schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108613",
"label": "benign",
"label_confidence": 0.536,
"severity": "low",
"timestamp": "2026-01-06T23:33:00Z",
"trace_id": "db94d9b9-4bf5-e7ef-cfad-ed667f9609b3"
} | {
"account_age_days": 1244,
"account_id": "ACCT-D1504E71E5C6",
"baseline_risk_score": 0.108,
"kyc_tier": "tier_1",
"session_entropy": 0.505
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 582,
"timestamp": "2026-01-06T23:33:00Z",
"transaction_amount_usd": 10304.3
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.572,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 5717.91,
"financial_exposure_usd": 6047.2,
"recoverable_pct": 0.594
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100866",
"label": "fraudulent",
"label_confidence": 0.942,
"severity": "high",
"timestamp": "2026-01-01T14:26:00Z",
"trace_id": "ad27874d-acac-b625-3817-ab0422b350c3"
} | {
"account_age_days": 1071,
"account_id": "ACCT-9726DADE9F37",
"baseline_risk_score": 0.303,
"kyc_tier": "tier_1",
"session_entropy": 0.222
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 1172,
"timestamp": "2026-01-01T14:26:00Z",
"transaction_amount_usd": 1660.02
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.856,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 552657.95,
"financial_exposure_usd": 1049884.85,
"recoverable_pct": 0.491
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104581",
"label": "fraudulent",
"label_confidence": 0.658,
"severity": "high",
"timestamp": "2026-01-04T04:21:00Z",
"trace_id": "b2619ec4-962f-d441-cf39-991eab34f0ff"
} | {
"account_age_days": 1964,
"account_id": "ACCT-830F8ADA4707",
"baseline_risk_score": 0.448,
"kyc_tier": "tier_2",
"session_entropy": 0.537
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 646,
"timestamp": "2026-01-04T04:21:00Z",
"transaction_amount_usd": 97103.91
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.55,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 1539935.61,
"financial_exposure_usd": 1569442.59,
"recoverable_pct": 0.527
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101239",
"label": "fraudulent",
"label_confidence": 0.842,
"severity": "critical",
"timestamp": "2026-01-01T20:39:00Z",
"trace_id": "11206312-ff26-888f-cfe9-350c2351b354"
} | {
"account_age_days": 1250,
"account_id": "ACCT-4BFA28E0515C",
"baseline_risk_score": 0.605,
"kyc_tier": "tier_1",
"session_entropy": 0.947
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 885,
"timestamp": "2026-01-01T20:39:00Z",
"transaction_amount_usd": 105635.15
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.869,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 290301.27,
"financial_exposure_usd": 319160.26,
"recoverable_pct": 0.225
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100422",
"label": "fraudulent",
"label_confidence": 0.979,
"severity": "high",
"timestamp": "2026-01-01T07:02:00Z",
"trace_id": "c7df6600-9aa0-bf74-4e8b-afc4cb208d25"
} | {
"account_age_days": 1320,
"account_id": "ACCT-1F8178D21C1B",
"baseline_risk_score": 0.437,
"kyc_tier": "tier_2",
"session_entropy": 0.907
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 444,
"timestamp": "2026-01-01T07:02:00Z",
"transaction_amount_usd": 80826.03
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.623,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 721891.71,
"financial_exposure_usd": 839506.73,
"recoverable_pct": 0.522
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100490",
"label": "fraudulent",
"label_confidence": 0.886,
"severity": "high",
"timestamp": "2026-01-01T08:10:00Z",
"trace_id": "1f643c0d-4d7d-9c5e-d41b-b559c9af2794"
} | {
"account_age_days": 169,
"account_id": "ACCT-696AB0C0938E",
"baseline_risk_score": 0.546,
"kyc_tier": "tier_3",
"session_entropy": 0.552
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 931,
"timestamp": "2026-01-01T08:10:00Z",
"transaction_amount_usd": 26982.5
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.827,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 249694.79,
"financial_exposure_usd": 559751.2,
"recoverable_pct": 0.007
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105410",
"label": "fraudulent",
"label_confidence": 0.602,
"severity": "high",
"timestamp": "2026-01-04T18:10:00Z",
"trace_id": "a5ae145e-aaf0-342f-faa0-67c9c6e0acc1"
} | {
"account_age_days": 1505,
"account_id": "ACCT-661491DDF870",
"baseline_risk_score": 0.086,
"kyc_tier": "tier_3",
"session_entropy": 0.799
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 745,
"timestamp": "2026-01-04T18:10:00Z",
"transaction_amount_usd": 2033739.68
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.799,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1564381.26,
"financial_exposure_usd": 1964048.24,
"recoverable_pct": 0.543
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106672",
"label": "benign",
"label_confidence": 0.67,
"severity": "low",
"timestamp": "2026-01-05T15:12:00Z",
"trace_id": "03df41e1-b4fd-9054-bc22-0db71aa8bd09"
} | {
"account_age_days": 1646,
"account_id": "ACCT-EAC68AD46442",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.421
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 655,
"timestamp": "2026-01-05T15:12:00Z",
"transaction_amount_usd": 6595.37
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.617,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2403.6,
"financial_exposure_usd": 3409.03,
"recoverable_pct": 0.466
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106292",
"label": "fraudulent",
"label_confidence": 0.789,
"severity": "medium",
"timestamp": "2026-01-05T08:52:00Z",
"trace_id": "7b9ae75a-5730-70ad-222b-199ad7cedc20"
} | {
"account_age_days": 395,
"account_id": "ACCT-48A2FBE52102",
"baseline_risk_score": 0.234,
"kyc_tier": "tier_1",
"session_entropy": 0.184
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 1031,
"timestamp": "2026-01-05T08:52:00Z",
"transaction_amount_usd": 1559573.89
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.395,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4153139.78,
"financial_exposure_usd": 4895102.34,
"recoverable_pct": 0.786
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107719",
"label": "benign",
"label_confidence": 0.723,
"severity": "high",
"timestamp": "2026-01-06T08:39:00Z",
"trace_id": "fad5031d-6617-9a9e-7312-274b416f5097"
} | {
"account_age_days": 819,
"account_id": "ACCT-EFE0D721087F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.826
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 210,
"timestamp": "2026-01-05T22:25:00Z",
"transaction_amount_usd": 10.47
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.713,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1977.51,
"financial_exposure_usd": 2807.45,
"recoverable_pct": 0.94
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105966",
"label": "fraudulent",
"label_confidence": 0.82,
"severity": "low",
"timestamp": "2026-01-05T03:26:00Z",
"trace_id": "e378ed7a-1bc3-e3ae-eabc-ec94a3948b16"
} | {
"account_age_days": 1334,
"account_id": "ACCT-6BB90F6E8918",
"baseline_risk_score": 0.09,
"kyc_tier": "tier_3",
"session_entropy": 0.293
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 752,
"timestamp": "2026-01-05T03:26:00Z",
"transaction_amount_usd": 225825.34
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.535,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3494493.97,
"financial_exposure_usd": 8373235.27,
"recoverable_pct": 0.696
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107002",
"label": "benign",
"label_confidence": 0.596,
"severity": "critical",
"timestamp": "2026-01-05T20:42:00Z",
"trace_id": "409b1012-4619-f9ee-d03d-9c2113a3b121"
} | {
"account_age_days": 1075,
"account_id": "ACCT-2078F83A79E8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.177
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 1138,
"timestamp": "2026-01-05T20:42:00Z",
"transaction_amount_usd": 1349.48
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.566,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1263.26,
"financial_exposure_usd": 2957.07,
"recoverable_pct": 0.793
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108269",
"label": "benign",
"label_confidence": 0.747,
"severity": "medium",
"timestamp": "2026-01-06T17:49:00Z",
"trace_id": "688b04ad-db58-e422-539d-ea2710599917"
} | {
"account_age_days": 687,
"account_id": "ACCT-EF8D30626CF2",
"baseline_risk_score": 0.101,
"kyc_tier": "tier_2",
"session_entropy": 0.874
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 707,
"timestamp": "2026-01-06T17:49:00Z",
"transaction_amount_usd": 13277.64
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.751,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1478.76,
"financial_exposure_usd": 1527.29,
"recoverable_pct": 0.903
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101922",
"label": "fraudulent",
"label_confidence": 0.829,
"severity": "critical",
"timestamp": "2026-01-02T08:02:00Z",
"trace_id": "0cd46c71-9fc0-a7ad-c29c-d2df943b8a5f"
} | {
"account_age_days": 1036,
"account_id": "ACCT-E2D75BB36F88",
"baseline_risk_score": 0.458,
"kyc_tier": "tier_1",
"session_entropy": 0.692
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 263,
"timestamp": "2026-01-02T08:02:00Z",
"transaction_amount_usd": 20484.94
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.636,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 565643.96,
"financial_exposure_usd": 718156.39,
"recoverable_pct": 0.103
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103115",
"label": "fraudulent",
"label_confidence": 0.844,
"severity": "critical",
"timestamp": "2026-01-03T03:55:00Z",
"trace_id": "15ecc620-4321-ac28-6734-6ec9357f9e76"
} | {
"account_age_days": 749,
"account_id": "ACCT-A4A8228C246B",
"baseline_risk_score": 0.264,
"kyc_tier": "tier_1",
"session_entropy": 0.118
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "SG",
"latency_ms": 134,
"timestamp": "2026-01-03T03:55:00Z",
"transaction_amount_usd": 9960.35
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.785,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 316012.45,
"financial_exposure_usd": 529822.86,
"recoverable_pct": 0.693
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108823",
"label": "benign",
"label_confidence": 0.748,
"severity": "high",
"timestamp": "2026-01-07T03:03:00Z",
"trace_id": "904062ba-a572-aab4-300d-04e7c171d7c9"
} | {
"account_age_days": 953,
"account_id": "ACCT-1D8135C797FB",
"baseline_risk_score": 0.07,
"kyc_tier": "tier_3",
"session_entropy": 0.645
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 1113,
"timestamp": "2026-01-07T03:03:00Z",
"transaction_amount_usd": 14429.57
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.641,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 7416.4,
"financial_exposure_usd": 7537.8,
"recoverable_pct": 0.621
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104013",
"label": "fraudulent",
"label_confidence": 0.929,
"severity": "medium",
"timestamp": "2026-01-03T18:53:00Z",
"trace_id": "956f4b4b-21ea-37e6-7b6f-440f452aad2f"
} | {
"account_age_days": 586,
"account_id": "ACCT-670ED99BFECF",
"baseline_risk_score": 0.394,
"kyc_tier": "tier_2",
"session_entropy": 0.888
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 463,
"timestamp": "2026-01-03T18:53:00Z",
"transaction_amount_usd": 340252.47
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.595,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2563948.53,
"financial_exposure_usd": 5331424.03,
"recoverable_pct": 0.582
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101670",
"label": "fraudulent",
"label_confidence": 0.948,
"severity": "medium",
"timestamp": "2026-01-02T03:50:00Z",
"trace_id": "e9c5ad26-5666-4ac6-c4c5-7a2b4f33d0c2"
} | {
"account_age_days": 302,
"account_id": "ACCT-A436791FE96F",
"baseline_risk_score": 0.273,
"kyc_tier": "tier_1",
"session_entropy": 0.27
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 659,
"timestamp": "2026-01-02T03:50:00Z",
"transaction_amount_usd": 94603.05
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.705,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 747339.49,
"financial_exposure_usd": 956205.05,
"recoverable_pct": 0.561
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101097",
"label": "fraudulent",
"label_confidence": 0.801,
"severity": "medium",
"timestamp": "2026-01-01T18:17:00Z",
"trace_id": "e11c8093-6ca5-c007-eb0d-14b3d8038a91"
} | {
"account_age_days": 63,
"account_id": "ACCT-252855EEC50C",
"baseline_risk_score": 0.514,
"kyc_tier": "tier_3",
"session_entropy": 0.225
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 567,
"timestamp": "2026-01-01T18:17:00Z",
"transaction_amount_usd": 52728.25
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.714,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 1003129.91,
"financial_exposure_usd": 1151954.7,
"recoverable_pct": 0.707
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102877",
"label": "fraudulent",
"label_confidence": 0.957,
"severity": "medium",
"timestamp": "2026-01-02T23:57:00Z",
"trace_id": "831a0521-c034-b6d4-1e2c-98f2e8f77108"
} | {
"account_age_days": 90,
"account_id": "ACCT-5200DD6257C2",
"baseline_risk_score": 0.441,
"kyc_tier": "tier_1",
"session_entropy": 0.811
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 337,
"timestamp": "2026-01-02T17:07:00Z",
"transaction_amount_usd": 21.1
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.778,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 199095.7,
"financial_exposure_usd": 461252.66,
"recoverable_pct": 0.559
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102801",
"label": "fraudulent",
"label_confidence": 0.813,
"severity": "high",
"timestamp": "2026-01-02T22:41:00Z",
"trace_id": "d55d65a6-1ff1-9e07-ca3a-9d86129378ad"
} | {
"account_age_days": 1370,
"account_id": "ACCT-06ECE166FA8B",
"baseline_risk_score": 0.55,
"kyc_tier": "tier_1",
"session_entropy": 0.784
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 207,
"timestamp": "2026-01-02T12:42:00Z",
"transaction_amount_usd": 24.87
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.94,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 327973.64,
"financial_exposure_usd": 565042.49,
"recoverable_pct": 0.509
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106252",
"label": "fraudulent",
"label_confidence": 0.736,
"severity": "low",
"timestamp": "2026-01-05T08:12:00Z",
"trace_id": "c0ac9055-1d60-183f-5c93-549778996bff"
} | {
"account_age_days": 1116,
"account_id": "ACCT-CD689AC880F5",
"baseline_risk_score": 0.343,
"kyc_tier": "tier_2",
"session_entropy": 0.564
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 124,
"timestamp": "2026-01-04T20:21:00Z",
"transaction_amount_usd": 13.36
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.626,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 9",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1802321.39,
"financial_exposure_usd": 2705305.43,
"recoverable_pct": 0.784
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109750",
"label": "benign",
"label_confidence": 0.465,
"severity": "medium",
"timestamp": "2026-01-07T18:30:00Z",
"trace_id": "72f49825-5287-6dd8-657d-ad520ac7fc4f"
} | {
"account_age_days": 106,
"account_id": "ACCT-1CFAFE1B99B4",
"baseline_risk_score": 0.127,
"kyc_tier": "tier_3",
"session_entropy": 0.275
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 429,
"timestamp": "2026-01-07T18:30:00Z",
"transaction_amount_usd": 1076.93
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.665,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2998.71,
"financial_exposure_usd": 5608.37,
"recoverable_pct": 0.957
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100492",
"label": "fraudulent",
"label_confidence": 0.774,
"severity": "high",
"timestamp": "2026-01-01T08:12:00Z",
"trace_id": "8ac34aa0-103f-b9f0-a4aa-131bd4dab805"
} | {
"account_age_days": 525,
"account_id": "ACCT-C4C82B2B8E8A",
"baseline_risk_score": 0.36,
"kyc_tier": "tier_3",
"session_entropy": 0.111
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 551,
"timestamp": "2026-01-01T08:12:00Z",
"transaction_amount_usd": 80233.44
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.854,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 825539.8,
"financial_exposure_usd": 1012838.87,
"recoverable_pct": 0.425
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100757",
"label": "fraudulent",
"label_confidence": 0.856,
"severity": "high",
"timestamp": "2026-01-01T12:37:00Z",
"trace_id": "29b471d3-4cb8-54e9-b751-61260437f076"
} | {
"account_age_days": 272,
"account_id": "ACCT-954134C768C3",
"baseline_risk_score": 0.314,
"kyc_tier": "tier_1",
"session_entropy": 0.626
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "MY",
"latency_ms": 913,
"timestamp": "2026-01-01T12:37:00Z",
"transaction_amount_usd": 108628.59
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.709,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 705975.72,
"financial_exposure_usd": 791119.87,
"recoverable_pct": 0.33
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102000",
"label": "fraudulent",
"label_confidence": 0.882,
"severity": "critical",
"timestamp": "2026-01-02T09:20:00Z",
"trace_id": "378c4a5f-fc0a-56ef-2c81-693cc4acded2"
} | {
"account_age_days": 1867,
"account_id": "ACCT-5DB8A419E4C2",
"baseline_risk_score": 0.348,
"kyc_tier": "tier_2",
"session_entropy": 0.275
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 159,
"timestamp": "2026-01-02T02:58:00Z",
"transaction_amount_usd": 7.01
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.904,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 379522.97,
"financial_exposure_usd": 854191.65,
"recoverable_pct": 0.815
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108699",
"label": "benign",
"label_confidence": 0.55,
"severity": "medium",
"timestamp": "2026-01-07T00:59:00Z",
"trace_id": "f0b25e29-95dd-9013-50d6-f27e52750ca6"
} | {
"account_age_days": 818,
"account_id": "ACCT-0AAE28A9D3B9",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.237
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 215,
"timestamp": "2026-01-06T16:18:00Z",
"transaction_amount_usd": 15.13
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.656,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2463.2,
"financial_exposure_usd": 3036.52,
"recoverable_pct": 0.704
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106113",
"label": "fraudulent",
"label_confidence": 0.726,
"severity": "medium",
"timestamp": "2026-01-05T05:53:00Z",
"trace_id": "1708478b-8e4b-5146-4488-5f4a11178314"
} | {
"account_age_days": 851,
"account_id": "ACCT-34BC7915D474",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.531
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 272,
"timestamp": "2026-01-05T04:32:00Z",
"transaction_amount_usd": 14.69
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.9,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND... | {
"customer_funds_at_risk_usd": 1526365.93,
"financial_exposure_usd": 1680791.05,
"recoverable_pct": 0.415
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108179",
"label": "benign",
"label_confidence": 0.511,
"severity": "medium",
"timestamp": "2026-01-06T16:19:00Z",
"trace_id": "1b3a68d4-7d49-3481-940e-b47c40841ff0"
} | {
"account_age_days": 320,
"account_id": "ACCT-2316EA72083F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.743
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 1149,
"timestamp": "2026-01-06T16:19:00Z",
"transaction_amount_usd": 12547.08
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.601,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 691.57,
"financial_exposure_usd": 1377.59,
"recoverable_pct": 0.683
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108494",
"label": "benign",
"label_confidence": 0.646,
"severity": "medium",
"timestamp": "2026-01-06T21:34:00Z",
"trace_id": "95d0fddc-c083-b07c-1225-7d2211eb37da"
} | {
"account_age_days": 1470,
"account_id": "ACCT-AD3B68D85096",
"baseline_risk_score": 0.182,
"kyc_tier": "tier_2",
"session_entropy": 0.342
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 239,
"timestamp": "2026-01-06T21:34:00Z",
"transaction_amount_usd": 12439.87
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.606,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 941.72,
"financial_exposure_usd": 2231,
"recoverable_pct": 0.501
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101157",
"label": "fraudulent",
"label_confidence": 0.978,
"severity": "critical",
"timestamp": "2026-01-01T19:17:00Z",
"trace_id": "98e4a330-105b-0193-19b5-5ba56b88c883"
} | {
"account_age_days": 1673,
"account_id": "ACCT-54B734533EB7",
"baseline_risk_score": 0.283,
"kyc_tier": "tier_1",
"session_entropy": 0.732
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 380,
"timestamp": "2026-01-01T13:31:00Z",
"transaction_amount_usd": 8.19
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.615,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 624362.82,
"financial_exposure_usd": 756127.95,
"recoverable_pct": 0.758
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108258",
"label": "benign",
"label_confidence": 0.696,
"severity": "low",
"timestamp": "2026-01-06T17:38:00Z",
"trace_id": "da13314a-eced-f32d-1075-42344972dcab"
} | {
"account_age_days": 205,
"account_id": "ACCT-CA2274C205EC",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.912
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 467,
"timestamp": "2026-01-06T17:38:00Z",
"transaction_amount_usd": 6009.9
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.509,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 450.8,
"financial_exposure_usd": 602.94,
"recoverable_pct": 0.828
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102647",
"label": "fraudulent",
"label_confidence": 0.814,
"severity": "critical",
"timestamp": "2026-01-02T20:07:00Z",
"trace_id": "68b27591-9e3a-8a51-f1b7-1e54f70d377e"
} | {
"account_age_days": 762,
"account_id": "ACCT-BA9A96C66A46",
"baseline_risk_score": 0.59,
"kyc_tier": "tier_1",
"session_entropy": 0.836
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 405,
"timestamp": "2026-01-02T20:07:00Z",
"transaction_amount_usd": 35204.76
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.357,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 733958.59,
"financial_exposure_usd": 1271438.97,
"recoverable_pct": 0.214
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101862",
"label": "fraudulent",
"label_confidence": 0.785,
"severity": "critical",
"timestamp": "2026-01-02T07:02:00Z",
"trace_id": "9f248a66-b0cd-648a-d330-7342e8afd491"
} | {
"account_age_days": 334,
"account_id": "ACCT-D67C04046F80",
"baseline_risk_score": 0.582,
"kyc_tier": "tier_2",
"session_entropy": 0.408
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 163,
"timestamp": "2026-01-01T21:57:00Z",
"transaction_amount_usd": 14.5
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.84,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 332875.66,
"financial_exposure_usd": 589622.46,
"recoverable_pct": 0.028
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106489",
"label": "fraudulent",
"label_confidence": 0.861,
"severity": "medium",
"timestamp": "2026-01-05T12:09:00Z",
"trace_id": "f0604ad1-184b-cd3d-ad89-5a00ea891df7"
} | {
"account_age_days": 616,
"account_id": "ACCT-DB48B2480750",
"baseline_risk_score": 0.268,
"kyc_tier": "tier_1",
"session_entropy": 0.179
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 839,
"timestamp": "2026-01-05T12:09:00Z",
"transaction_amount_usd": 2967496.07
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.718,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4289281.46,
"financial_exposure_usd": 4380879.1,
"recoverable_pct": 0.419
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100861",
"label": "fraudulent",
"label_confidence": 0.894,
"severity": "high",
"timestamp": "2026-01-01T14:21:00Z",
"trace_id": "14e80cd9-ce7e-8e4b-0ba2-58f02115d7c0"
} | {
"account_age_days": 359,
"account_id": "ACCT-7BD9BDA90062",
"baseline_risk_score": 0.425,
"kyc_tier": "tier_3",
"session_entropy": 0.759
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 721,
"timestamp": "2026-01-01T14:21:00Z",
"transaction_amount_usd": 37007.75
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.439,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 602678.6,
"financial_exposure_usd": 734549.13,
"recoverable_pct": 0.612
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102431",
"label": "fraudulent",
"label_confidence": 0.88,
"severity": "high",
"timestamp": "2026-01-02T16:31:00Z",
"trace_id": "4b058c25-9d65-5616-89eb-dae8cc16d5f9"
} | {
"account_age_days": 1143,
"account_id": "ACCT-CEDF6C6828D8",
"baseline_risk_score": 0.348,
"kyc_tier": "tier_3",
"session_entropy": 0.128
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 889,
"timestamp": "2026-01-02T16:31:00Z",
"transaction_amount_usd": 64722.86
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.748,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 819632.9,
"financial_exposure_usd": 1037347.95,
"recoverable_pct": 0.557
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105620",
"label": "fraudulent",
"label_confidence": 0.714,
"severity": "critical",
"timestamp": "2026-01-04T21:40:00Z",
"trace_id": "74019311-6d17-364c-2dfc-12866ea3851a"
} | {
"account_age_days": 701,
"account_id": "ACCT-B1BAF213F827",
"baseline_risk_score": 0.083,
"kyc_tier": "tier_2",
"session_entropy": 0.402
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 124,
"timestamp": "2026-01-04T20:25:00Z",
"transaction_amount_usd": 2.78
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.351,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 5931327.48,
"financial_exposure_usd": 8074294.8,
"recoverable_pct": 0.488
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103259",
"label": "fraudulent",
"label_confidence": 0.81,
"severity": "critical",
"timestamp": "2026-01-03T06:19:00Z",
"trace_id": "a25d69cd-606e-aab8-cbdc-2f71e4d5c0f3"
} | {
"account_age_days": 125,
"account_id": "ACCT-0694B8F15302",
"baseline_risk_score": 0.336,
"kyc_tier": "tier_2",
"session_entropy": 0.242
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 220,
"timestamp": "2026-01-03T01:18:00Z",
"transaction_amount_usd": 18.94
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.864,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 244194.99,
"financial_exposure_usd": 408758.46,
"recoverable_pct": 0.729
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109192",
"label": "benign",
"label_confidence": 0.631,
"severity": "low",
"timestamp": "2026-01-07T09:12:00Z",
"trace_id": "9f18ab3d-9cb9-93f8-94bf-3530437597b7"
} | {
"account_age_days": 586,
"account_id": "ACCT-AEE8F61B4448",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.561
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 949,
"timestamp": "2026-01-07T09:12:00Z",
"transaction_amount_usd": 2219.42
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.459,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1005.93,
"financial_exposure_usd": 2092.14,
"recoverable_pct": 0.589
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100316",
"label": "fraudulent",
"label_confidence": 0.803,
"severity": "medium",
"timestamp": "2026-01-01T05:16:00Z",
"trace_id": "045b44d9-bafd-2834-aa10-ce87efbfb921"
} | {
"account_age_days": 1159,
"account_id": "ACCT-F9F6C49C8EB7",
"baseline_risk_score": 0.454,
"kyc_tier": "tier_1",
"session_entropy": 0.175
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 395,
"timestamp": "2025-12-31T19:00:00Z",
"transaction_amount_usd": 22.08
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.37,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 360062.81,
"financial_exposure_usd": 466507.3,
"recoverable_pct": 0.482
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101126",
"label": "fraudulent",
"label_confidence": 0.786,
"severity": "high",
"timestamp": "2026-01-01T18:46:00Z",
"trace_id": "2a8045cd-5321-e9ed-3070-0a49edac8909"
} | {
"account_age_days": 182,
"account_id": "ACCT-81DCAB6D540F",
"baseline_risk_score": 0.622,
"kyc_tier": "tier_3",
"session_entropy": 0.283
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 122,
"timestamp": "2026-01-01T11:03:00Z",
"transaction_amount_usd": 23.91
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.453,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 121470.39,
"financial_exposure_usd": 199002.31,
"recoverable_pct": 0.022
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101115",
"label": "fraudulent",
"label_confidence": 0.953,
"severity": "critical",
"timestamp": "2026-01-01T18:35:00Z",
"trace_id": "9a5befa1-35fd-fb43-80ad-2d72f3d5a982"
} | {
"account_age_days": 1588,
"account_id": "ACCT-63D61FBA7385",
"baseline_risk_score": 0.371,
"kyc_tier": "tier_3",
"session_entropy": 0.124
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 251,
"timestamp": "2026-01-01T09:22:00Z",
"transaction_amount_usd": 5.32
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.462,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 639952.42,
"financial_exposure_usd": 931954.03,
"recoverable_pct": 0.485
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102588",
"label": "fraudulent",
"label_confidence": 0.938,
"severity": "medium",
"timestamp": "2026-01-02T19:08:00Z",
"trace_id": "686e49fd-faef-f930-81e3-738f256b4859"
} | {
"account_age_days": 298,
"account_id": "ACCT-766155BAAB25",
"baseline_risk_score": 0.414,
"kyc_tier": "tier_2",
"session_entropy": 0.356
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 808,
"timestamp": "2026-01-02T19:08:00Z",
"transaction_amount_usd": 49258.75
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.647,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 713982.5,
"financial_exposure_usd": 863991.67,
"recoverable_pct": 0.837
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107247",
"label": "benign",
"label_confidence": 0.645,
"severity": "medium",
"timestamp": "2026-01-06T00:47:00Z",
"trace_id": "3b8f34c9-4b51-2fa4-c167-7c458b0b4b95"
} | {
"account_age_days": 641,
"account_id": "ACCT-22EDBCB24A0F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.309
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 827,
"timestamp": "2026-01-06T00:47:00Z",
"transaction_amount_usd": 2325.13
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.789,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2622.11,
"financial_exposure_usd": 3557.56,
"recoverable_pct": 0.537
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103360",
"label": "fraudulent",
"label_confidence": 0.754,
"severity": "high",
"timestamp": "2026-01-03T08:00:00Z",
"trace_id": "c069188c-98d2-ad01-2892-df0cad4cb0b7"
} | {
"account_age_days": 173,
"account_id": "ACCT-52C757779A55",
"baseline_risk_score": 0.347,
"kyc_tier": "tier_2",
"session_entropy": 0.829
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 541,
"timestamp": "2026-01-03T08:00:00Z",
"transaction_amount_usd": 2050855.82
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.464,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2574355.42,
"financial_exposure_usd": 3266245.06,
"recoverable_pct": 0.61
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105288",
"label": "fraudulent",
"label_confidence": 0.931,
"severity": "high",
"timestamp": "2026-01-04T16:08:00Z",
"trace_id": "21ad784b-573a-d1dd-f6fe-368e45a236a2"
} | {
"account_age_days": 1544,
"account_id": "ACCT-409097344037",
"baseline_risk_score": 0.066,
"kyc_tier": "tier_3",
"session_entropy": 0.352
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 749,
"timestamp": "2026-01-04T16:08:00Z",
"transaction_amount_usd": 2809747.65
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.453,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2579900.84,
"financial_exposure_usd": 5249918.94,
"recoverable_pct": 0.743
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106265",
"label": "fraudulent",
"label_confidence": 0.741,
"severity": "medium",
"timestamp": "2026-01-05T08:25:00Z",
"trace_id": "0d4eb8d3-651f-b55b-c2f4-cf26d00f4d71"
} | {
"account_age_days": 148,
"account_id": "ACCT-9260B461755D",
"baseline_risk_score": 0.342,
"kyc_tier": "tier_2",
"session_entropy": 0.515
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 274,
"timestamp": "2026-01-05T00:25:00Z",
"transaction_amount_usd": 4.84
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.352,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2540477.77,
"financial_exposure_usd": 5634173.66,
"recoverable_pct": 0.536
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102908",
"label": "fraudulent",
"label_confidence": 0.774,
"severity": "medium",
"timestamp": "2026-01-03T00:28:00Z",
"trace_id": "badf3a17-8454-9e15-35b2-79c6fe05c0fe"
} | {
"account_age_days": 1959,
"account_id": "ACCT-A41904F43BDF",
"baseline_risk_score": 0.549,
"kyc_tier": "tier_2",
"session_entropy": 0.15
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 1199,
"timestamp": "2026-01-03T00:28:00Z",
"transaction_amount_usd": 12849.07
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.659,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 440618.8,
"financial_exposure_usd": 1006839.15,
"recoverable_pct": 0.772
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100295",
"label": "fraudulent",
"label_confidence": 0.851,
"severity": "medium",
"timestamp": "2026-01-01T04:55:00Z",
"trace_id": "fd135ac5-e6cf-af54-ca9d-c28c8d5af123"
} | {
"account_age_days": 1607,
"account_id": "ACCT-AB9A95851F73",
"baseline_risk_score": 0.413,
"kyc_tier": "tier_2",
"session_entropy": 0.866
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 182,
"timestamp": "2026-01-01T04:55:00Z",
"transaction_amount_usd": 85087.65
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.91,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 1057577.02,
"financial_exposure_usd": 1596285.44,
"recoverable_pct": 0.363
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102296",
"label": "fraudulent",
"label_confidence": 0.786,
"severity": "critical",
"timestamp": "2026-01-02T14:16:00Z",
"trace_id": "1451bd5f-39ca-15fb-ef76-c9da2d28a8ef"
} | {
"account_age_days": 1014,
"account_id": "ACCT-27D4869BCD6B",
"baseline_risk_score": 0.457,
"kyc_tier": "tier_1",
"session_entropy": 0.709
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 122,
"timestamp": "2026-01-02T14:16:00Z",
"transaction_amount_usd": 51497.5
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.405,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 456747.17,
"financial_exposure_usd": 784633.66,
"recoverable_pct": 0.619
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105908",
"label": "fraudulent",
"label_confidence": 0.787,
"severity": "low",
"timestamp": "2026-01-05T02:28:00Z",
"trace_id": "9baf6a39-3fb5-a6d7-2f8b-f794878e0fed"
} | {
"account_age_days": 1332,
"account_id": "ACCT-9968F95193F3",
"baseline_risk_score": 0.272,
"kyc_tier": "tier_2",
"session_entropy": 0.129
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 288,
"timestamp": "2026-01-05T00:03:00Z",
"transaction_amount_usd": 11.3
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.358,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2487461.47,
"financial_exposure_usd": 6155545.57,
"recoverable_pct": 0.955
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100707",
"label": "fraudulent",
"label_confidence": 0.942,
"severity": "medium",
"timestamp": "2026-01-01T11:47:00Z",
"trace_id": "d905be03-bd2e-54df-19c9-72aed8869323"
} | {
"account_age_days": 474,
"account_id": "ACCT-EE98F932B6D2",
"baseline_risk_score": 0.506,
"kyc_tier": "tier_1",
"session_entropy": 0.298
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 266,
"timestamp": "2026-01-01T11:47:00Z",
"transaction_amount_usd": 29440.48
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.544,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 203681.04,
"financial_exposure_usd": 433415.08,
"recoverable_pct": 0.8
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105458",
"label": "fraudulent",
"label_confidence": 0.771,
"severity": "medium",
"timestamp": "2026-01-04T18:58:00Z",
"trace_id": "68c3814b-38f2-4cbe-bc2b-8a141409c169"
} | {
"account_age_days": 1361,
"account_id": "ACCT-7F1981640F98",
"baseline_risk_score": 0.051,
"kyc_tier": "tier_1",
"session_entropy": 0.194
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 393,
"timestamp": "2026-01-04T18:58:00Z",
"transaction_amount_usd": 439438.98
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.888,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3913004.67,
"financial_exposure_usd": 5091727.37,
"recoverable_pct": 0.482
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107675",
"label": "benign",
"label_confidence": 0.497,
"severity": "low",
"timestamp": "2026-01-06T07:55:00Z",
"trace_id": "8ce4d279-8325-7177-db2d-cf7e85fe1c4b"
} | {
"account_age_days": 1511,
"account_id": "ACCT-A5582BB46197",
"baseline_risk_score": 0.162,
"kyc_tier": "tier_2",
"session_entropy": 0.8
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 387,
"timestamp": "2026-01-05T22:03:00Z",
"transaction_amount_usd": 8.15
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.793,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2942.44,
"financial_exposure_usd": 3771.85,
"recoverable_pct": 0.868
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105425",
"label": "fraudulent",
"label_confidence": 0.778,
"severity": "high",
"timestamp": "2026-01-04T18:25:00Z",
"trace_id": "bec05252-69a3-50be-b78c-23d63f2be273"
} | {
"account_age_days": 283,
"account_id": "ACCT-4A1BD706DC61",
"baseline_risk_score": 0.172,
"kyc_tier": "tier_3",
"session_entropy": 0.613
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 303,
"timestamp": "2026-01-04T06:55:00Z",
"transaction_amount_usd": 24.94
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.753,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5113301.74,
"financial_exposure_usd": 5892553.79,
"recoverable_pct": 0.503
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106748",
"label": "benign",
"label_confidence": 0.458,
"severity": "medium",
"timestamp": "2026-01-05T16:28:00Z",
"trace_id": "0bcdd39e-9773-db58-66d3-c3a65cb6b130"
} | {
"account_age_days": 786,
"account_id": "ACCT-483671C6F7AB",
"baseline_risk_score": 0.102,
"kyc_tier": "tier_3",
"session_entropy": 0.317
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 135,
"timestamp": "2026-01-05T16:28:00Z",
"transaction_amount_usd": 10586.35
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.663,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2774.19,
"financial_exposure_usd": 3836.96,
"recoverable_pct": 0.811
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104066",
"label": "fraudulent",
"label_confidence": 0.943,
"severity": "low",
"timestamp": "2026-01-03T19:46:00Z",
"trace_id": "f013f6cf-d37d-eb78-4b0a-d038fd2c7b01"
} | {
"account_age_days": 378,
"account_id": "ACCT-8BCA28ADBF7D",
"baseline_risk_score": 0.437,
"kyc_tier": "tier_2",
"session_entropy": 0.597
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 149,
"timestamp": "2026-01-03T14:56:00Z",
"transaction_amount_usd": 1.95
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.381,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 9",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4442571.69,
"financial_exposure_usd": 5546196.48,
"recoverable_pct": 0.692
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105347",
"label": "fraudulent",
"label_confidence": 0.605,
"severity": "high",
"timestamp": "2026-01-04T17:07:00Z",
"trace_id": "1ed9e3f1-8447-a3a8-05c6-dba39b6f485b"
} | {
"account_age_days": 1331,
"account_id": "ACCT-149C4AF296DF",
"baseline_risk_score": 0.063,
"kyc_tier": "tier_2",
"session_entropy": 0.878
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 518,
"timestamp": "2026-01-04T17:07:00Z",
"transaction_amount_usd": 1113541.66
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.51,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 1924036.87,
"financial_exposure_usd": 3535432.89,
"recoverable_pct": 0.495
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105827",
"label": "fraudulent",
"label_confidence": 0.689,
"severity": "high",
"timestamp": "2026-01-05T01:07:00Z",
"trace_id": "96091d48-4dab-e070-3aa1-76ac0667f060"
} | {
"account_age_days": 1421,
"account_id": "ACCT-6BBF0F8027FF",
"baseline_risk_score": 0.262,
"kyc_tier": "tier_2",
"session_entropy": 0.924
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 174,
"timestamp": "2026-01-04T23:23:00Z",
"transaction_amount_usd": 9.11
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.445,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5011359.18,
"financial_exposure_usd": 5374823.13,
"recoverable_pct": 0.598
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108656",
"label": "benign",
"label_confidence": 0.732,
"severity": "low",
"timestamp": "2026-01-07T00:16:00Z",
"trace_id": "8f71cf56-ed99-2986-d2cb-b9c6ccdf65f0"
} | {
"account_age_days": 1941,
"account_id": "ACCT-FF73A163C7CF",
"baseline_risk_score": 0.161,
"kyc_tier": "tier_2",
"session_entropy": 0.485
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 781,
"timestamp": "2026-01-07T00:16:00Z",
"transaction_amount_usd": 9785.47
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.457,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1235.1,
"financial_exposure_usd": 2142.29,
"recoverable_pct": 0.939
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104609",
"label": "fraudulent",
"label_confidence": 0.885,
"severity": "low",
"timestamp": "2026-01-04T04:49:00Z",
"trace_id": "e5c361d5-2e8f-9610-0412-632c1d15cf65"
} | {
"account_age_days": 1712,
"account_id": "ACCT-85AA3B6BD087",
"baseline_risk_score": 0.113,
"kyc_tier": "tier_2",
"session_entropy": 0.886
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 574,
"timestamp": "2026-01-04T04:49:00Z",
"transaction_amount_usd": 445089.05
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.802,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2857751.58,
"financial_exposure_usd": 2883996.46,
"recoverable_pct": 0.655
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108130",
"label": "benign",
"label_confidence": 0.583,
"severity": "low",
"timestamp": "2026-01-06T15:30:00Z",
"trace_id": "dc251fb2-f88a-c939-fd76-df74bedfbb13"
} | {
"account_age_days": 1464,
"account_id": "ACCT-9640D6C3E20D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.741
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 618,
"timestamp": "2026-01-06T15:30:00Z",
"transaction_amount_usd": 5406.39
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.762,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 428.56,
"financial_exposure_usd": 513.65,
"recoverable_pct": 0.485
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108313",
"label": "benign",
"label_confidence": 0.453,
"severity": "critical",
"timestamp": "2026-01-06T18:33:00Z",
"trace_id": "a3a8f659-268d-7d19-de4a-4f134b48d9f0"
} | {
"account_age_days": 1123,
"account_id": "ACCT-D1B3A4E12506",
"baseline_risk_score": 0.093,
"kyc_tier": "tier_1",
"session_entropy": 0.526
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 294,
"timestamp": "2026-01-06T15:18:00Z",
"transaction_amount_usd": 4.68
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.761,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 377.28,
"financial_exposure_usd": 792.35,
"recoverable_pct": 0.89
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101608",
"label": "fraudulent",
"label_confidence": 0.933,
"severity": "low",
"timestamp": "2026-01-02T02:48:00Z",
"trace_id": "b5b79437-36ac-89dc-62ca-ec2c3184bc11"
} | {
"account_age_days": 744,
"account_id": "ACCT-17E761A4F035",
"baseline_risk_score": 0.61,
"kyc_tier": "tier_1",
"session_entropy": 0.318
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 139,
"timestamp": "2026-01-01T20:07:00Z",
"transaction_amount_usd": 6.53
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.734,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 384672.83,
"financial_exposure_usd": 586695.89,
"recoverable_pct": 0.358
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100211",
"label": "fraudulent",
"label_confidence": 0.825,
"severity": "medium",
"timestamp": "2026-01-01T03:31:00Z",
"trace_id": "6dd2c683-9e54-b7bf-af1e-65964f844346"
} | {
"account_age_days": 561,
"account_id": "ACCT-8FD73AF97B88",
"baseline_risk_score": 0.503,
"kyc_tier": "tier_2",
"session_entropy": 0.224
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 269,
"timestamp": "2025-12-31T16:28:00Z",
"transaction_amount_usd": 18.12
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.941,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 388437.95,
"financial_exposure_usd": 434260.28,
"recoverable_pct": 0.549
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108205",
"label": "benign",
"label_confidence": 0.715,
"severity": "medium",
"timestamp": "2026-01-06T16:45:00Z",
"trace_id": "33885f78-71d4-dab5-1b98-4dcc660337d3"
} | {
"account_age_days": 1192,
"account_id": "ACCT-26736ACF6776",
"baseline_risk_score": 0.062,
"kyc_tier": "tier_1",
"session_entropy": 0.925
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 116,
"timestamp": "2026-01-06T16:45:00Z",
"transaction_amount_usd": 12181.06
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.514,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2719.72,
"financial_exposure_usd": 4393.62,
"recoverable_pct": 0.646
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104435",
"label": "fraudulent",
"label_confidence": 0.724,
"severity": "high",
"timestamp": "2026-01-04T01:55:00Z",
"trace_id": "38786781-3caf-67b3-2817-447fe05d432c"
} | {
"account_age_days": 631,
"account_id": "ACCT-B1BC997F1402",
"baseline_risk_score": 0.138,
"kyc_tier": "tier_2",
"session_entropy": 0.364
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 807,
"timestamp": "2026-01-04T01:55:00Z",
"transaction_amount_usd": 2901908.86
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.819,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 6105098.46,
"financial_exposure_usd": 6159640.74,
"recoverable_pct": 0.822
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100125",
"label": "fraudulent",
"label_confidence": 0.792,
"severity": "high",
"timestamp": "2026-01-01T02:05:00Z",
"trace_id": "a8d99292-4a85-e443-3ba8-78d934b55b86"
} | {
"account_age_days": 493,
"account_id": "ACCT-B2DA61F764BF",
"baseline_risk_score": 0.614,
"kyc_tier": "tier_1",
"session_entropy": 0.904
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 280,
"timestamp": "2025-12-31T16:22:00Z",
"transaction_amount_usd": 4.3
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.88,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 971868.65,
"financial_exposure_usd": 1214844.68,
"recoverable_pct": 0.057
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106119",
"label": "fraudulent",
"label_confidence": 0.801,
"severity": "medium",
"timestamp": "2026-01-05T05:59:00Z",
"trace_id": "63637f86-cb77-6e82-6b40-559468ddc484"
} | {
"account_age_days": 215,
"account_id": "ACCT-F129B24A2385",
"baseline_risk_score": 0.282,
"kyc_tier": "tier_1",
"session_entropy": 0.299
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 743,
"timestamp": "2026-01-05T05:59:00Z",
"transaction_amount_usd": 2700295.65
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.721,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3999615.64,
"financial_exposure_usd": 7657394.41,
"recoverable_pct": 0.744
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100155",
"label": "fraudulent",
"label_confidence": 0.902,
"severity": "high",
"timestamp": "2026-01-01T02:35:00Z",
"trace_id": "11c7beb2-042a-6bd7-a510-04b8565f2ea8"
} | {
"account_age_days": 465,
"account_id": "ACCT-C5CBFEDD5268",
"baseline_risk_score": 0.481,
"kyc_tier": "tier_1",
"session_entropy": 0.721
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 284,
"timestamp": "2025-12-31T18:10:00Z",
"transaction_amount_usd": 7.93
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.81,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 512215.68,
"financial_exposure_usd": 837219.37,
"recoverable_pct": 0.71
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107461",
"label": "benign",
"label_confidence": 0.519,
"severity": "medium",
"timestamp": "2026-01-06T04:21:00Z",
"trace_id": "1ea114f8-211a-27f8-b3b3-e3d06f45be7f"
} | {
"account_age_days": 1928,
"account_id": "ACCT-4CD4539C2E56",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.476
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 473,
"timestamp": "2026-01-06T04:21:00Z",
"transaction_amount_usd": 7655.21
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.685,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1836.59,
"financial_exposure_usd": 2237.99,
"recoverable_pct": 0.533
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104085",
"label": "fraudulent",
"label_confidence": 0.684,
"severity": "medium",
"timestamp": "2026-01-03T20:05:00Z",
"trace_id": "1d01d77d-cb39-c6df-d5d2-6cd447f9135b"
} | {
"account_age_days": 677,
"account_id": "ACCT-13860149E491",
"baseline_risk_score": 0.244,
"kyc_tier": "tier_3",
"session_entropy": 0.57
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 152,
"timestamp": "2026-01-03T20:05:00Z",
"transaction_amount_usd": 1259047.01
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.888,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 5502601.72,
"financial_exposure_usd": 6838383.24,
"recoverable_pct": 0.87
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107026",
"label": "benign",
"label_confidence": 0.558,
"severity": "medium",
"timestamp": "2026-01-05T21:06:00Z",
"trace_id": "00568c2f-e7e8-87f6-3835-299d8978e3fa"
} | {
"account_age_days": 213,
"account_id": "ACCT-322102749E55",
"baseline_risk_score": 0.178,
"kyc_tier": "tier_3",
"session_entropy": 0.152
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 292,
"timestamp": "2026-01-05T21:06:00Z",
"transaction_amount_usd": 1183.99
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.491,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2456.75,
"financial_exposure_usd": 3056.38,
"recoverable_pct": 0.614
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109143",
"label": "benign",
"label_confidence": 0.613,
"severity": "high",
"timestamp": "2026-01-07T08:23:00Z",
"trace_id": "b9b9fa18-2b60-1394-13e0-6e3e0ed26e45"
} | {
"account_age_days": 1960,
"account_id": "ACCT-5C579263A64C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.297
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 279,
"timestamp": "2026-01-07T08:23:00Z",
"transaction_amount_usd": 13137.86
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.517,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3566.43,
"financial_exposure_usd": 3608.31,
"recoverable_pct": 0.852
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102714",
"label": "fraudulent",
"label_confidence": 0.761,
"severity": "medium",
"timestamp": "2026-01-02T21:14:00Z",
"trace_id": "9bda5013-e970-8cc0-b092-4ba5dc7266f0"
} | {
"account_age_days": 1002,
"account_id": "ACCT-ABCE03B05FA4",
"baseline_risk_score": 0.268,
"kyc_tier": "tier_2",
"session_entropy": 0.484
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 201,
"timestamp": "2026-01-02T18:48:00Z",
"transaction_amount_usd": 16.89
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.5,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 692657.87,
"financial_exposure_usd": 1052367.75,
"recoverable_pct": 0.729
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105729",
"label": "fraudulent",
"label_confidence": 0.804,
"severity": "critical",
"timestamp": "2026-01-04T23:29:00Z",
"trace_id": "b0495c2d-910e-a5c4-c2f5-aa39e4eeaaed"
} | {
"account_age_days": 672,
"account_id": "ACCT-7B2E56B278A3",
"baseline_risk_score": 0.053,
"kyc_tier": "tier_2",
"session_entropy": 0.372
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 596,
"timestamp": "2026-01-04T23:29:00Z",
"transaction_amount_usd": 2524920.33
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.888,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4404945.52,
"financial_exposure_usd": 5730667.9,
"recoverable_pct": 0.724
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100631",
"label": "fraudulent",
"label_confidence": 0.763,
"severity": "high",
"timestamp": "2026-01-01T10:31:00Z",
"trace_id": "68027fa6-5c7c-f2ca-2b9f-13f459db9595"
} | {
"account_age_days": 1047,
"account_id": "ACCT-603157F5F6A1",
"baseline_risk_score": 0.411,
"kyc_tier": "tier_2",
"session_entropy": 0.185
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 307,
"timestamp": "2026-01-01T09:57:00Z",
"transaction_amount_usd": 10.62
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.517,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 564748.64,
"financial_exposure_usd": 991284.76,
"recoverable_pct": 0.647
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104797",
"label": "fraudulent",
"label_confidence": 0.949,
"severity": "medium",
"timestamp": "2026-01-04T07:57:00Z",
"trace_id": "bf25bd2d-a025-f397-5425-448c9e9ec32a"
} | {
"account_age_days": 39,
"account_id": "ACCT-0494C0359609",
"baseline_risk_score": 0.328,
"kyc_tier": "tier_1",
"session_entropy": 0.148
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 681,
"timestamp": "2026-01-04T07:57:00Z",
"transaction_amount_usd": 2419061.74
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.649,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2810895.29,
"financial_exposure_usd": 4525419.4,
"recoverable_pct": 0.758
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109332",
"label": "benign",
"label_confidence": 0.687,
"severity": "low",
"timestamp": "2026-01-07T11:32:00Z",
"trace_id": "f159639b-3ac0-2219-106c-2f05d49e448b"
} | {
"account_age_days": 412,
"account_id": "ACCT-241CF24C1509",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.255
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 687,
"timestamp": "2026-01-07T11:32:00Z",
"transaction_amount_usd": 4826.34
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.485,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 242.35,
"financial_exposure_usd": 562.99,
"recoverable_pct": 0.76
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105259",
"label": "fraudulent",
"label_confidence": 0.822,
"severity": "high",
"timestamp": "2026-01-04T15:39:00Z",
"trace_id": "f3fb8645-5472-3a65-f390-957c48626eac"
} | {
"account_age_days": 666,
"account_id": "ACCT-5903487F81AE",
"baseline_risk_score": 0.126,
"kyc_tier": "tier_3",
"session_entropy": 0.532
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 303,
"timestamp": "2026-01-04T15:39:00Z",
"transaction_amount_usd": 2749033.12
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.733,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1362896.1,
"financial_exposure_usd": 1445970.67,
"recoverable_pct": 0.934
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100754",
"label": "fraudulent",
"label_confidence": 0.928,
"severity": "high",
"timestamp": "2026-01-01T12:34:00Z",
"trace_id": "93bd10cb-5d4a-bbbc-4d8a-84c236ce365b"
} | {
"account_age_days": 206,
"account_id": "ACCT-DD43226447B1",
"baseline_risk_score": 0.49,
"kyc_tier": "tier_2",
"session_entropy": 0.387
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 894,
"timestamp": "2026-01-01T12:34:00Z",
"transaction_amount_usd": 76858.86
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.735,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 613472.11,
"financial_exposure_usd": 796978.9,
"recoverable_pct": 0.742
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108105",
"label": "benign",
"label_confidence": 0.654,
"severity": "medium",
"timestamp": "2026-01-06T15:05:00Z",
"trace_id": "5b96aa64-71f2-b92f-b3ba-0b6d6dce2893"
} | {
"account_age_days": 953,
"account_id": "ACCT-1595696CA8C8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.31
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 1034,
"timestamp": "2026-01-06T15:05:00Z",
"transaction_amount_usd": 12850.82
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.651,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2539.58,
"financial_exposure_usd": 3982.26,
"recoverable_pct": 0.407
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103852",
"label": "fraudulent",
"label_confidence": 0.944,
"severity": "critical",
"timestamp": "2026-01-03T16:12:00Z",
"trace_id": "1df016cb-2255-25fe-a049-450777f5b443"
} | {
"account_age_days": 1243,
"account_id": "ACCT-A49DB56B9F94",
"baseline_risk_score": 0.122,
"kyc_tier": "tier_2",
"session_entropy": 0.546
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 296,
"timestamp": "2026-01-03T14:06:00Z",
"transaction_amount_usd": 15.57
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.765,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4455012.48,
"financial_exposure_usd": 5425945.3,
"recoverable_pct": 0.732
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104841",
"label": "fraudulent",
"label_confidence": 0.905,
"severity": "high",
"timestamp": "2026-01-04T08:41:00Z",
"trace_id": "a5b2152f-95e8-2792-0ae1-64f0c0b9ae32"
} | {
"account_age_days": 1618,
"account_id": "ACCT-ADB32230E5C5",
"baseline_risk_score": 0.161,
"kyc_tier": "tier_2",
"session_entropy": 0.588
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 286,
"timestamp": "2026-01-04T03:33:00Z",
"transaction_amount_usd": 9.72
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.382,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3456213.03,
"financial_exposure_usd": 5747577.64,
"recoverable_pct": 0.513
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100403",
"label": "fraudulent",
"label_confidence": 0.875,
"severity": "critical",
"timestamp": "2026-01-01T06:43:00Z",
"trace_id": "c11aa7ba-0960-a59c-9411-bd98448bfa0a"
} | {
"account_age_days": 203,
"account_id": "ACCT-42D8C5239925",
"baseline_risk_score": 0.299,
"kyc_tier": "tier_1",
"session_entropy": 0.404
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 811,
"timestamp": "2026-01-01T06:43:00Z",
"transaction_amount_usd": 72445.13
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.501,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 211016.65,
"financial_exposure_usd": 462462.09,
"recoverable_pct": 0.331
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104104",
"label": "fraudulent",
"label_confidence": 0.861,
"severity": "high",
"timestamp": "2026-01-03T20:24:00Z",
"trace_id": "90b0e552-e8d1-cf68-aa1f-3c58071bda1c"
} | {
"account_age_days": 1286,
"account_id": "ACCT-521F079581AF",
"baseline_risk_score": 0.172,
"kyc_tier": "tier_1",
"session_entropy": 0.221
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 557,
"timestamp": "2026-01-03T20:24:00Z",
"transaction_amount_usd": 1287419.69
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.892,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5989883.81,
"financial_exposure_usd": 7698498.54,
"recoverable_pct": 0.637
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105659",
"label": "fraudulent",
"label_confidence": 0.835,
"severity": "high",
"timestamp": "2026-01-04T22:19:00Z",
"trace_id": "25f1d669-36ae-d640-5b3f-3c5d76d7af77"
} | {
"account_age_days": 844,
"account_id": "ACCT-7E4233B530B4",
"baseline_risk_score": 0.243,
"kyc_tier": "tier_2",
"session_entropy": 0.152
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 345,
"timestamp": "2026-01-04T19:47:00Z",
"transaction_amount_usd": 22.3
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.823,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4205393.62,
"financial_exposure_usd": 5794277.53,
"recoverable_pct": 0.917
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107593",
"label": "benign",
"label_confidence": 0.648,
"severity": "low",
"timestamp": "2026-01-06T06:33:00Z",
"trace_id": "a7b81aa5-1551-cfb1-e23e-df1d1d8962b6"
} | {
"account_age_days": 1629,
"account_id": "ACCT-5689A1F48F25",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.575
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 945,
"timestamp": "2026-01-06T06:33:00Z",
"transaction_amount_usd": 12408.01
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.623,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 560.34,
"financial_exposure_usd": 1377.52,
"recoverable_pct": 0.632
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108841",
"label": "benign",
"label_confidence": 0.531,
"severity": "low",
"timestamp": "2026-01-07T03:21:00Z",
"trace_id": "d295cae7-fd51-31d5-4ba8-9185196172b4"
} | {
"account_age_days": 1655,
"account_id": "ACCT-28500B559F32",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.204
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 1066,
"timestamp": "2026-01-07T03:21:00Z",
"transaction_amount_usd": 7579.83
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.67,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 4498.38,
"financial_exposure_usd": 4550.16,
"recoverable_pct": 0.788
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102774",
"label": "fraudulent",
"label_confidence": 0.899,
"severity": "critical",
"timestamp": "2026-01-02T22:14:00Z",
"trace_id": "286eff4d-ddb6-3daa-f661-d712e97197b5"
} | {
"account_age_days": 919,
"account_id": "ACCT-877D7D0CB122",
"baseline_risk_score": 0.628,
"kyc_tier": "tier_2",
"session_entropy": 0.546
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "FR",
"latency_ms": 884,
"timestamp": "2026-01-02T22:14:00Z",
"transaction_amount_usd": 4391.13
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.352,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 938362.1,
"financial_exposure_usd": 999663.7,
"recoverable_pct": 0.695
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101898",
"label": "fraudulent",
"label_confidence": 0.898,
"severity": "critical",
"timestamp": "2026-01-02T07:38:00Z",
"trace_id": "4905377a-5d4e-4d0b-fa45-77581e343142"
} | {
"account_age_days": 367,
"account_id": "ACCT-19E3BB581760",
"baseline_risk_score": 0.536,
"kyc_tier": "tier_2",
"session_entropy": 0.376
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 914,
"timestamp": "2026-01-02T07:38:00Z",
"transaction_amount_usd": 52461.25
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.608,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 1244590.17,
"financial_exposure_usd": 1356345.62,
"recoverable_pct": 0.806
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105023",
"label": "fraudulent",
"label_confidence": 0.725,
"severity": "medium",
"timestamp": "2026-01-04T11:43:00Z",
"trace_id": "f949f37d-369d-b9dd-dd72-564d408b4a9d"
} | {
"account_age_days": 672,
"account_id": "ACCT-9A2C3E1313CB",
"baseline_risk_score": 0.218,
"kyc_tier": "tier_3",
"session_entropy": 0.634
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 646,
"timestamp": "2026-01-04T11:43:00Z",
"transaction_amount_usd": 1177980.62
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.468,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 7752566.24,
"financial_exposure_usd": 8204993.55,
"recoverable_pct": 0.835
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109336",
"label": "benign",
"label_confidence": 0.578,
"severity": "low",
"timestamp": "2026-01-07T11:36:00Z",
"trace_id": "5df28cbc-4295-428d-56ec-5cc27490e246"
} | {
"account_age_days": 1621,
"account_id": "ACCT-408326512FFA",
"baseline_risk_score": 0.09,
"kyc_tier": "tier_1",
"session_entropy": 0.911
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 728,
"timestamp": "2026-01-07T11:36:00Z",
"transaction_amount_usd": 4533.67
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.697,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2509.56,
"financial_exposure_usd": 4266.18,
"recoverable_pct": 0.548
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100684",
"label": "fraudulent",
"label_confidence": 0.788,
"severity": "critical",
"timestamp": "2026-01-01T11:24:00Z",
"trace_id": "680556ed-2e69-6c3f-673b-bc2e84ce5aff"
} | {
"account_age_days": 336,
"account_id": "ACCT-CA3409FC0608",
"baseline_risk_score": 0.617,
"kyc_tier": "tier_1",
"session_entropy": 0.673
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 556,
"timestamp": "2026-01-01T11:24:00Z",
"transaction_amount_usd": 88311.15
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.498,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 3",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 126763.55,
"financial_exposure_usd": 213835.97,
"recoverable_pct": 0.246
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109976",
"label": "benign",
"label_confidence": 0.456,
"severity": "high",
"timestamp": "2026-01-07T22:16:00Z",
"trace_id": "a2fbfc2f-def4-f875-9592-8f1c8f069ee4"
} | {
"account_age_days": 65,
"account_id": "ACCT-85E907A1F3D3",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.541
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 128,
"timestamp": "2026-01-07T13:07:00Z",
"transaction_amount_usd": 1.33
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.665,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2019.58,
"financial_exposure_usd": 2548.63,
"recoverable_pct": 0.828
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101268",
"label": "fraudulent",
"label_confidence": 0.885,
"severity": "critical",
"timestamp": "2026-01-01T21:08:00Z",
"trace_id": "7e5edc74-52fa-f1e0-9044-7dab98c33584"
} | {
"account_age_days": 973,
"account_id": "ACCT-09A57AD138C9",
"baseline_risk_score": 0.381,
"kyc_tier": "tier_2",
"session_entropy": 0.101
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 144,
"timestamp": "2026-01-01T20:12:00Z",
"transaction_amount_usd": 8.16
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.824,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 16157.76,
"financial_exposure_usd": 33687.41,
"recoverable_pct": 0.442
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105898",
"label": "fraudulent",
"label_confidence": 0.728,
"severity": "medium",
"timestamp": "2026-01-05T02:18:00Z",
"trace_id": "3eb90614-d7df-3d27-9b96-14d1f00b52ec"
} | {
"account_age_days": 826,
"account_id": "ACCT-719AD67BEE38",
"baseline_risk_score": 0.119,
"kyc_tier": "tier_1",
"session_entropy": 0.884
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 697,
"timestamp": "2026-01-05T02:18:00Z",
"transaction_amount_usd": 1451020.19
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.661,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4315937.84,
"financial_exposure_usd": 5225724.48,
"recoverable_pct": 0.605
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108109",
"label": "benign",
"label_confidence": 0.63,
"severity": "low",
"timestamp": "2026-01-06T15:09:00Z",
"trace_id": "fe95059b-8197-188c-3b24-6d1cb96d92d1"
} | {
"account_age_days": 197,
"account_id": "ACCT-130896AC521D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.452
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 131,
"timestamp": "2026-01-06T04:46:00Z",
"transaction_amount_usd": 6.54
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.641,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 4037.88,
"financial_exposure_usd": 4371.81,
"recoverable_pct": 0.742
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108414",
"label": "benign",
"label_confidence": 0.614,
"severity": "medium",
"timestamp": "2026-01-06T20:14:00Z",
"trace_id": "f2a26749-0547-726f-d744-4f4dcd6035d5"
} | {
"account_age_days": 1866,
"account_id": "ACCT-7193BF0072AF",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.93
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 1109,
"timestamp": "2026-01-06T20:14:00Z",
"transaction_amount_usd": 8863.65
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.729,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 4892.1,
"financial_exposure_usd": 5865.8,
"recoverable_pct": 0.491
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.