schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103417",
"label": "fraudulent",
"label_confidence": 0.667,
"severity": "critical",
"timestamp": "2026-01-03T08:57:00Z",
"trace_id": "38e11e70-1cc1-3c83-df97-554dc9c72a51"
} | {
"account_age_days": 1154,
"account_id": "ACCT-2C1C56980FE0",
"baseline_risk_score": 0.187,
"kyc_tier": "tier_1",
"session_entropy": 0.698
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 1101,
"timestamp": "2026-01-03T08:57:00Z",
"transaction_amount_usd": 2457192
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.94,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 2217532.92,
"financial_exposure_usd": 4851512.32,
"recoverable_pct": 0.663
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100633",
"label": "fraudulent",
"label_confidence": 0.854,
"severity": "medium",
"timestamp": "2026-01-01T10:33:00Z",
"trace_id": "25e45a03-db41-8f9f-4631-0d283f8c18bb"
} | {
"account_age_days": 1988,
"account_id": "ACCT-ECDC7B52F1D3",
"baseline_risk_score": 0.392,
"kyc_tier": "tier_2",
"session_entropy": 0.147
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 355,
"timestamp": "2026-01-01T04:18:00Z",
"transaction_amount_usd": 3.07
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.768,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 572754.85,
"financial_exposure_usd": 922137.2,
"recoverable_pct": 0.24
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100847",
"label": "fraudulent",
"label_confidence": 0.764,
"severity": "medium",
"timestamp": "2026-01-01T14:07:00Z",
"trace_id": "991e0704-733b-e7cb-fda8-547410a7b21c"
} | {
"account_age_days": 1280,
"account_id": "ACCT-9341E6270EB0",
"baseline_risk_score": 0.456,
"kyc_tier": "tier_2",
"session_entropy": 0.189
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 163,
"timestamp": "2026-01-01T14:07:00Z",
"transaction_amount_usd": 104765.44
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.409,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 359484.16,
"financial_exposure_usd": 471031.18,
"recoverable_pct": 0.705
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105304",
"label": "fraudulent",
"label_confidence": 0.808,
"severity": "medium",
"timestamp": "2026-01-04T16:24:00Z",
"trace_id": "0e22a16d-2ecf-8239-9755-3cfea2690efb"
} | {
"account_age_days": 514,
"account_id": "ACCT-393B6AD6D238",
"baseline_risk_score": 0.289,
"kyc_tier": "tier_2",
"session_entropy": 0.806
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 237,
"timestamp": "2026-01-04T15:28:00Z",
"transaction_amount_usd": 2.87
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.949,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3430447.57,
"financial_exposure_usd": 4573575.16,
"recoverable_pct": 0.783
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104392",
"label": "fraudulent",
"label_confidence": 0.668,
"severity": "medium",
"timestamp": "2026-01-04T01:12:00Z",
"trace_id": "270ab74b-69a8-9fcf-2756-881e3263a954"
} | {
"account_age_days": 1316,
"account_id": "ACCT-2DE61D5E0E44",
"baseline_risk_score": 0.278,
"kyc_tier": "tier_1",
"session_entropy": 0.488
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 625,
"timestamp": "2026-01-04T01:12:00Z",
"transaction_amount_usd": 1835513.79
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.506,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2256763.33,
"financial_exposure_usd": 4780031.26,
"recoverable_pct": 0.838
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104934",
"label": "fraudulent",
"label_confidence": 0.757,
"severity": "medium",
"timestamp": "2026-01-04T10:14:00Z",
"trace_id": "d94c160c-9a46-35a4-b703-14e74ad3f6ee"
} | {
"account_age_days": 1719,
"account_id": "ACCT-F65F4B4ECF64",
"baseline_risk_score": 0.375,
"kyc_tier": "tier_1",
"session_entropy": 0.277
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 232,
"timestamp": "2026-01-04T10:14:00Z",
"transaction_amount_usd": 970637.43
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.896,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2290293.64,
"financial_exposure_usd": 3582672.4,
"recoverable_pct": 0.454
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103348",
"label": "fraudulent",
"label_confidence": 0.684,
"severity": "critical",
"timestamp": "2026-01-03T07:48:00Z",
"trace_id": "40a09ef7-2174-62a2-ca12-7a1abdce5099"
} | {
"account_age_days": 1185,
"account_id": "ACCT-4E5E96A98FF7",
"baseline_risk_score": 0.217,
"kyc_tier": "tier_2",
"session_entropy": 0.509
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 867,
"timestamp": "2026-01-03T07:48:00Z",
"transaction_amount_usd": 2838256.28
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.388,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2838588.37,
"financial_exposure_usd": 6553868.28,
"recoverable_pct": 0.617
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106564",
"label": "fraudulent",
"label_confidence": 0.932,
"severity": "medium",
"timestamp": "2026-01-05T13:24:00Z",
"trace_id": "0c3e1835-a042-b47a-6574-6cc37548f3c2"
} | {
"account_age_days": 1384,
"account_id": "ACCT-8730E56CBC77",
"baseline_risk_score": 0.445,
"kyc_tier": "tier_3",
"session_entropy": 0.166
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 80,
"timestamp": "2026-01-05T07:46:00Z",
"transaction_amount_usd": 11.27
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.624,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1785170.31,
"financial_exposure_usd": 2598788.02,
"recoverable_pct": 0.664
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107963",
"label": "benign",
"label_confidence": 0.507,
"severity": "low",
"timestamp": "2026-01-06T12:43:00Z",
"trace_id": "2a7abcfc-eb4e-edfa-b028-2d51aecf5461"
} | {
"account_age_days": 1724,
"account_id": "ACCT-E9AF53484935",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.31
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 797,
"timestamp": "2026-01-06T12:43:00Z",
"transaction_amount_usd": 2477.49
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.534,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 4757.72,
"financial_exposure_usd": 5534.47,
"recoverable_pct": 0.662
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107386",
"label": "benign",
"label_confidence": 0.641,
"severity": "medium",
"timestamp": "2026-01-06T03:06:00Z",
"trace_id": "563e6ffe-fddf-97e1-8a53-6e88418db845"
} | {
"account_age_days": 365,
"account_id": "ACCT-8AB7A979E96B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.489
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 307,
"timestamp": "2026-01-06T03:06:00Z",
"transaction_amount_usd": 14765.16
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.5,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 4267.88,
"financial_exposure_usd": 4452.56,
"recoverable_pct": 0.935
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105208",
"label": "fraudulent",
"label_confidence": 0.606,
"severity": "high",
"timestamp": "2026-01-04T14:48:00Z",
"trace_id": "868e3db5-cadc-45d7-7ea6-b9aeefb74fe4"
} | {
"account_age_days": 1619,
"account_id": "ACCT-5DDD51D3AE20",
"baseline_risk_score": 0.321,
"kyc_tier": "tier_1",
"session_entropy": 0.794
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 80,
"timestamp": "2026-01-04T14:48:00Z",
"transaction_amount_usd": 1509871.29
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.595,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1510433.35,
"financial_exposure_usd": 2368937.54,
"recoverable_pct": 0.946
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103205",
"label": "fraudulent",
"label_confidence": 0.803,
"severity": "high",
"timestamp": "2026-01-03T05:25:00Z",
"trace_id": "272d221f-eb61-a49c-1c28-d1920b58ac56"
} | {
"account_age_days": 67,
"account_id": "ACCT-92788EFB8FB3",
"baseline_risk_score": 0.45,
"kyc_tier": "tier_1",
"session_entropy": 0.213
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 565,
"timestamp": "2026-01-03T05:25:00Z",
"transaction_amount_usd": 20919.24
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.479,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 294892.46,
"financial_exposure_usd": 576416.13,
"recoverable_pct": 0.431
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103958",
"label": "fraudulent",
"label_confidence": 0.642,
"severity": "medium",
"timestamp": "2026-01-03T17:58:00Z",
"trace_id": "35a2981b-bb73-1665-ad61-55158cd1129c"
} | {
"account_age_days": 1114,
"account_id": "ACCT-5EDBAF35A2C5",
"baseline_risk_score": 0.168,
"kyc_tier": "tier_3",
"session_entropy": 0.948
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 130,
"timestamp": "2026-01-03T10:50:00Z",
"transaction_amount_usd": 6.72
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.929,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2233370.79,
"financial_exposure_usd": 4931323.49,
"recoverable_pct": 0.707
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102167",
"label": "fraudulent",
"label_confidence": 0.78,
"severity": "medium",
"timestamp": "2026-01-02T12:07:00Z",
"trace_id": "2b50afaa-7610-6ef1-864a-7ab9fea8825b"
} | {
"account_age_days": 588,
"account_id": "ACCT-888F02CB6433",
"baseline_risk_score": 0.318,
"kyc_tier": "tier_3",
"session_entropy": 0.216
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 954,
"timestamp": "2026-01-02T12:07:00Z",
"transaction_amount_usd": 103667.11
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.805,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 637161.95,
"financial_exposure_usd": 694907.7,
"recoverable_pct": 0.128
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101593",
"label": "fraudulent",
"label_confidence": 0.933,
"severity": "critical",
"timestamp": "2026-01-02T02:33:00Z",
"trace_id": "92146768-bd5f-1933-49eb-8d30a7a07b48"
} | {
"account_age_days": 1114,
"account_id": "ACCT-C446CB36D861",
"baseline_risk_score": 0.622,
"kyc_tier": "tier_1",
"session_entropy": 0.651
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 434,
"timestamp": "2026-01-02T02:33:00Z",
"transaction_amount_usd": 48181.63
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.398,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 599029.09,
"financial_exposure_usd": 846456.44,
"recoverable_pct": 0.469
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102135",
"label": "fraudulent",
"label_confidence": 0.763,
"severity": "high",
"timestamp": "2026-01-02T11:35:00Z",
"trace_id": "951247dd-6acd-6167-7ccf-530a474246c2"
} | {
"account_age_days": 478,
"account_id": "ACCT-3FD8B18549FA",
"baseline_risk_score": 0.444,
"kyc_tier": "tier_2",
"session_entropy": 0.608
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 264,
"timestamp": "2026-01-02T01:40:00Z",
"transaction_amount_usd": 2.72
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.562,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 316066.04,
"financial_exposure_usd": 435960.2,
"recoverable_pct": 0.488
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108525",
"label": "benign",
"label_confidence": 0.666,
"severity": "low",
"timestamp": "2026-01-06T22:05:00Z",
"trace_id": "1a5b8aed-3900-ad31-e1d4-0bc23482957b"
} | {
"account_age_days": 630,
"account_id": "ACCT-252087709BA0",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.504
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 795,
"timestamp": "2026-01-06T22:05:00Z",
"transaction_amount_usd": 10974.68
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.662,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2951.92,
"financial_exposure_usd": 6888.97,
"recoverable_pct": 0.511
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108551",
"label": "benign",
"label_confidence": 0.653,
"severity": "low",
"timestamp": "2026-01-06T22:31:00Z",
"trace_id": "f11660e4-3bc3-56bd-a019-8222b5bb1bfc"
} | {
"account_age_days": 1034,
"account_id": "ACCT-7F8A1462BD62",
"baseline_risk_score": 0.196,
"kyc_tier": "tier_1",
"session_entropy": 0.866
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 1086,
"timestamp": "2026-01-06T22:31:00Z",
"transaction_amount_usd": 9539.17
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.781,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 711.28,
"financial_exposure_usd": 1616.47,
"recoverable_pct": 0.565
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103226",
"label": "fraudulent",
"label_confidence": 0.92,
"severity": "critical",
"timestamp": "2026-01-03T05:46:00Z",
"trace_id": "f97238f0-46b5-7f27-bc2a-07d40ad721c5"
} | {
"account_age_days": 1583,
"account_id": "ACCT-1A0E8A28E11B",
"baseline_risk_score": 0.35,
"kyc_tier": "tier_2",
"session_entropy": 0.398
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 1178,
"timestamp": "2026-01-03T05:46:00Z",
"transaction_amount_usd": 28535.55
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.634,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 295330.86,
"financial_exposure_usd": 728879.23,
"recoverable_pct": 0.24
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105937",
"label": "fraudulent",
"label_confidence": 0.62,
"severity": "low",
"timestamp": "2026-01-05T02:57:00Z",
"trace_id": "3808960e-cfa0-a98e-404e-148567a6920f"
} | {
"account_age_days": 1359,
"account_id": "ACCT-91FD43D8B1BC",
"baseline_risk_score": 0.246,
"kyc_tier": "tier_1",
"session_entropy": 0.467
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 1064,
"timestamp": "2026-01-05T02:57:00Z",
"transaction_amount_usd": 1787229.87
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.551,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4709656.92,
"financial_exposure_usd": 5942630.66,
"recoverable_pct": 0.603
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101339",
"label": "fraudulent",
"label_confidence": 0.972,
"severity": "medium",
"timestamp": "2026-01-01T22:19:00Z",
"trace_id": "0c86aade-5911-389e-cce9-8ef85eb05064"
} | {
"account_age_days": 942,
"account_id": "ACCT-1FCE5FD2F59D",
"baseline_risk_score": 0.567,
"kyc_tier": "tier_1",
"session_entropy": 0.756
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 266,
"timestamp": "2026-01-01T20:57:00Z",
"transaction_amount_usd": 3.79
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.639,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 9",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 100568.58,
"financial_exposure_usd": 180937.64,
"recoverable_pct": 0.007
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102846",
"label": "fraudulent",
"label_confidence": 0.799,
"severity": "high",
"timestamp": "2026-01-02T23:26:00Z",
"trace_id": "bc01deb1-682e-514d-f6c9-32a750169afe"
} | {
"account_age_days": 1571,
"account_id": "ACCT-9C503CCF0A2E",
"baseline_risk_score": 0.486,
"kyc_tier": "tier_1",
"session_entropy": 0.879
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CA",
"latency_ms": 581,
"timestamp": "2026-01-02T23:26:00Z",
"transaction_amount_usd": 34957.55
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.763,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 461725.27,
"financial_exposure_usd": 490982.19,
"recoverable_pct": 0.742
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105186",
"label": "fraudulent",
"label_confidence": 0.795,
"severity": "high",
"timestamp": "2026-01-04T14:26:00Z",
"trace_id": "1e27fce0-1493-69cd-cd28-1b59222a17a3"
} | {
"account_age_days": 658,
"account_id": "ACCT-D2843034FAEB",
"baseline_risk_score": 0.089,
"kyc_tier": "tier_2",
"session_entropy": 0.764
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 267,
"timestamp": "2026-01-04T05:55:00Z",
"transaction_amount_usd": 21.69
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.906,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2278729.04,
"financial_exposure_usd": 4014845.26,
"recoverable_pct": 0.85
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104611",
"label": "fraudulent",
"label_confidence": 0.629,
"severity": "high",
"timestamp": "2026-01-04T04:51:00Z",
"trace_id": "01130a80-bd11-9d17-1103-4be5ed5814e7"
} | {
"account_age_days": 1460,
"account_id": "ACCT-26BE5C139F44",
"baseline_risk_score": 0.224,
"kyc_tier": "tier_3",
"session_entropy": 0.635
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 269,
"timestamp": "2026-01-04T04:51:00Z",
"transaction_amount_usd": 1761556.15
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.499,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1631414.08,
"financial_exposure_usd": 3524900.93,
"recoverable_pct": 0.957
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101730",
"label": "fraudulent",
"label_confidence": 0.882,
"severity": "medium",
"timestamp": "2026-01-02T04:50:00Z",
"trace_id": "7f398adf-ba10-8970-e2f2-db03567d3874"
} | {
"account_age_days": 712,
"account_id": "ACCT-89E316C98340",
"baseline_risk_score": 0.624,
"kyc_tier": "tier_2",
"session_entropy": 0.337
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 1197,
"timestamp": "2026-01-02T04:50:00Z",
"transaction_amount_usd": 32567.36
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.798,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 479628.57,
"financial_exposure_usd": 1046609.71,
"recoverable_pct": 0.612
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104970",
"label": "fraudulent",
"label_confidence": 0.796,
"severity": "critical",
"timestamp": "2026-01-04T10:50:00Z",
"trace_id": "2f14c8df-4804-f403-882e-468c0c2a4696"
} | {
"account_age_days": 730,
"account_id": "ACCT-98B78FEFC3F9",
"baseline_risk_score": 0.347,
"kyc_tier": "tier_3",
"session_entropy": 0.405
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 122,
"timestamp": "2026-01-04T09:40:00Z",
"transaction_amount_usd": 22.7
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.824,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2795904.72,
"financial_exposure_usd": 3757472.05,
"recoverable_pct": 0.404
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105606",
"label": "fraudulent",
"label_confidence": 0.907,
"severity": "high",
"timestamp": "2026-01-04T21:26:00Z",
"trace_id": "2d94d970-27eb-5220-a0b5-49a8cf74377c"
} | {
"account_age_days": 1884,
"account_id": "ACCT-BEFE4393E6FC",
"baseline_risk_score": 0.433,
"kyc_tier": "tier_1",
"session_entropy": 0.231
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 895,
"timestamp": "2026-01-04T21:26:00Z",
"transaction_amount_usd": 1034186.75
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.441,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3177969.04,
"financial_exposure_usd": 3862234.24,
"recoverable_pct": 0.796
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100614",
"label": "fraudulent",
"label_confidence": 0.928,
"severity": "critical",
"timestamp": "2026-01-01T10:14:00Z",
"trace_id": "984dcca2-4119-2e85-0b66-c0de8ec5bffe"
} | {
"account_age_days": 1851,
"account_id": "ACCT-01B2634A56DA",
"baseline_risk_score": 0.501,
"kyc_tier": "tier_3",
"session_entropy": 0.413
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 473,
"timestamp": "2026-01-01T10:14:00Z",
"transaction_amount_usd": 51714.3
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.733,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 603402.83,
"financial_exposure_usd": 765410.79,
"recoverable_pct": 0.447
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109395",
"label": "benign",
"label_confidence": 0.653,
"severity": "low",
"timestamp": "2026-01-07T12:35:00Z",
"trace_id": "dfa6dded-ff50-df8c-6fe3-7e694d6c6c76"
} | {
"account_age_days": 1160,
"account_id": "ACCT-39D10CB30E48",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.63
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 884,
"timestamp": "2026-01-07T12:35:00Z",
"transaction_amount_usd": 11397.59
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.52,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 994.22,
"financial_exposure_usd": 1755.22,
"recoverable_pct": 0.979
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102824",
"label": "fraudulent",
"label_confidence": 0.832,
"severity": "high",
"timestamp": "2026-01-02T23:04:00Z",
"trace_id": "e7af21b3-e9eb-bcc0-79e7-a083a31a2eb8"
} | {
"account_age_days": 250,
"account_id": "ACCT-693360B91D49",
"baseline_risk_score": 0.566,
"kyc_tier": "tier_3",
"session_entropy": 0.214
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 398,
"timestamp": "2026-01-02T23:04:00Z",
"transaction_amount_usd": 95539.67
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.681,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 821631.29,
"financial_exposure_usd": 1334329.38,
"recoverable_pct": 0.122
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109120",
"label": "benign",
"label_confidence": 0.696,
"severity": "medium",
"timestamp": "2026-01-07T08:00:00Z",
"trace_id": "fea1e57a-dbd8-8435-54e8-d5ea390d53f8"
} | {
"account_age_days": 1253,
"account_id": "ACCT-E8C9F3EA43DD",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.206
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 138,
"timestamp": "2026-01-07T08:00:00Z",
"transaction_amount_usd": 7306.96
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.705,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1814.22,
"financial_exposure_usd": 2138.55,
"recoverable_pct": 0.873
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108766",
"label": "benign",
"label_confidence": 0.718,
"severity": "high",
"timestamp": "2026-01-07T02:06:00Z",
"trace_id": "7e62e357-5f35-3deb-ef24-9538f6e84012"
} | {
"account_age_days": 659,
"account_id": "ACCT-D6976BE3E201",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.892
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 666,
"timestamp": "2026-01-07T02:06:00Z",
"transaction_amount_usd": 9579.92
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.738,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 446.19,
"financial_exposure_usd": 446.78,
"recoverable_pct": 0.539
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107792",
"label": "benign",
"label_confidence": 0.463,
"severity": "critical",
"timestamp": "2026-01-06T09:52:00Z",
"trace_id": "5d0a84ca-c4f3-f3bd-0051-771d9cfaa5b1"
} | {
"account_age_days": 1222,
"account_id": "ACCT-EEDBD0734633",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.341
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 681,
"timestamp": "2026-01-06T09:52:00Z",
"transaction_amount_usd": 5322.54
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.521,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3949.02,
"financial_exposure_usd": 5580.76,
"recoverable_pct": 0.658
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107076",
"label": "benign",
"label_confidence": 0.618,
"severity": "high",
"timestamp": "2026-01-05T21:56:00Z",
"trace_id": "dd5edfd2-5e0b-2f3d-ea25-8f0c9e473798"
} | {
"account_age_days": 1385,
"account_id": "ACCT-5DBCC756723B",
"baseline_risk_score": 0.098,
"kyc_tier": "tier_3",
"session_entropy": 0.146
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 297,
"timestamp": "2026-01-05T13:28:00Z",
"transaction_amount_usd": 18.14
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.776,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1923.78,
"financial_exposure_usd": 3602.42,
"recoverable_pct": 0.957
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102418",
"label": "fraudulent",
"label_confidence": 0.894,
"severity": "medium",
"timestamp": "2026-01-02T16:18:00Z",
"trace_id": "cc6fb001-f4c3-0807-132b-1badbcd4c652"
} | {
"account_age_days": 1458,
"account_id": "ACCT-DE63BF239EA8",
"baseline_risk_score": 0.485,
"kyc_tier": "tier_2",
"session_entropy": 0.817
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "FR",
"latency_ms": 498,
"timestamp": "2026-01-02T16:18:00Z",
"transaction_amount_usd": 83770.19
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.796,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 860335.09,
"financial_exposure_usd": 1196502.67,
"recoverable_pct": 0.49
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101885",
"label": "fraudulent",
"label_confidence": 0.815,
"severity": "low",
"timestamp": "2026-01-02T07:25:00Z",
"trace_id": "21a9fff2-1209-b08f-d39c-338907e1dabd"
} | {
"account_age_days": 1454,
"account_id": "ACCT-B6F327303E48",
"baseline_risk_score": 0.295,
"kyc_tier": "tier_3",
"session_entropy": 0.476
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 485,
"timestamp": "2026-01-02T07:25:00Z",
"transaction_amount_usd": 37220.15
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.719,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 745854.92,
"financial_exposure_usd": 1318278.89,
"recoverable_pct": 0.196
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106653",
"label": "fraudulent",
"label_confidence": 0.707,
"severity": "critical",
"timestamp": "2026-01-05T14:53:00Z",
"trace_id": "b2132b17-9e92-6c54-6f99-ee111d19c6c7"
} | {
"account_age_days": 1399,
"account_id": "ACCT-E036D0CF5F3A",
"baseline_risk_score": 0.448,
"kyc_tier": "tier_3",
"session_entropy": 0.686
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 1066,
"timestamp": "2026-01-05T14:53:00Z",
"transaction_amount_usd": 732396.93
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.778,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3823035.76,
"financial_exposure_usd": 5031592.24,
"recoverable_pct": 0.871
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104010",
"label": "fraudulent",
"label_confidence": 0.779,
"severity": "high",
"timestamp": "2026-01-03T18:50:00Z",
"trace_id": "ff252fea-aa02-3687-d684-6c26381ba27c"
} | {
"account_age_days": 739,
"account_id": "ACCT-01DC6C0CEA8B",
"baseline_risk_score": 0.296,
"kyc_tier": "tier_3",
"session_entropy": 0.42
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 235,
"timestamp": "2026-01-03T09:59:00Z",
"transaction_amount_usd": 8.26
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.693,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2825023.67,
"financial_exposure_usd": 4191063.94,
"recoverable_pct": 0.693
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103907",
"label": "fraudulent",
"label_confidence": 0.645,
"severity": "low",
"timestamp": "2026-01-03T17:07:00Z",
"trace_id": "f5c67363-2e0d-e03f-16bd-b5c3df051616"
} | {
"account_age_days": 44,
"account_id": "ACCT-90D956917A49",
"baseline_risk_score": 0.105,
"kyc_tier": "tier_2",
"session_entropy": 0.465
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 325,
"timestamp": "2026-01-03T17:07:00Z",
"transaction_amount_usd": 2215020.19
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.635,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3825564.01,
"financial_exposure_usd": 8068199.36,
"recoverable_pct": 0.722
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106659",
"label": "fraudulent",
"label_confidence": 0.901,
"severity": "medium",
"timestamp": "2026-01-05T14:59:00Z",
"trace_id": "9d827e15-3ec7-456b-06a0-f136540a9d68"
} | {
"account_age_days": 730,
"account_id": "ACCT-1FB3016EB582",
"baseline_risk_score": 0.137,
"kyc_tier": "tier_2",
"session_entropy": 0.273
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 127,
"timestamp": "2026-01-05T03:12:00Z",
"transaction_amount_usd": 16.94
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.451,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2950768.35,
"financial_exposure_usd": 3519973.75,
"recoverable_pct": 0.851
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100370",
"label": "fraudulent",
"label_confidence": 0.908,
"severity": "high",
"timestamp": "2026-01-01T06:10:00Z",
"trace_id": "75c32e98-1bdf-df34-990c-8fb930f6151f"
} | {
"account_age_days": 1156,
"account_id": "ACCT-480CE69D19B3",
"baseline_risk_score": 0.332,
"kyc_tier": "tier_3",
"session_entropy": 0.139
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 889,
"timestamp": "2026-01-01T06:10:00Z",
"transaction_amount_usd": 70416.98
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.403,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 976521.22,
"financial_exposure_usd": 1003610.63,
"recoverable_pct": 0.735
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106434",
"label": "fraudulent",
"label_confidence": 0.868,
"severity": "high",
"timestamp": "2026-01-05T11:14:00Z",
"trace_id": "2d9142ed-226d-838a-5237-a49e1d86ff7f"
} | {
"account_age_days": 1437,
"account_id": "ACCT-259545010AD6",
"baseline_risk_score": 0.381,
"kyc_tier": "tier_2",
"session_entropy": 0.413
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 1114,
"timestamp": "2026-01-05T11:14:00Z",
"transaction_amount_usd": 2815994.33
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.48,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 3347730.82,
"financial_exposure_usd": 3581249.31,
"recoverable_pct": 0.589
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108399",
"label": "benign",
"label_confidence": 0.662,
"severity": "high",
"timestamp": "2026-01-06T19:59:00Z",
"trace_id": "d68c93eb-e853-7f9d-d40c-d767102cc270"
} | {
"account_age_days": 706,
"account_id": "ACCT-E67CDC4C8668",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.216
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 265,
"timestamp": "2026-01-06T16:36:00Z",
"transaction_amount_usd": 18.08
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.577,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1310.87,
"financial_exposure_usd": 2697.05,
"recoverable_pct": 0.722
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100739",
"label": "fraudulent",
"label_confidence": 0.972,
"severity": "high",
"timestamp": "2026-01-01T12:19:00Z",
"trace_id": "14a3304c-3bfe-bc95-5a88-84096e2f5154"
} | {
"account_age_days": 555,
"account_id": "ACCT-7E6976E57728",
"baseline_risk_score": 0.396,
"kyc_tier": "tier_2",
"session_entropy": 0.385
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NL",
"latency_ms": 175,
"timestamp": "2026-01-01T12:19:00Z",
"transaction_amount_usd": 25809.68
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.831,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 512821.31,
"financial_exposure_usd": 647672,
"recoverable_pct": 0.535
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107100",
"label": "benign",
"label_confidence": 0.581,
"severity": "low",
"timestamp": "2026-01-05T22:20:00Z",
"trace_id": "baf3e22b-f08e-334f-91cb-4629c08e5fb4"
} | {
"account_age_days": 1534,
"account_id": "ACCT-45CCA370A795",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.423
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 593,
"timestamp": "2026-01-05T22:20:00Z",
"transaction_amount_usd": 2207.37
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.796,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 467.26,
"financial_exposure_usd": 507.54,
"recoverable_pct": 0.501
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108988",
"label": "benign",
"label_confidence": 0.68,
"severity": "medium",
"timestamp": "2026-01-07T05:48:00Z",
"trace_id": "6937722c-6a50-ec6a-fb14-df704a0dc510"
} | {
"account_age_days": 845,
"account_id": "ACCT-3FFD0E2B4A4D",
"baseline_risk_score": 0.194,
"kyc_tier": "tier_1",
"session_entropy": 0.909
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 493,
"timestamp": "2026-01-07T05:48:00Z",
"transaction_amount_usd": 3452.04
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.618,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 339.66,
"financial_exposure_usd": 788.88,
"recoverable_pct": 0.481
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108758",
"label": "benign",
"label_confidence": 0.666,
"severity": "medium",
"timestamp": "2026-01-07T01:58:00Z",
"trace_id": "541db7ab-5a76-4d08-877e-7ee9f6901161"
} | {
"account_age_days": 180,
"account_id": "ACCT-C5B4E3404521",
"baseline_risk_score": 0.07,
"kyc_tier": "tier_1",
"session_entropy": 0.327
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 852,
"timestamp": "2026-01-07T01:58:00Z",
"transaction_amount_usd": 14049.84
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.575,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 879.71,
"financial_exposure_usd": 1436.54,
"recoverable_pct": 0.475
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104231",
"label": "fraudulent",
"label_confidence": 0.777,
"severity": "high",
"timestamp": "2026-01-03T22:31:00Z",
"trace_id": "496d3fbd-305b-e554-d8ac-6f11546e7273"
} | {
"account_age_days": 641,
"account_id": "ACCT-EAB64DA0DFB3",
"baseline_risk_score": 0.166,
"kyc_tier": "tier_1",
"session_entropy": 0.348
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 154,
"timestamp": "2026-01-03T14:15:00Z",
"transaction_amount_usd": 1.12
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.5,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND... | {
"customer_funds_at_risk_usd": 5503110.49,
"financial_exposure_usd": 6216890.95,
"recoverable_pct": 0.577
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107399",
"label": "benign",
"label_confidence": 0.67,
"severity": "low",
"timestamp": "2026-01-06T03:19:00Z",
"trace_id": "aafbd38d-5db8-8ae9-56e4-085f6734d14c"
} | {
"account_age_days": 1197,
"account_id": "ACCT-F83E0FDE2FD5",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.486
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 773,
"timestamp": "2026-01-06T03:19:00Z",
"transaction_amount_usd": 3664.01
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.784,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 846.2,
"financial_exposure_usd": 1191.33,
"recoverable_pct": 0.888
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105933",
"label": "fraudulent",
"label_confidence": 0.782,
"severity": "medium",
"timestamp": "2026-01-05T02:53:00Z",
"trace_id": "5b3b8723-3465-80bb-edeb-5de0faa4f8ff"
} | {
"account_age_days": 1195,
"account_id": "ACCT-1A15D732CF7B",
"baseline_risk_score": 0.302,
"kyc_tier": "tier_2",
"session_entropy": 0.444
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 594,
"timestamp": "2026-01-05T02:53:00Z",
"transaction_amount_usd": 1831798.07
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.573,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1370288.61,
"financial_exposure_usd": 3418317.38,
"recoverable_pct": 0.414
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103548",
"label": "fraudulent",
"label_confidence": 0.782,
"severity": "medium",
"timestamp": "2026-01-03T11:08:00Z",
"trace_id": "dbe5169a-cb57-63ad-d7ac-f42612ee497a"
} | {
"account_age_days": 528,
"account_id": "ACCT-FA2E62308B5A",
"baseline_risk_score": 0.097,
"kyc_tier": "tier_1",
"session_entropy": 0.743
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 193,
"timestamp": "2026-01-03T10:12:00Z",
"transaction_amount_usd": 1.95
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.502,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1496456.27,
"financial_exposure_usd": 2304801.3,
"recoverable_pct": 0.659
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100976",
"label": "fraudulent",
"label_confidence": 0.961,
"severity": "medium",
"timestamp": "2026-01-01T16:16:00Z",
"trace_id": "1abb918c-bbd8-6378-725a-91405f0221e7"
} | {
"account_age_days": 811,
"account_id": "ACCT-69E61237E751",
"baseline_risk_score": 0.53,
"kyc_tier": "tier_2",
"session_entropy": 0.171
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 729,
"timestamp": "2026-01-01T16:16:00Z",
"transaction_amount_usd": 96852.91
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.441,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 387498.12,
"financial_exposure_usd": 525002.56,
"recoverable_pct": 0.75
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102394",
"label": "fraudulent",
"label_confidence": 0.976,
"severity": "critical",
"timestamp": "2026-01-02T15:54:00Z",
"trace_id": "34e0947c-9611-0236-a1a1-26297e149866"
} | {
"account_age_days": 274,
"account_id": "ACCT-A5873527857B",
"baseline_risk_score": 0.428,
"kyc_tier": "tier_3",
"session_entropy": 0.531
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 722,
"timestamp": "2026-01-02T15:54:00Z",
"transaction_amount_usd": 28023.76
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.358,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 347109.31,
"financial_exposure_usd": 348435.75,
"recoverable_pct": 0.634
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106851",
"label": "benign",
"label_confidence": 0.744,
"severity": "low",
"timestamp": "2026-01-05T18:11:00Z",
"trace_id": "6984e23f-ed8f-b662-b022-6d0c1ff6faeb"
} | {
"account_age_days": 1279,
"account_id": "ACCT-7B838A281BA6",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.136
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 621,
"timestamp": "2026-01-05T18:11:00Z",
"transaction_amount_usd": 9696.21
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.578,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1260.31,
"financial_exposure_usd": 2906.48,
"recoverable_pct": 0.674
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100622",
"label": "fraudulent",
"label_confidence": 0.944,
"severity": "medium",
"timestamp": "2026-01-01T10:22:00Z",
"trace_id": "17295279-db69-f162-38be-7cd288420c39"
} | {
"account_age_days": 261,
"account_id": "ACCT-FE277243E501",
"baseline_risk_score": 0.342,
"kyc_tier": "tier_3",
"session_entropy": 0.85
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 580,
"timestamp": "2026-01-01T10:22:00Z",
"transaction_amount_usd": 75960.13
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.828,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 716245.41,
"financial_exposure_usd": 752090.67,
"recoverable_pct": 0.222
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106158",
"label": "fraudulent",
"label_confidence": 0.855,
"severity": "low",
"timestamp": "2026-01-05T06:38:00Z",
"trace_id": "da63379c-f991-ed03-c772-a81b6abec056"
} | {
"account_age_days": 615,
"account_id": "ACCT-CD160E688802",
"baseline_risk_score": 0.179,
"kyc_tier": "tier_2",
"session_entropy": 0.707
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 984,
"timestamp": "2026-01-05T06:38:00Z",
"transaction_amount_usd": 1880174.88
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.795,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1080693.64,
"financial_exposure_usd": 1605693.12,
"recoverable_pct": 0.462
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101644",
"label": "fraudulent",
"label_confidence": 0.868,
"severity": "medium",
"timestamp": "2026-01-02T03:24:00Z",
"trace_id": "515e6ba5-94e2-43e6-ba74-b0c41f65ef7f"
} | {
"account_age_days": 630,
"account_id": "ACCT-BB9BE83E610D",
"baseline_risk_score": 0.419,
"kyc_tier": "tier_2",
"session_entropy": 0.549
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 617,
"timestamp": "2026-01-02T03:24:00Z",
"transaction_amount_usd": 27414.42
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.658,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 276777.07,
"financial_exposure_usd": 585410.25,
"recoverable_pct": 0.837
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109383",
"label": "benign",
"label_confidence": 0.473,
"severity": "low",
"timestamp": "2026-01-07T12:23:00Z",
"trace_id": "b913bb9a-c925-8e3d-17d2-c32e47a996c4"
} | {
"account_age_days": 1516,
"account_id": "ACCT-99FB5885FB18",
"baseline_risk_score": 0.064,
"kyc_tier": "tier_3",
"session_entropy": 0.494
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 454,
"timestamp": "2026-01-07T12:23:00Z",
"transaction_amount_usd": 2770.73
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.507,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 574.28,
"financial_exposure_usd": 1293.8,
"recoverable_pct": 0.776
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102301",
"label": "fraudulent",
"label_confidence": 0.952,
"severity": "medium",
"timestamp": "2026-01-02T14:21:00Z",
"trace_id": "39e261c5-3d52-c5b9-31db-1b899ee443ca"
} | {
"account_age_days": 330,
"account_id": "ACCT-837EFC36217D",
"baseline_risk_score": 0.433,
"kyc_tier": "tier_2",
"session_entropy": 0.188
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 185,
"timestamp": "2026-01-02T14:02:00Z",
"transaction_amount_usd": 19.28
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.352,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 393675.5,
"financial_exposure_usd": 472312.36,
"recoverable_pct": 0.525
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107535",
"label": "benign",
"label_confidence": 0.517,
"severity": "low",
"timestamp": "2026-01-06T05:35:00Z",
"trace_id": "6a1400fc-f482-266a-d56a-6cfff754c8eb"
} | {
"account_age_days": 1702,
"account_id": "ACCT-948236F70343",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.483
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 283,
"timestamp": "2026-01-05T20:50:00Z",
"transaction_amount_usd": 17.4
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.587,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 4543.42,
"financial_exposure_usd": 5419.93,
"recoverable_pct": 0.808
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108218",
"label": "benign",
"label_confidence": 0.621,
"severity": "critical",
"timestamp": "2026-01-06T16:58:00Z",
"trace_id": "1b5fcdd4-9656-1d67-f0ee-51b67f67e9c6"
} | {
"account_age_days": 1614,
"account_id": "ACCT-A6BE943063CB",
"baseline_risk_score": 0.137,
"kyc_tier": "tier_2",
"session_entropy": 0.465
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 164,
"timestamp": "2026-01-06T07:27:00Z",
"transaction_amount_usd": 17.22
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.505,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2360.94,
"financial_exposure_usd": 4457.13,
"recoverable_pct": 0.429
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101651",
"label": "fraudulent",
"label_confidence": 0.848,
"severity": "low",
"timestamp": "2026-01-02T03:31:00Z",
"trace_id": "f3cabff3-1ac3-a16b-6ce5-58677508fdd3"
} | {
"account_age_days": 597,
"account_id": "ACCT-E801B4FE15CB",
"baseline_risk_score": 0.528,
"kyc_tier": "tier_2",
"session_entropy": 0.716
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 250,
"timestamp": "2026-01-01T17:57:00Z",
"transaction_amount_usd": 21.55
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.449,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 509209.15,
"financial_exposure_usd": 625930.6,
"recoverable_pct": 0.103
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107620",
"label": "benign",
"label_confidence": 0.613,
"severity": "high",
"timestamp": "2026-01-06T07:00:00Z",
"trace_id": "6aceb042-4ff7-77d0-e325-8d8947273c64"
} | {
"account_age_days": 575,
"account_id": "ACCT-4C481D1AD21D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.666
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 342,
"timestamp": "2026-01-06T07:00:00Z",
"transaction_amount_usd": 8309.92
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.713,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 650.91,
"financial_exposure_usd": 1346.15,
"recoverable_pct": 0.761
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100252",
"label": "fraudulent",
"label_confidence": 0.961,
"severity": "medium",
"timestamp": "2026-01-01T04:12:00Z",
"trace_id": "863e3610-ae7a-e52a-5179-15b7883a5ef5"
} | {
"account_age_days": 1912,
"account_id": "ACCT-567FD2E9C2F1",
"baseline_risk_score": 0.524,
"kyc_tier": "tier_2",
"session_entropy": 0.714
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "JP",
"latency_ms": 631,
"timestamp": "2026-01-01T04:12:00Z",
"transaction_amount_usd": 22755.34
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.898,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 775875.11,
"financial_exposure_usd": 1224848.22,
"recoverable_pct": 0.823
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101878",
"label": "fraudulent",
"label_confidence": 0.979,
"severity": "critical",
"timestamp": "2026-01-02T07:18:00Z",
"trace_id": "7a1bc3e3-9609-5d42-6bc7-9f546c47976e"
} | {
"account_age_days": 216,
"account_id": "ACCT-1A8AEBA006DA",
"baseline_risk_score": 0.296,
"kyc_tier": "tier_3",
"session_entropy": 0.529
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 168,
"timestamp": "2026-01-02T07:18:00Z",
"transaction_amount_usd": 87615.11
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.821,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 232005.38,
"financial_exposure_usd": 299752.15,
"recoverable_pct": 0.045
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103792",
"label": "fraudulent",
"label_confidence": 0.948,
"severity": "medium",
"timestamp": "2026-01-03T15:12:00Z",
"trace_id": "07e62098-139b-31bc-4a81-3be08850695c"
} | {
"account_age_days": 558,
"account_id": "ACCT-4F575D207FAD",
"baseline_risk_score": 0.086,
"kyc_tier": "tier_1",
"session_entropy": 0.895
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 143,
"timestamp": "2026-01-03T12:50:00Z",
"transaction_amount_usd": 6.72
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.81,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 6695374.52,
"financial_exposure_usd": 7006110.28,
"recoverable_pct": 0.83
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102653",
"label": "fraudulent",
"label_confidence": 0.966,
"severity": "high",
"timestamp": "2026-01-02T20:13:00Z",
"trace_id": "859d8669-abde-5e43-193f-bac19dea32ee"
} | {
"account_age_days": 1006,
"account_id": "ACCT-E973A123B19D",
"baseline_risk_score": 0.495,
"kyc_tier": "tier_2",
"session_entropy": 0.555
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 304,
"timestamp": "2026-01-02T20:13:00Z",
"transaction_amount_usd": 83663.17
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.639,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 169151.57,
"financial_exposure_usd": 193415.5,
"recoverable_pct": 0.72
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102841",
"label": "fraudulent",
"label_confidence": 0.971,
"severity": "low",
"timestamp": "2026-01-02T23:21:00Z",
"trace_id": "5a4be229-1316-e306-5a59-f13afa445688"
} | {
"account_age_days": 1008,
"account_id": "ACCT-1A9B632673DA",
"baseline_risk_score": 0.402,
"kyc_tier": "tier_3",
"session_entropy": 0.32
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 203,
"timestamp": "2026-01-02T23:21:00Z",
"transaction_amount_usd": 36535.69
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.926,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 1117550.33,
"financial_exposure_usd": 1129452.78,
"recoverable_pct": 0.087
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104312",
"label": "fraudulent",
"label_confidence": 0.945,
"severity": "medium",
"timestamp": "2026-01-03T23:52:00Z",
"trace_id": "99d44031-97d6-a8df-4b9d-664d69492366"
} | {
"account_age_days": 899,
"account_id": "ACCT-12126C5504B3",
"baseline_risk_score": 0.252,
"kyc_tier": "tier_1",
"session_entropy": 0.903
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 138,
"timestamp": "2026-01-03T23:52:00Z",
"transaction_amount_usd": 948818.98
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.669,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3164618.59,
"financial_exposure_usd": 5678637.17,
"recoverable_pct": 0.804
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103185",
"label": "fraudulent",
"label_confidence": 0.867,
"severity": "critical",
"timestamp": "2026-01-03T05:05:00Z",
"trace_id": "94784bbe-64cf-5201-16ec-e769fa248571"
} | {
"account_age_days": 1809,
"account_id": "ACCT-CB3C52CB6847",
"baseline_risk_score": 0.289,
"kyc_tier": "tier_3",
"session_entropy": 0.777
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 125,
"timestamp": "2026-01-03T00:54:00Z",
"transaction_amount_usd": 13.5
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.462,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 976484.91,
"financial_exposure_usd": 1066128.91,
"recoverable_pct": 0.429
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107154",
"label": "benign",
"label_confidence": 0.75,
"severity": "low",
"timestamp": "2026-01-05T23:14:00Z",
"trace_id": "5fa08521-0430-badb-fefd-39c4a7a059b9"
} | {
"account_age_days": 711,
"account_id": "ACCT-9480F7B46184",
"baseline_risk_score": 0.116,
"kyc_tier": "tier_1",
"session_entropy": 0.57
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 252,
"timestamp": "2026-01-05T23:14:00Z",
"transaction_amount_usd": 4256.71
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.738,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1811.24,
"financial_exposure_usd": 2014.53,
"recoverable_pct": 0.426
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108165",
"label": "benign",
"label_confidence": 0.542,
"severity": "medium",
"timestamp": "2026-01-06T16:05:00Z",
"trace_id": "a4705a3b-988a-ec53-a496-063f4edbd924"
} | {
"account_age_days": 1988,
"account_id": "ACCT-DB65EA99436C",
"baseline_risk_score": 0.064,
"kyc_tier": "tier_1",
"session_entropy": 0.589
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 141,
"timestamp": "2026-01-06T16:05:00Z",
"transaction_amount_usd": 6279.6
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.758,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1101.14,
"financial_exposure_usd": 2170.31,
"recoverable_pct": 0.452
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104291",
"label": "fraudulent",
"label_confidence": 0.767,
"severity": "medium",
"timestamp": "2026-01-03T23:31:00Z",
"trace_id": "37126f36-7077-fbe8-e284-9076f7beeac7"
} | {
"account_age_days": 697,
"account_id": "ACCT-827A1DB054B1",
"baseline_risk_score": 0.094,
"kyc_tier": "tier_1",
"session_entropy": 0.599
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 531,
"timestamp": "2026-01-03T23:31:00Z",
"transaction_amount_usd": 1041742.73
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.567,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3179224.95,
"financial_exposure_usd": 5221107.6,
"recoverable_pct": 0.908
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105757",
"label": "fraudulent",
"label_confidence": 0.631,
"severity": "medium",
"timestamp": "2026-01-04T23:57:00Z",
"trace_id": "176e56f7-a58c-693f-1b22-79f9fb1e0086"
} | {
"account_age_days": 1799,
"account_id": "ACCT-907242079D3A",
"baseline_risk_score": 0.338,
"kyc_tier": "tier_1",
"session_entropy": 0.248
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 384,
"timestamp": "2026-01-04T22:53:00Z",
"transaction_amount_usd": 12.94
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.682,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3288154.42,
"financial_exposure_usd": 4282519.34,
"recoverable_pct": 0.761
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100721",
"label": "fraudulent",
"label_confidence": 0.84,
"severity": "critical",
"timestamp": "2026-01-01T12:01:00Z",
"trace_id": "c3e0b5ac-b5f6-2122-83ff-578b0fe6c2a2"
} | {
"account_age_days": 554,
"account_id": "ACCT-FF57DBD7379F",
"baseline_risk_score": 0.511,
"kyc_tier": "tier_1",
"session_entropy": 0.431
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 224,
"timestamp": "2026-01-01T12:01:00Z",
"transaction_amount_usd": 109487.32
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.633,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 368627.69,
"financial_exposure_usd": 369716.3,
"recoverable_pct": 0.65
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100533",
"label": "fraudulent",
"label_confidence": 0.806,
"severity": "critical",
"timestamp": "2026-01-01T08:53:00Z",
"trace_id": "c18f8d47-c4df-0d2f-058b-c7ea46f8aa1d"
} | {
"account_age_days": 1088,
"account_id": "ACCT-A8CEE611604F",
"baseline_risk_score": 0.262,
"kyc_tier": "tier_3",
"session_entropy": 0.46
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 684,
"timestamp": "2026-01-01T08:53:00Z",
"transaction_amount_usd": 91297.82
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.875,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 830399.65,
"financial_exposure_usd": 1092011.05,
"recoverable_pct": 0.689
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100797",
"label": "fraudulent",
"label_confidence": 0.78,
"severity": "medium",
"timestamp": "2026-01-01T13:17:00Z",
"trace_id": "2bba4145-7213-ccdf-3101-fa67c9e9835e"
} | {
"account_age_days": 15,
"account_id": "ACCT-4FAFD0963CA5",
"baseline_risk_score": 0.398,
"kyc_tier": "tier_1",
"session_entropy": 0.565
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 365,
"timestamp": "2026-01-01T09:38:00Z",
"transaction_amount_usd": 1.9
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.857,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 2",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 287090.27,
"financial_exposure_usd": 357742.59,
"recoverable_pct": 0.041
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106130",
"label": "fraudulent",
"label_confidence": 0.878,
"severity": "critical",
"timestamp": "2026-01-05T06:10:00Z",
"trace_id": "c1a766d8-409e-07eb-5970-b8a79c436735"
} | {
"account_age_days": 534,
"account_id": "ACCT-0053B7D3C497",
"baseline_risk_score": 0.327,
"kyc_tier": "tier_3",
"session_entropy": 0.883
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 577,
"timestamp": "2026-01-05T06:10:00Z",
"transaction_amount_usd": 1425790.73
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.642,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2413129.99,
"financial_exposure_usd": 3768834.49,
"recoverable_pct": 0.658
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104428",
"label": "fraudulent",
"label_confidence": 0.85,
"severity": "low",
"timestamp": "2026-01-04T01:48:00Z",
"trace_id": "91c6c7a3-584d-af04-6e73-7dc3952b9774"
} | {
"account_age_days": 1145,
"account_id": "ACCT-F38E559EEA45",
"baseline_risk_score": 0.396,
"kyc_tier": "tier_2",
"session_entropy": 0.881
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 163,
"timestamp": "2026-01-03T21:20:00Z",
"transaction_amount_usd": 9.29
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.37,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 1633449.15,
"financial_exposure_usd": 1908342.04,
"recoverable_pct": 0.469
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100057",
"label": "fraudulent",
"label_confidence": 0.856,
"severity": "high",
"timestamp": "2026-01-01T00:57:00Z",
"trace_id": "9c81fc46-5bcd-236c-c777-4fae613758c3"
} | {
"account_age_days": 918,
"account_id": "ACCT-1688782F72B6",
"baseline_risk_score": 0.344,
"kyc_tier": "tier_2",
"session_entropy": 0.828
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "FR",
"latency_ms": 1079,
"timestamp": "2026-01-01T00:57:00Z",
"transaction_amount_usd": 105654.05
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.938,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 285031.8,
"financial_exposure_usd": 617505.31,
"recoverable_pct": 0.35
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104201",
"label": "fraudulent",
"label_confidence": 0.759,
"severity": "low",
"timestamp": "2026-01-03T22:01:00Z",
"trace_id": "93d84d70-913e-7bdf-a74d-4c30adfdbced"
} | {
"account_age_days": 541,
"account_id": "ACCT-6211769D7011",
"baseline_risk_score": 0.434,
"kyc_tier": "tier_2",
"session_entropy": 0.876
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 229,
"timestamp": "2026-01-03T22:01:00Z",
"transaction_amount_usd": 747340.76
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.894,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1238411.27,
"financial_exposure_usd": 2482589.23,
"recoverable_pct": 0.581
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105695",
"label": "fraudulent",
"label_confidence": 0.902,
"severity": "low",
"timestamp": "2026-01-04T22:55:00Z",
"trace_id": "d0917a08-0850-a49b-31f4-e3817898d34c"
} | {
"account_age_days": 300,
"account_id": "ACCT-2EEBAD1EA746",
"baseline_risk_score": 0.354,
"kyc_tier": "tier_1",
"session_entropy": 0.807
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 290,
"timestamp": "2026-01-04T14:39:00Z",
"transaction_amount_usd": 2.34
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.489,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1039379.52,
"financial_exposure_usd": 2528923.24,
"recoverable_pct": 0.941
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109771",
"label": "benign",
"label_confidence": 0.523,
"severity": "high",
"timestamp": "2026-01-07T18:51:00Z",
"trace_id": "38ed8f77-674b-6298-acde-e253ed7dd7ff"
} | {
"account_age_days": 1993,
"account_id": "ACCT-C4F0B1139CCB",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.704
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 168,
"timestamp": "2026-01-07T10:50:00Z",
"transaction_amount_usd": 6.55
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.727,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2010.92,
"financial_exposure_usd": 4452.04,
"recoverable_pct": 0.615
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108946",
"label": "benign",
"label_confidence": 0.7,
"severity": "high",
"timestamp": "2026-01-07T05:06:00Z",
"trace_id": "b60cb11d-a846-80d4-b8ca-89b83c85c20e"
} | {
"account_age_days": 1978,
"account_id": "ACCT-B7745DBBF6E1",
"baseline_risk_score": 0.095,
"kyc_tier": "tier_2",
"session_entropy": 0.778
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 406,
"timestamp": "2026-01-07T05:06:00Z",
"transaction_amount_usd": 12410.47
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.47,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1816.05,
"financial_exposure_usd": 2209.47,
"recoverable_pct": 0.663
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101132",
"label": "fraudulent",
"label_confidence": 0.919,
"severity": "critical",
"timestamp": "2026-01-01T18:52:00Z",
"trace_id": "1d49b708-e968-21b4-294c-98295d0e1713"
} | {
"account_age_days": 1851,
"account_id": "ACCT-4279C4C7E479",
"baseline_risk_score": 0.527,
"kyc_tier": "tier_1",
"session_entropy": 0.644
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 136,
"timestamp": "2026-01-01T11:44:00Z",
"transaction_amount_usd": 24.28
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.5,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 653541.99,
"financial_exposure_usd": 881912.42,
"recoverable_pct": 0.606
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100186",
"label": "fraudulent",
"label_confidence": 0.87,
"severity": "high",
"timestamp": "2026-01-01T03:06:00Z",
"trace_id": "754f595f-12f6-38e6-b197-603ca45c7178"
} | {
"account_age_days": 1786,
"account_id": "ACCT-7C39115FED13",
"baseline_risk_score": 0.45,
"kyc_tier": "tier_3",
"session_entropy": 0.651
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 1002,
"timestamp": "2026-01-01T03:06:00Z",
"transaction_amount_usd": 90959.18
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.455,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 165066.26,
"financial_exposure_usd": 404039.85,
"recoverable_pct": 0.805
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103256",
"label": "fraudulent",
"label_confidence": 0.831,
"severity": "critical",
"timestamp": "2026-01-03T06:16:00Z",
"trace_id": "5f267737-1f61-c374-0e96-db117480b47a"
} | {
"account_age_days": 1909,
"account_id": "ACCT-3F1D840513D4",
"baseline_risk_score": 0.506,
"kyc_tier": "tier_2",
"session_entropy": 0.773
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 374,
"timestamp": "2026-01-02T23:56:00Z",
"transaction_amount_usd": 24.88
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.489,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 557526.41,
"financial_exposure_usd": 569594.12,
"recoverable_pct": 0.09
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102966",
"label": "fraudulent",
"label_confidence": 0.967,
"severity": "low",
"timestamp": "2026-01-03T01:26:00Z",
"trace_id": "955738c1-4078-1d4c-e3ee-d62e7fd92c6b"
} | {
"account_age_days": 1999,
"account_id": "ACCT-CFA3017027B3",
"baseline_risk_score": 0.416,
"kyc_tier": "tier_2",
"session_entropy": 0.315
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 430,
"timestamp": "2026-01-03T01:26:00Z",
"transaction_amount_usd": 112699.62
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.718,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 360568.11,
"financial_exposure_usd": 674523.48,
"recoverable_pct": 0.769
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103999",
"label": "fraudulent",
"label_confidence": 0.629,
"severity": "high",
"timestamp": "2026-01-03T18:39:00Z",
"trace_id": "f42c2c4c-841c-ff16-aaa9-c1c5c49ffbe0"
} | {
"account_age_days": 380,
"account_id": "ACCT-8940E6CE239C",
"baseline_risk_score": 0.103,
"kyc_tier": "tier_3",
"session_entropy": 0.9
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 383,
"timestamp": "2026-01-03T18:39:00Z",
"transaction_amount_usd": 833502.67
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.862,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3938324.14,
"financial_exposure_usd": 9144209.93,
"recoverable_pct": 0.626
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108113",
"label": "benign",
"label_confidence": 0.557,
"severity": "low",
"timestamp": "2026-01-06T15:13:00Z",
"trace_id": "afd94fc4-404b-1cb8-718c-c64df348eb59"
} | {
"account_age_days": 400,
"account_id": "ACCT-E879E8AAB01D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.836
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 106,
"timestamp": "2026-01-06T05:08:00Z",
"transaction_amount_usd": 2.43
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.796,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1818.96,
"financial_exposure_usd": 2296.07,
"recoverable_pct": 0.873
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103484",
"label": "fraudulent",
"label_confidence": 0.705,
"severity": "high",
"timestamp": "2026-01-03T10:04:00Z",
"trace_id": "b11b23cd-cbf9-d785-fcc8-6394910aaca9"
} | {
"account_age_days": 817,
"account_id": "ACCT-2063868576A1",
"baseline_risk_score": 0.308,
"kyc_tier": "tier_2",
"session_entropy": 0.3
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 143,
"timestamp": "2026-01-03T10:04:00Z",
"transaction_amount_usd": 2808150.12
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.692,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3367894.82,
"financial_exposure_usd": 4359236.87,
"recoverable_pct": 0.529
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108562",
"label": "benign",
"label_confidence": 0.689,
"severity": "low",
"timestamp": "2026-01-06T22:42:00Z",
"trace_id": "72d1a886-24f7-4624-bdec-7d7be269b071"
} | {
"account_age_days": 756,
"account_id": "ACCT-7E447C9C1B65",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.454
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 676,
"timestamp": "2026-01-06T22:42:00Z",
"transaction_amount_usd": 10019.3
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.544,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1897.3,
"financial_exposure_usd": 2274.74,
"recoverable_pct": 0.745
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108969",
"label": "benign",
"label_confidence": 0.621,
"severity": "low",
"timestamp": "2026-01-07T05:29:00Z",
"trace_id": "c2212ec2-4871-8473-09a5-f3f920ad3ff5"
} | {
"account_age_days": 1102,
"account_id": "ACCT-31389EA1A063",
"baseline_risk_score": 0.079,
"kyc_tier": "tier_1",
"session_entropy": 0.142
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 254,
"timestamp": "2026-01-07T05:29:00Z",
"transaction_amount_usd": 8044.39
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.459,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 5424.2,
"financial_exposure_usd": 5636.67,
"recoverable_pct": 0.803
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102279",
"label": "fraudulent",
"label_confidence": 0.932,
"severity": "medium",
"timestamp": "2026-01-02T13:59:00Z",
"trace_id": "b803b89b-998c-522e-fbd5-1ab07043ee49"
} | {
"account_age_days": 774,
"account_id": "ACCT-EE26AD7CCEE2",
"baseline_risk_score": 0.467,
"kyc_tier": "tier_2",
"session_entropy": 0.77
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 426,
"timestamp": "2026-01-02T13:59:00Z",
"transaction_amount_usd": 31123.99
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.513,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 860213.63,
"financial_exposure_usd": 1105086.94,
"recoverable_pct": 0.693
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103338",
"label": "fraudulent",
"label_confidence": 0.779,
"severity": "high",
"timestamp": "2026-01-03T07:38:00Z",
"trace_id": "bb089346-2951-0b9b-7740-f39ae268b30e"
} | {
"account_age_days": 228,
"account_id": "ACCT-3116F4A73470",
"baseline_risk_score": 0.282,
"kyc_tier": "tier_2",
"session_entropy": 0.255
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 265,
"timestamp": "2026-01-03T03:39:00Z",
"transaction_amount_usd": 5.72
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.91,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 9",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 1958619,
"financial_exposure_usd": 2995291.08,
"recoverable_pct": 0.747
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109491",
"label": "benign",
"label_confidence": 0.683,
"severity": "medium",
"timestamp": "2026-01-07T14:11:00Z",
"trace_id": "5bf98839-210c-e2a9-d8a4-9b186d3dbba4"
} | {
"account_age_days": 903,
"account_id": "ACCT-B502E5A7CE8A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.593
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 227,
"timestamp": "2026-01-07T10:06:00Z",
"transaction_amount_usd": 12.56
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.65,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 174.33,
"financial_exposure_usd": 184.43,
"recoverable_pct": 0.438
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109787",
"label": "benign",
"label_confidence": 0.469,
"severity": "medium",
"timestamp": "2026-01-07T19:07:00Z",
"trace_id": "95feb544-c0b2-bc1b-9d9a-9a7f68d3758d"
} | {
"account_age_days": 1851,
"account_id": "ACCT-FA9DE37F0A98",
"baseline_risk_score": 0.068,
"kyc_tier": "tier_1",
"session_entropy": 0.26
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 166,
"timestamp": "2026-01-07T19:07:00Z",
"transaction_amount_usd": 459.7
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.542,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2998.78,
"financial_exposure_usd": 3092.59,
"recoverable_pct": 0.419
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106432",
"label": "fraudulent",
"label_confidence": 0.704,
"severity": "medium",
"timestamp": "2026-01-05T11:12:00Z",
"trace_id": "532eeb17-58c9-faeb-75d2-df0b77353c55"
} | {
"account_age_days": 1609,
"account_id": "ACCT-8DFBEC7312A0",
"baseline_risk_score": 0.161,
"kyc_tier": "tier_1",
"session_entropy": 0.227
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 956,
"timestamp": "2026-01-05T11:12:00Z",
"transaction_amount_usd": 2048224.16
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.689,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3039152.13,
"financial_exposure_usd": 6040037.4,
"recoverable_pct": 0.883
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102650",
"label": "fraudulent",
"label_confidence": 0.941,
"severity": "critical",
"timestamp": "2026-01-02T20:10:00Z",
"trace_id": "a992e2ec-2b81-7084-4df6-3747f6b17986"
} | {
"account_age_days": 1854,
"account_id": "ACCT-90164AD3F065",
"baseline_risk_score": 0.288,
"kyc_tier": "tier_2",
"session_entropy": 0.237
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 198,
"timestamp": "2026-01-02T20:10:00Z",
"transaction_amount_usd": 81874.94
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.387,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 546930.74,
"financial_exposure_usd": 739579.23,
"recoverable_pct": 0.302
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102798",
"label": "fraudulent",
"label_confidence": 0.948,
"severity": "high",
"timestamp": "2026-01-02T22:38:00Z",
"trace_id": "d4d42607-08ec-a946-0292-baa248df6080"
} | {
"account_age_days": 997,
"account_id": "ACCT-3A7902C8907C",
"baseline_risk_score": 0.53,
"kyc_tier": "tier_1",
"session_entropy": 0.102
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 159,
"timestamp": "2026-01-02T22:38:00Z",
"transaction_amount_usd": 81151.95
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.907,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 668278.72,
"financial_exposure_usd": 1327928.86,
"recoverable_pct": 0.11
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.