
"trace_id": "94ee00f2-d70c-f870-453e-9679fee916bf"
} | {
"account_age_days": 634,
"account_id": "ACCT-4C0F8059EAC9",
"baseline_risk_score": 0.281,
"kyc_tier": "tier_1",
"session_entropy": 0.821
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 892,
"timestamp": "2026-01-01T21:05:00Z",
"transaction_amount_usd": 58508.19
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.72,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 130003.97,
"financial_exposure_usd": 190977.6,
"recoverable_pct": 0.746
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107479",
"label": "benign",
"label_confidence": 0.463,
"severity": "low",
"timestamp": "2026-01-06T04:39:00Z",
"trace_id": "ec00a8ed-6aea-ca05-c294-86e90f2b056d"
} | {
"account_age_days": 1354,
"account_id": "ACCT-45E9CE3CF29E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.948
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 108,
"timestamp": "2026-01-06T04:39:00Z",
"transaction_amount_usd": 12286.7
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.517,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1004.06,
"financial_exposure_usd": 1292.34,
"recoverable_pct": 0.539
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108736",
"label": "benign",
"label_confidence": 0.489,
"severity": "low",
"timestamp": "2026-01-07T01:36:00Z",
"trace_id": "82d9a1d0-a54b-c6db-2c61-4f3e5a1c2e4d"
} | {
"account_age_days": 1640,
"account_id": "ACCT-DB4BDE23AC63",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.352
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 786,
"timestamp": "2026-01-07T01:36:00Z",
"transaction_amount_usd": 8529.23
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.7,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pri... | {
"customer_funds_at_risk_usd": 1097.96,
"financial_exposure_usd": 2211.67,
"recoverable_pct": 0.956
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104977",
"label": "fraudulent",
"label_confidence": 0.72,
"severity": "low",
"timestamp": "2026-01-04T10:57:00Z",
"trace_id": "35d8387a-c320-6884-c47c-00950a9e2da9"
} | {
"account_age_days": 1604,
"account_id": "ACCT-40C519F5F4C9",
"baseline_risk_score": 0.33,
"kyc_tier": "tier_2",
"session_entropy": 0.261
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 810,
"timestamp": "2026-01-04T10:57:00Z",
"transaction_amount_usd": 2431006.34
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.673,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2232884.24,
"financial_exposure_usd": 2813755.29,
"recoverable_pct": 0.813
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107135",
"label": "benign",
"label_confidence": 0.57,
"severity": "medium",
"timestamp": "2026-01-05T22:55:00Z",
"trace_id": "14d6b73e-8285-a936-9872-d85d5f7e9c1e"
} | {
"account_age_days": 1016,
"account_id": "ACCT-5F89F41BB44C",
"baseline_risk_score": 0.15,
"kyc_tier": "tier_1",
"session_entropy": 0.27
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 287,
"timestamp": "2026-01-05T22:55:00Z",
"transaction_amount_usd": 4034.37
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.721,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 319.54,
"financial_exposure_usd": 548.89,
"recoverable_pct": 0.961
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102958",
"label": "fraudulent",
"label_confidence": 0.941,
"severity": "critical",
"timestamp": "2026-01-03T01:18:00Z",
"trace_id": "4ebce866-196b-f090-4236-132990428ab5"
} | {
"account_age_days": 166,
"account_id": "ACCT-851626D5EADE",
"baseline_risk_score": 0.64,
"kyc_tier": "tier_1",
"session_entropy": 0.678
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 1144,
"timestamp": "2026-01-03T01:18:00Z",
"transaction_amount_usd": 80635.8
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.354,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 626367.25,
"financial_exposure_usd": 1125231.62,
"recoverable_pct": 0.558
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105431",
"label": "fraudulent",
"label_confidence": 0.607,
"severity": "critical",
"timestamp": "2026-01-04T18:31:00Z",
"trace_id": "da7b7dfc-008d-9148-341a-2536987df92f"
} | {
"account_age_days": 724,
"account_id": "ACCT-61D8E7BB85FA",
"baseline_risk_score": 0.11,
"kyc_tier": "tier_3",
"session_entropy": 0.709
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 269,
"timestamp": "2026-01-04T07:20:00Z",
"transaction_amount_usd": 21.82
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.668,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 5755687.38,
"financial_exposure_usd": 6422739.97,
"recoverable_pct": 0.445
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102194",
"label": "fraudulent",
"label_confidence": 0.869,
"severity": "critical",
"timestamp": "2026-01-02T12:34:00Z",
"trace_id": "a1080788-60bd-6ce2-56ac-f09507d54e13"
} | {
"account_age_days": 902,
"account_id": "ACCT-2F915782AA61",
"baseline_risk_score": 0.424,
"kyc_tier": "tier_2",
"session_entropy": 0.461
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 231,
"timestamp": "2026-01-02T11:32:00Z",
"transaction_amount_usd": 12.91
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.687,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 302631.63,
"financial_exposure_usd": 704398.13,
"recoverable_pct": 0.643
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105019",
"label": "fraudulent",
"label_confidence": 0.63,
"severity": "high",
"timestamp": "2026-01-04T11:39:00Z",
"trace_id": "35763798-a3d4-539b-0b9d-1107dd14189b"
} | {
"account_age_days": 1672,
"account_id": "ACCT-66F12448028E",
"baseline_risk_score": 0.166,
"kyc_tier": "tier_1",
"session_entropy": 0.101
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 271,
"timestamp": "2026-01-04T06:14:00Z",
"transaction_amount_usd": 21
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.471,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 6948446.4,
"financial_exposure_usd": 7933812.12,
"recoverable_pct": 0.637
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103954",
"label": "fraudulent",
"label_confidence": 0.712,
"severity": "medium",
"timestamp": "2026-01-03T17:54:00Z",
"trace_id": "5ecb64b8-d6df-93c7-8a0a-e418cf5ae08e"
} | {
"account_age_days": 1231,
"account_id": "ACCT-BB97087AAADE",
"baseline_risk_score": 0.225,
"kyc_tier": "tier_2",
"session_entropy": 0.594
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 1105,
"timestamp": "2026-01-03T17:54:00Z",
"transaction_amount_usd": 1535514.03
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.406,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3507181.14,
"financial_exposure_usd": 4008300.6,
"recoverable_pct": 0.646
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102894",
"label": "fraudulent",
"label_confidence": 0.946,
"severity": "critical",
"timestamp": "2026-01-03T00:14:00Z",
"trace_id": "aabe29d7-a425-7726-348b-ff6d1c8189bb"
} | {
"account_age_days": 530,
"account_id": "ACCT-BC51AADB609F",
"baseline_risk_score": 0.435,
"kyc_tier": "tier_3",
"session_entropy": 0.293
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "LU",
"latency_ms": 944,
"timestamp": "2026-01-03T00:14:00Z",
"transaction_amount_usd": 29938.38
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.858,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 563303.4,
"financial_exposure_usd": 565869.82,
"recoverable_pct": 0.657
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102093",
"label": "fraudulent",
"label_confidence": 0.867,
"severity": "high",
"timestamp": "2026-01-02T10:53:00Z",
"trace_id": "1ba96b1f-6fdb-005b-1cfc-d5f1f20a261d"
} | {
"account_age_days": 829,
"account_id": "ACCT-444BFE3A7E22",
"baseline_risk_score": 0.279,
"kyc_tier": "tier_2",
"session_entropy": 0.508
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 362,
"timestamp": "2026-01-02T07:26:00Z",
"transaction_amount_usd": 12.14
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.738,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 1184481.1,
"financial_exposure_usd": 1192329.75,
"recoverable_pct": 0.37
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109405",
"label": "benign",
"label_confidence": 0.661,
"severity": "medium",
"timestamp": "2026-01-07T12:45:00Z",
"trace_id": "ce36f1d9-ec74-a659-9811-33866faae1b1"
} | {
"account_age_days": 21,
"account_id": "ACCT-A49F2451B843",
"baseline_risk_score": 0.155,
"kyc_tier": "tier_2",
"session_entropy": 0.228
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 123,
"timestamp": "2026-01-07T10:08:00Z",
"transaction_amount_usd": 2.32
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.466,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2647.21,
"financial_exposure_usd": 3231.42,
"recoverable_pct": 0.846
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109266",
"label": "benign",
"label_confidence": 0.453,
"severity": "low",
"timestamp": "2026-01-07T10:26:00Z",
"trace_id": "21001acd-8e01-8de1-ba69-48bedb0a75d8"
} | {
"account_age_days": 1252,
"account_id": "ACCT-904983F6E4F9",
"baseline_risk_score": 0.135,
"kyc_tier": "tier_1",
"session_entropy": 0.287
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 719,
"timestamp": "2026-01-07T10:26:00Z",
"transaction_amount_usd": 5341.55
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.48,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 4578.53,
"financial_exposure_usd": 5612.21,
"recoverable_pct": 0.554
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107133",
"label": "benign",
"label_confidence": 0.457,
"severity": "medium",
"timestamp": "2026-01-05T22:53:00Z",
"trace_id": "91cba838-e936-b95f-4e1a-13903fffb561"
} | {
"account_age_days": 1412,
"account_id": "ACCT-C38FB824F80A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.346
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 503,
"timestamp": "2026-01-05T22:53:00Z",
"transaction_amount_usd": 5453.19
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.651,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 5671.11,
"financial_exposure_usd": 7134.56,
"recoverable_pct": 0.917
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104278",
"label": "fraudulent",
"label_confidence": 0.765,
"severity": "medium",
"timestamp": "2026-01-03T23:18:00Z",
"trace_id": "2e3b5fad-5219-37a6-3cca-81adca20c56d"
} | {
"account_age_days": 344,
"account_id": "ACCT-6402B97EA4A3",
"baseline_risk_score": 0.345,
"kyc_tier": "tier_1",
"session_entropy": 0.579
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 831,
"timestamp": "2026-01-03T23:18:00Z",
"transaction_amount_usd": 1470381.6
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.569,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3092898.04,
"financial_exposure_usd": 7218020.71,
"recoverable_pct": 0.864
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107162",
"label": "benign",
"label_confidence": 0.731,
"severity": "medium",
"timestamp": "2026-01-05T23:22:00Z",
"trace_id": "4c3440b9-fbee-94cc-2467-adbe865c7766"
} | {
"account_age_days": 1221,
"account_id": "ACCT-25F69CE41B10",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.921
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 149,
"timestamp": "2026-01-05T15:01:00Z",
"transaction_amount_usd": 15.88
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.539,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2384.01,
"financial_exposure_usd": 4112.5,
"recoverable_pct": 0.51
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107315",
"label": "benign",
"label_confidence": 0.537,
"severity": "low",
"timestamp": "2026-01-06T01:55:00Z",
"trace_id": "c46a5481-a8ff-df7a-2dd8-775dac445cc6"
} | {
"account_age_days": 472,
"account_id": "ACCT-73AA49FC8130",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.61
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 464,
"timestamp": "2026-01-06T01:55:00Z",
"transaction_amount_usd": 10793.8
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.499,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 651.63,
"financial_exposure_usd": 701,
"recoverable_pct": 0.752
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103174",
"label": "fraudulent",
"label_confidence": 0.928,
"severity": "critical",
"timestamp": "2026-01-03T04:54:00Z",
"trace_id": "c9748c6a-5ca8-f6fe-eba6-7df61f4a7089"
} | {
"account_age_days": 1994,
"account_id": "ACCT-E1D550407BFC",
"baseline_risk_score": 0.413,
"kyc_tier": "tier_3",
"session_entropy": 0.405
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 132,
"timestamp": "2026-01-03T01:47:00Z",
"transaction_amount_usd": 20.25
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.671,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 621533.46,
"financial_exposure_usd": 1467572.36,
"recoverable_pct": 0.46
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101267",
"label": "fraudulent",
"label_confidence": 0.895,
"severity": "medium",
"timestamp": "2026-01-01T21:07:00Z",
"trace_id": "71590083-e527-3220-5997-daad673dee16"
} | {
"account_age_days": 1114,
"account_id": "ACCT-D0BD54B3B7A5",
"baseline_risk_score": 0.316,
"kyc_tier": "tier_3",
"session_entropy": 0.81
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 363,
"timestamp": "2026-01-01T21:07:00Z",
"transaction_amount_usd": 27933.72
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.836,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 781114.73,
"financial_exposure_usd": 986954.58,
"recoverable_pct": 0.209
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105128",
"label": "fraudulent",
"label_confidence": 0.795,
"severity": "medium",
"timestamp": "2026-01-04T13:28:00Z",
"trace_id": "5dfe92c1-e081-f756-6006-aa2c1cc33391"
} | {
"account_age_days": 131,
"account_id": "ACCT-E055E596F2E4",
"baseline_risk_score": 0.185,
"kyc_tier": "tier_3",
"session_entropy": 0.518
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 777,
"timestamp": "2026-01-04T13:28:00Z",
"transaction_amount_usd": 2951074.45
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.705,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2264752.63,
"financial_exposure_usd": 4309355.02,
"recoverable_pct": 0.915
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104956",
"label": "fraudulent",
"label_confidence": 0.936,
"severity": "high",
"timestamp": "2026-01-04T10:36:00Z",
"trace_id": "90fab36c-3084-7742-ffe6-7db9492e55ff"
} | {
"account_age_days": 1312,
"account_id": "ACCT-60B56827C725",
"baseline_risk_score": 0.327,
"kyc_tier": "tier_1",
"session_entropy": 0.702
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 1115,
"timestamp": "2026-01-04T10:36:00Z",
"transaction_amount_usd": 880512.51
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.816,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3204980.72,
"financial_exposure_usd": 7865088.89,
"recoverable_pct": 0.462
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106842",
"label": "benign",
"label_confidence": 0.729,
"severity": "low",
"timestamp": "2026-01-05T18:02:00Z",
"trace_id": "47ff7954-da29-8b1c-75c9-f4b33b0db385"
} | {
"account_age_days": 972,
"account_id": "ACCT-0E7793BE590B",
"baseline_risk_score": 0.196,
"kyc_tier": "tier_3",
"session_entropy": 0.946
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 310,
"timestamp": "2026-01-05T11:50:00Z",
"transaction_amount_usd": 17.95
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.669,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1090.92,
"financial_exposure_usd": 2277.13,
"recoverable_pct": 0.934
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109253",
"label": "benign",
"label_confidence": 0.542,
"severity": "high",
"timestamp": "2026-01-07T10:13:00Z",
"trace_id": "d43b985f-7c68-701a-e169-2ef9636bd27f"
} | {
"account_age_days": 1297,
"account_id": "ACCT-1BE2EB8DD34D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.186
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 311,
"timestamp": "2026-01-07T05:09:00Z",
"transaction_amount_usd": 20.96
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.751,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 704.29,
"financial_exposure_usd": 990.49,
"recoverable_pct": 0.569
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101643",
"label": "fraudulent",
"label_confidence": 0.946,
"severity": "critical",
"timestamp": "2026-01-02T03:23:00Z",
"trace_id": "f9f69945-5ff5-32eb-244a-773e62299ae7"
} | {
"account_age_days": 137,
"account_id": "ACCT-28E3DD5883EF",
"baseline_risk_score": 0.363,
"kyc_tier": "tier_1",
"session_entropy": 0.319
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "DE",
"latency_ms": 290,
"timestamp": "2026-01-02T03:23:00Z",
"transaction_amount_usd": 79966.52
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.646,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 518005.54,
"financial_exposure_usd": 1079069.81,
"recoverable_pct": 0.813
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102168",
"label": "fraudulent",
"label_confidence": 0.755,
"severity": "high",
"timestamp": "2026-01-02T12:08:00Z",
"trace_id": "2e6c2c34-2a51-bcf8-535b-23c15684d84f"
} | {
"account_age_days": 823,
"account_id": "ACCT-300ADEA02E47",
"baseline_risk_score": 0.554,
"kyc_tier": "tier_1",
"session_entropy": 0.379
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "DE",
"latency_ms": 819,
"timestamp": "2026-01-02T12:08:00Z",
"transaction_amount_usd": 14027.29
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.745,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 389558.54,
"financial_exposure_usd": 960468.66,
"recoverable_pct": 0.361
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103035",
"label": "fraudulent",
"label_confidence": 0.906,
"severity": "critical",
"timestamp": "2026-01-03T02:35:00Z",
"trace_id": "7e2d8f18-5bf0-93c5-f189-fd48e3ec300d"
} | {
"account_age_days": 707,
"account_id": "ACCT-7B352AAD3D3C",
"baseline_risk_score": 0.395,
"kyc_tier": "tier_3",
"session_entropy": 0.223
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 256,
"timestamp": "2026-01-02T17:55:00Z",
"transaction_amount_usd": 8.13
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.701,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 1004843.04,
"financial_exposure_usd": 1096979.78,
"recoverable_pct": 0.05
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101319",
"label": "fraudulent",
"label_confidence": 0.918,
"severity": "critical",
"timestamp": "2026-01-01T21:59:00Z",
"trace_id": "5551b0f7-f2b9-ba4e-712e-6b7d0c56da22"
} | {
"account_age_days": 730,
"account_id": "ACCT-79DCDE0F41BE",
"baseline_risk_score": 0.498,
"kyc_tier": "tier_2",
"session_entropy": 0.733
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 635,
"timestamp": "2026-01-01T21:59:00Z",
"transaction_amount_usd": 1440.5
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.753,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 895314.92,
"financial_exposure_usd": 982849.86,
"recoverable_pct": 0.221
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108984",
"label": "benign",
"label_confidence": 0.48,
"severity": "low",
"timestamp": "2026-01-07T05:44:00Z",
"trace_id": "ccd31c2b-0d5f-0fb9-f2df-1270ed825a3f"
} | {
"account_age_days": 153,
"account_id": "ACCT-9624AD6512E4",
"baseline_risk_score": 0.198,
"kyc_tier": "tier_3",
"session_entropy": 0.127
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 171,
"timestamp": "2026-01-07T00:29:00Z",
"transaction_amount_usd": 18.92
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.783,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 796.99,
"financial_exposure_usd": 1699.36,
"recoverable_pct": 0.974
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106722",
"label": "benign",
"label_confidence": 0.704,
"severity": "medium",
"timestamp": "2026-01-05T16:02:00Z",
"trace_id": "acf26c1f-f255-7e9d-31cd-8989fb020cb6"
} | {
"account_age_days": 781,
"account_id": "ACCT-F2AEF2ADE2D3",
"baseline_risk_score": 0.2,
"kyc_tier": "tier_1",
"session_entropy": 0.426
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 791,
"timestamp": "2026-01-05T16:02:00Z",
"transaction_amount_usd": 4720.4
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.65,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 4862.78,
"financial_exposure_usd": 7921.28,
"recoverable_pct": 0.498
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108513",
"label": "benign",
"label_confidence": 0.635,
"severity": "low",
"timestamp": "2026-01-06T21:53:00Z",
"trace_id": "2f093a06-0de3-0e52-7c4c-1a0aaadfd93d"
} | {
"account_age_days": 209,
"account_id": "ACCT-3370103194D4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.625
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 80,
"timestamp": "2026-01-06T21:53:00Z",
"transaction_amount_usd": 6607.16
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.556,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1209.74,
"financial_exposure_usd": 1893.46,
"recoverable_pct": 0.79
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103088",
"label": "fraudulent",
"label_confidence": 0.978,
"severity": "low",
"timestamp": "2026-01-03T03:28:00Z",
"trace_id": "13620054-8fc1-c83d-1ba1-c1ff1f35f19e"
} | {
"account_age_days": 770,
"account_id": "ACCT-20480EBEAB63",
"baseline_risk_score": 0.514,
"kyc_tier": "tier_3",
"session_entropy": 0.741
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 342,
"timestamp": "2026-01-03T03:28:00Z",
"transaction_amount_usd": 39258.13
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.741,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 480602.92,
"financial_exposure_usd": 697903.45,
"recoverable_pct": 0.652
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100273",
"label": "fraudulent",
"label_confidence": 0.931,
"severity": "medium",
"timestamp": "2026-01-01T04:33:00Z",
"trace_id": "08ed3047-1900-1fc9-ca44-5a6bad20c3fa"
} | {
"account_age_days": 1068,
"account_id": "ACCT-6EF684198A39",
"baseline_risk_score": 0.493,
"kyc_tier": "tier_3",
"session_entropy": 0.574
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 81,
"timestamp": "2026-01-01T03:49:00Z",
"transaction_amount_usd": 10.11
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.421,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 392046.94,
"financial_exposure_usd": 451171.33,
"recoverable_pct": 0.062
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100159",
"label": "fraudulent",
"label_confidence": 0.85,
"severity": "high",
"timestamp": "2026-01-01T02:39:00Z",
"trace_id": "37a2a180-0a7b-e6e7-7430-0ccc03fddd08"
} | {
"account_age_days": 1917,
"account_id": "ACCT-B1B2B9C67120",
"baseline_risk_score": 0.6,
"kyc_tier": "tier_3",
"session_entropy": 0.366
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 81,
"timestamp": "2026-01-01T02:39:00Z",
"transaction_amount_usd": 15250.57
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.631,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 737245.55,
"financial_exposure_usd": 1084293.81,
"recoverable_pct": 0.817
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106910",
"label": "benign",
"label_confidence": 0.465,
"severity": "high",
"timestamp": "2026-01-05T19:10:00Z",
"trace_id": "47bd8b89-ab11-aeef-acac-49626c6e68a2"
} | {
"account_age_days": 647,
"account_id": "ACCT-EC2F38349D48",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.364
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 191,
"timestamp": "2026-01-05T19:10:00Z",
"transaction_amount_usd": 4760.79
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.606,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 896.05,
"financial_exposure_usd": 2219.84,
"recoverable_pct": 0.47
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107290",
"label": "benign",
"label_confidence": 0.722,
"severity": "low",
"timestamp": "2026-01-06T01:30:00Z",
"trace_id": "c19b5215-13ec-80cd-9cf6-ae26cfa7e72f"
} | {
"account_age_days": 762,
"account_id": "ACCT-9EE693688ED3",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.803
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 217,
"timestamp": "2026-01-06T01:30:00Z",
"transaction_amount_usd": 14028.54
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.514,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 6295.98,
"financial_exposure_usd": 6942.57,
"recoverable_pct": 0.489
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102980",
"label": "fraudulent",
"label_confidence": 0.896,
"severity": "high",
"timestamp": "2026-01-03T01:40:00Z",
"trace_id": "e14481d7-a959-8b9c-feba-c96ddc293cb6"
} | {
"account_age_days": 1343,
"account_id": "ACCT-CE5C5310FA6E",
"baseline_risk_score": 0.433,
"kyc_tier": "tier_1",
"session_entropy": 0.732
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 385,
"timestamp": "2026-01-03T01:40:00Z",
"transaction_amount_usd": 100982.16
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.843,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 833495.26,
"financial_exposure_usd": 1362749.98,
"recoverable_pct": 0.196
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105599",
"label": "fraudulent",
"label_confidence": 0.6,
"severity": "high",
"timestamp": "2026-01-04T21:19:00Z",
"trace_id": "ac3cb62c-3b8b-9b0b-7eab-760cc888e13a"
} | {
"account_age_days": 1340,
"account_id": "ACCT-49737A0A9034",
"baseline_risk_score": 0.176,
"kyc_tier": "tier_2",
"session_entropy": 0.406
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 170,
"timestamp": "2026-01-04T16:05:00Z",
"transaction_amount_usd": 19.05
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.559,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 7657150.48,
"financial_exposure_usd": 7822266.76,
"recoverable_pct": 0.761
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104037",
"label": "fraudulent",
"label_confidence": 0.604,
"severity": "critical",
"timestamp": "2026-01-03T19:17:00Z",
"trace_id": "e9f56229-155a-31c2-0942-a2e6f426709c"
} | {
"account_age_days": 917,
"account_id": "ACCT-95F7CDC9F9A2",
"baseline_risk_score": 0.357,
"kyc_tier": "tier_1",
"session_entropy": 0.52
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 341,
"timestamp": "2026-01-03T11:49:00Z",
"transaction_amount_usd": 17.77
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.385,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3471035.75,
"financial_exposure_usd": 6290670.65,
"recoverable_pct": 0.982
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103260",
"label": "fraudulent",
"label_confidence": 0.891,
"severity": "critical",
"timestamp": "2026-01-03T06:20:00Z",
"trace_id": "8565e5d0-373a-c264-5fb6-296f7ee34146"
} | {
"account_age_days": 1856,
"account_id": "ACCT-A4CABF65CB41",
"baseline_risk_score": 0.599,
"kyc_tier": "tier_1",
"session_entropy": 0.881
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 1148,
"timestamp": "2026-01-03T06:20:00Z",
"transaction_amount_usd": 79304.75
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.424,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 735230.62,
"financial_exposure_usd": 1046161.87,
"recoverable_pct": 0.704
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103270",
"label": "fraudulent",
"label_confidence": 0.884,
"severity": "high",
"timestamp": "2026-01-03T06:30:00Z",
"trace_id": "a408cdf2-9435-44fa-e439-edf7e42f0737"
} | {
"account_age_days": 706,
"account_id": "ACCT-EE3D1DF8584F",
"baseline_risk_score": 0.291,
"kyc_tier": "tier_1",
"session_entropy": 0.637
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 553,
"timestamp": "2026-01-03T06:30:00Z",
"transaction_amount_usd": 31043.81
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.548,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 823399.47,
"financial_exposure_usd": 1168118.3,
"recoverable_pct": 0.305
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.