schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101180",
"label": "fraudulent",
"label_confidence": 0.98,
"severity": "medium",
"timestamp": "2026-01-01T19:40:00Z",
"trace_id": "67c333c6-b728-c96d-46d9-8a23dfa8b4bf"
} | {
"account_age_days": 525,
"account_id": "ACCT-FBEAA67290FA",
"baseline_risk_score": 0.504,
"kyc_tier": "tier_1",
"session_entropy": 0.196
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 817,
"timestamp": "2026-01-01T19:40:00Z",
"transaction_amount_usd": 57412.15
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.509,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 535918.23,
"financial_exposure_usd": 762074.17,
"recoverable_pct": 0.087
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101668",
"label": "fraudulent",
"label_confidence": 0.901,
"severity": "low",
"timestamp": "2026-01-02T03:48:00Z",
"trace_id": "632baab4-2177-08b2-2b5f-dd4c9cb31f6b"
} | {
"account_age_days": 335,
"account_id": "ACCT-5D310895D30A",
"baseline_risk_score": 0.44,
"kyc_tier": "tier_3",
"session_entropy": 0.47
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 262,
"timestamp": "2026-01-02T03:48:00Z",
"transaction_amount_usd": 18952.47
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.771,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 667523.51,
"financial_exposure_usd": 1155792.37,
"recoverable_pct": 0.422
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102923",
"label": "fraudulent",
"label_confidence": 0.811,
"severity": "medium",
"timestamp": "2026-01-03T00:43:00Z",
"trace_id": "45f5e826-3ce4-5dd7-57c0-d1474548de16"
} | {
"account_age_days": 1059,
"account_id": "ACCT-8A3E0441A3B7",
"baseline_risk_score": 0.635,
"kyc_tier": "tier_1",
"session_entropy": 0.289
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 231,
"timestamp": "2026-01-03T00:43:00Z",
"transaction_amount_usd": 107992.77
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.5,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 686353.3,
"financial_exposure_usd": 1212267.68,
"recoverable_pct": 0.672
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108061",
"label": "benign",
"label_confidence": 0.729,
"severity": "low",
"timestamp": "2026-01-06T14:21:00Z",
"trace_id": "c126dacf-78c0-8a87-f4c7-4529e0624da4"
} | {
"account_age_days": 620,
"account_id": "ACCT-142CB1E67913",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.673
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 157,
"timestamp": "2026-01-06T14:21:00Z",
"transaction_amount_usd": 11811.02
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.672,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2326.22,
"financial_exposure_usd": 4566.15,
"recoverable_pct": 0.794
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101938",
"label": "fraudulent",
"label_confidence": 0.781,
"severity": "high",
"timestamp": "2026-01-02T08:18:00Z",
"trace_id": "1a0cb119-7d8a-0541-136e-58e29e5ef2f5"
} | {
"account_age_days": 599,
"account_id": "ACCT-38AAE51B48A2",
"baseline_risk_score": 0.486,
"kyc_tier": "tier_2",
"session_entropy": 0.234
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 331,
"timestamp": "2026-01-02T05:12:00Z",
"transaction_amount_usd": 18.79
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.466,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 131608.04,
"financial_exposure_usd": 140171.93,
"recoverable_pct": 0.396
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108435",
"label": "benign",
"label_confidence": 0.523,
"severity": "low",
"timestamp": "2026-01-06T20:35:00Z",
"trace_id": "611fa2d0-324e-c3a9-9856-6002560ccd37"
} | {
"account_age_days": 714,
"account_id": "ACCT-9B9FC4E48E5E",
"baseline_risk_score": 0.109,
"kyc_tier": "tier_2",
"session_entropy": 0.128
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 583,
"timestamp": "2026-01-06T20:35:00Z",
"transaction_amount_usd": 1622.17
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.673,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1123.54,
"financial_exposure_usd": 1401.41,
"recoverable_pct": 0.501
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109502",
"label": "benign",
"label_confidence": 0.564,
"severity": "medium",
"timestamp": "2026-01-07T14:22:00Z",
"trace_id": "a78afdfd-4588-a70c-e85c-2b2e39d4f84d"
} | {
"account_age_days": 1747,
"account_id": "ACCT-761268D875BB",
"baseline_risk_score": 0.072,
"kyc_tier": "tier_1",
"session_entropy": 0.461
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 392,
"timestamp": "2026-01-07T04:41:00Z",
"transaction_amount_usd": 23.53
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.766,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2182.94,
"financial_exposure_usd": 4190.52,
"recoverable_pct": 0.789
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102410",
"label": "fraudulent",
"label_confidence": 0.766,
"severity": "high",
"timestamp": "2026-01-02T16:10:00Z",
"trace_id": "5a6b68d9-972f-6bca-75cc-1c9c3f954994"
} | {
"account_age_days": 214,
"account_id": "ACCT-26C1FB940FB4",
"baseline_risk_score": 0.362,
"kyc_tier": "tier_2",
"session_entropy": 0.687
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 735,
"timestamp": "2026-01-02T16:10:00Z",
"transaction_amount_usd": 98278.78
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.808,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 732501.09,
"financial_exposure_usd": 801051.17,
"recoverable_pct": 0.654
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103508",
"label": "fraudulent",
"label_confidence": 0.685,
"severity": "medium",
"timestamp": "2026-01-03T10:28:00Z",
"trace_id": "0bc175eb-8d60-60d0-0575-f67ec0691a02"
} | {
"account_age_days": 1524,
"account_id": "ACCT-B8B65EB17594",
"baseline_risk_score": 0.224,
"kyc_tier": "tier_2",
"session_entropy": 0.613
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 638,
"timestamp": "2026-01-03T10:28:00Z",
"transaction_amount_usd": 2617587.55
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.552,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2874345.3,
"financial_exposure_usd": 4779865.52,
"recoverable_pct": 0.641
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102667",
"label": "fraudulent",
"label_confidence": 0.846,
"severity": "medium",
"timestamp": "2026-01-02T20:27:00Z",
"trace_id": "a560cfce-08d9-3898-ecbf-5c24dd2e254f"
} | {
"account_age_days": 1856,
"account_id": "ACCT-E7318EBB5B5D",
"baseline_risk_score": 0.373,
"kyc_tier": "tier_3",
"session_entropy": 0.705
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "GB",
"latency_ms": 535,
"timestamp": "2026-01-02T20:27:00Z",
"transaction_amount_usd": 15871.22
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.887,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 770191.35,
"financial_exposure_usd": 980702.82,
"recoverable_pct": 0.833
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100466",
"label": "fraudulent",
"label_confidence": 0.89,
"severity": "high",
"timestamp": "2026-01-01T07:46:00Z",
"trace_id": "88c36fd7-f650-1bd7-1221-47abdc91f73a"
} | {
"account_age_days": 606,
"account_id": "ACCT-4E1791177265",
"baseline_risk_score": 0.523,
"kyc_tier": "tier_1",
"session_entropy": 0.429
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 738,
"timestamp": "2026-01-01T07:46:00Z",
"transaction_amount_usd": 51202.76
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.499,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 266697.19,
"financial_exposure_usd": 273522.55,
"recoverable_pct": 0.41
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103628",
"label": "fraudulent",
"label_confidence": 0.742,
"severity": "medium",
"timestamp": "2026-01-03T12:28:00Z",
"trace_id": "5befce15-bc4a-4656-62f7-668c54742a12"
} | {
"account_age_days": 1969,
"account_id": "ACCT-E706BE9E2193",
"baseline_risk_score": 0.404,
"kyc_tier": "tier_1",
"session_entropy": 0.945
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 243,
"timestamp": "2026-01-03T10:38:00Z",
"transaction_amount_usd": 18.55
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.767,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 7929790.9,
"financial_exposure_usd": 7969750.88,
"recoverable_pct": 0.561
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103202",
"label": "fraudulent",
"label_confidence": 0.781,
"severity": "medium",
"timestamp": "2026-01-03T05:22:00Z",
"trace_id": "bfaf1107-556c-aed8-4f4b-122aca09d427"
} | {
"account_age_days": 67,
"account_id": "ACCT-EE158EBED596",
"baseline_risk_score": 0.589,
"kyc_tier": "tier_3",
"session_entropy": 0.729
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 595,
"timestamp": "2026-01-03T05:22:00Z",
"transaction_amount_usd": 114425.6
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.569,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 767114.38,
"financial_exposure_usd": 811667.66,
"recoverable_pct": 0.602
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101916",
"label": "fraudulent",
"label_confidence": 0.857,
"severity": "low",
"timestamp": "2026-01-02T07:56:00Z",
"trace_id": "ce88181c-4e17-7b55-1082-0c7dc214d184"
} | {
"account_age_days": 633,
"account_id": "ACCT-7D4EDDC9DED3",
"baseline_risk_score": 0.269,
"kyc_tier": "tier_3",
"session_entropy": 0.26
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 145,
"timestamp": "2026-01-01T22:49:00Z",
"transaction_amount_usd": 23.78
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.819,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 685802.77,
"financial_exposure_usd": 772864.9,
"recoverable_pct": 0.21
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106205",
"label": "fraudulent",
"label_confidence": 0.845,
"severity": "high",
"timestamp": "2026-01-05T07:25:00Z",
"trace_id": "1750bbec-f725-b033-60bc-f2e26d920b22"
} | {
"account_age_days": 1271,
"account_id": "ACCT-7C9BDE88B0AA",
"baseline_risk_score": 0.28,
"kyc_tier": "tier_3",
"session_entropy": 0.425
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 803,
"timestamp": "2026-01-05T07:25:00Z",
"transaction_amount_usd": 924237.16
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.728,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4842183.85,
"financial_exposure_usd": 6927146.87,
"recoverable_pct": 0.8
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102414",
"label": "fraudulent",
"label_confidence": 0.909,
"severity": "medium",
"timestamp": "2026-01-02T16:14:00Z",
"trace_id": "6fd90600-baf9-a287-fcaf-ab8ce9c8fc77"
} | {
"account_age_days": 1526,
"account_id": "ACCT-763F9AB4809C",
"baseline_risk_score": 0.479,
"kyc_tier": "tier_1",
"session_entropy": 0.744
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "BR",
"latency_ms": 341,
"timestamp": "2026-01-02T16:14:00Z",
"transaction_amount_usd": 104602.75
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.804,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 353812.2,
"financial_exposure_usd": 459791.93,
"recoverable_pct": 0.408
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102977",
"label": "fraudulent",
"label_confidence": 0.835,
"severity": "medium",
"timestamp": "2026-01-03T01:37:00Z",
"trace_id": "7ff0887b-8456-fbb2-ef8f-1356429ff065"
} | {
"account_age_days": 572,
"account_id": "ACCT-4E4AA949492C",
"baseline_risk_score": 0.53,
"kyc_tier": "tier_1",
"session_entropy": 0.572
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 273,
"timestamp": "2026-01-02T15:42:00Z",
"transaction_amount_usd": 18.16
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.879,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 115374.96,
"financial_exposure_usd": 258372.53,
"recoverable_pct": 0.699
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109135",
"label": "benign",
"label_confidence": 0.453,
"severity": "low",
"timestamp": "2026-01-07T08:15:00Z",
"trace_id": "b86da261-b6f3-03f8-c9ff-905092fd9a3a"
} | {
"account_age_days": 1158,
"account_id": "ACCT-5C8F04DFC7E8",
"baseline_risk_score": 0.065,
"kyc_tier": "tier_2",
"session_entropy": 0.164
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 322,
"timestamp": "2026-01-06T20:30:00Z",
"transaction_amount_usd": 14.21
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.645,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2216.48,
"financial_exposure_usd": 2261.52,
"recoverable_pct": 0.629
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103284",
"label": "fraudulent",
"label_confidence": 0.864,
"severity": "critical",
"timestamp": "2026-01-03T06:44:00Z",
"trace_id": "0567a361-3c69-e888-f077-56b2ac475355"
} | {
"account_age_days": 1437,
"account_id": "ACCT-BF7F7354FC8B",
"baseline_risk_score": 0.418,
"kyc_tier": "tier_2",
"session_entropy": 0.931
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 186,
"timestamp": "2026-01-03T06:44:00Z",
"transaction_amount_usd": 15778.48
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.601,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 551022.51,
"financial_exposure_usd": 691146.73,
"recoverable_pct": 0.722
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105839",
"label": "fraudulent",
"label_confidence": 0.912,
"severity": "high",
"timestamp": "2026-01-05T01:19:00Z",
"trace_id": "7e250bdc-08c5-3c1b-a137-ed28050bdd24"
} | {
"account_age_days": 957,
"account_id": "ACCT-9666674E515B",
"baseline_risk_score": 0.369,
"kyc_tier": "tier_3",
"session_entropy": 0.869
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 677,
"timestamp": "2026-01-05T01:19:00Z",
"transaction_amount_usd": 2521311.73
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.85,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 3146274.75,
"financial_exposure_usd": 4065431.2,
"recoverable_pct": 0.586
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105296",
"label": "fraudulent",
"label_confidence": 0.732,
"severity": "low",
"timestamp": "2026-01-04T16:16:00Z",
"trace_id": "9d18efa5-d37b-df51-9f8d-7b6d34356268"
} | {
"account_age_days": 1708,
"account_id": "ACCT-40B3E4BB950D",
"baseline_risk_score": 0.399,
"kyc_tier": "tier_3",
"session_entropy": 0.385
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 345,
"timestamp": "2026-01-04T08:12:00Z",
"transaction_amount_usd": 10.34
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.381,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 708522.02,
"financial_exposure_usd": 1454127.85,
"recoverable_pct": 0.931
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108211",
"label": "benign",
"label_confidence": 0.595,
"severity": "low",
"timestamp": "2026-01-06T16:51:00Z",
"trace_id": "850b4098-00b0-7a52-8ca9-99b958ba751a"
} | {
"account_age_days": 1171,
"account_id": "ACCT-E554EE620565",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.859
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 110,
"timestamp": "2026-01-06T13:59:00Z",
"transaction_amount_usd": 15.73
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.663,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 823.36,
"financial_exposure_usd": 1161.86,
"recoverable_pct": 0.555
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100749",
"label": "fraudulent",
"label_confidence": 0.972,
"severity": "low",
"timestamp": "2026-01-01T12:29:00Z",
"trace_id": "c823bfc4-3c47-e0f6-69ba-bc6b89c2298e"
} | {
"account_age_days": 659,
"account_id": "ACCT-CFDA94A29201",
"baseline_risk_score": 0.431,
"kyc_tier": "tier_1",
"session_entropy": 0.617
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "MY",
"latency_ms": 646,
"timestamp": "2026-01-01T12:29:00Z",
"transaction_amount_usd": 87856.27
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.7,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id H... | {
"customer_funds_at_risk_usd": 527907.52,
"financial_exposure_usd": 641914.14,
"recoverable_pct": 0.301
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101609",
"label": "fraudulent",
"label_confidence": 0.958,
"severity": "low",
"timestamp": "2026-01-02T02:49:00Z",
"trace_id": "166b14df-7da3-63c5-613f-926f9cd9ec1d"
} | {
"account_age_days": 1834,
"account_id": "ACCT-C7470F5827FA",
"baseline_risk_score": 0.524,
"kyc_tier": "tier_2",
"session_entropy": 0.651
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 380,
"timestamp": "2026-01-01T22:10:00Z",
"transaction_amount_usd": 15.59
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.395,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 345493.47,
"financial_exposure_usd": 408043.51,
"recoverable_pct": 0.388
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100391",
"label": "fraudulent",
"label_confidence": 0.87,
"severity": "high",
"timestamp": "2026-01-01T06:31:00Z",
"trace_id": "1b2e1e89-8913-f2f0-90cb-33095167dd70"
} | {
"account_age_days": 1312,
"account_id": "ACCT-E39515EAD5D4",
"baseline_risk_score": 0.505,
"kyc_tier": "tier_2",
"session_entropy": 0.518
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 1095,
"timestamp": "2026-01-01T06:31:00Z",
"transaction_amount_usd": 74887.18
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.726,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 933217.93,
"financial_exposure_usd": 1079657.42,
"recoverable_pct": 0.501
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109804",
"label": "benign",
"label_confidence": 0.696,
"severity": "medium",
"timestamp": "2026-01-07T19:24:00Z",
"trace_id": "b8bd9202-5a39-c83e-ca41-616a70fb321e"
} | {
"account_age_days": 697,
"account_id": "ACCT-5F8DA1379D54",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.106
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 376,
"timestamp": "2026-01-07T15:54:00Z",
"transaction_amount_usd": 21.51
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.498,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3530.77,
"financial_exposure_usd": 5244.74,
"recoverable_pct": 0.746
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100922",
"label": "fraudulent",
"label_confidence": 0.971,
"severity": "high",
"timestamp": "2026-01-01T15:22:00Z",
"trace_id": "a61f48fc-3027-e4cb-1578-05746ca4c622"
} | {
"account_age_days": 1617,
"account_id": "ACCT-C597ED7B299D",
"baseline_risk_score": 0.416,
"kyc_tier": "tier_3",
"session_entropy": 0.759
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 190,
"timestamp": "2026-01-01T14:45:00Z",
"transaction_amount_usd": 12.03
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.479,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 409833.49,
"financial_exposure_usd": 653049.78,
"recoverable_pct": 0.177
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105902",
"label": "fraudulent",
"label_confidence": 0.643,
"severity": "low",
"timestamp": "2026-01-05T02:22:00Z",
"trace_id": "e99f217d-4456-560a-adce-7b52b80772ae"
} | {
"account_age_days": 628,
"account_id": "ACCT-15392DF7BB1B",
"baseline_risk_score": 0.275,
"kyc_tier": "tier_2",
"session_entropy": 0.949
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 379,
"timestamp": "2026-01-04T15:18:00Z",
"transaction_amount_usd": 20.67
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.948,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2912439.39,
"financial_exposure_usd": 2931967.86,
"recoverable_pct": 0.526
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108711",
"label": "benign",
"label_confidence": 0.452,
"severity": "low",
"timestamp": "2026-01-07T01:11:00Z",
"trace_id": "63b537cb-24f8-794b-5bbe-6456e6d49aad"
} | {
"account_age_days": 1500,
"account_id": "ACCT-CA2559B47697",
"baseline_risk_score": 0.122,
"kyc_tier": "tier_2",
"session_entropy": 0.41
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 646,
"timestamp": "2026-01-07T01:11:00Z",
"transaction_amount_usd": 10872.96
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.621,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3934.06,
"financial_exposure_usd": 4683.74,
"recoverable_pct": 0.961
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108773",
"label": "benign",
"label_confidence": 0.568,
"severity": "low",
"timestamp": "2026-01-07T02:13:00Z",
"trace_id": "bad02118-183f-31d5-fd83-c0026e7b9873"
} | {
"account_age_days": 44,
"account_id": "ACCT-A445F6E7BFE5",
"baseline_risk_score": 0.155,
"kyc_tier": "tier_1",
"session_entropy": 0.162
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 636,
"timestamp": "2026-01-07T02:13:00Z",
"transaction_amount_usd": 12611.37
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.785,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2716.56,
"financial_exposure_usd": 2777.76,
"recoverable_pct": 0.562
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109178",
"label": "benign",
"label_confidence": 0.583,
"severity": "critical",
"timestamp": "2026-01-07T08:58:00Z",
"trace_id": "17b95773-5172-561f-0874-46f41db61ec9"
} | {
"account_age_days": 69,
"account_id": "ACCT-48CD31DCC98E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.941
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 1006,
"timestamp": "2026-01-07T08:58:00Z",
"transaction_amount_usd": 494.73
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.773,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 730.1,
"financial_exposure_usd": 1693.15,
"recoverable_pct": 0.945
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103341",
"label": "fraudulent",
"label_confidence": 0.85,
"severity": "medium",
"timestamp": "2026-01-03T07:41:00Z",
"trace_id": "224bb70b-3aab-4209-05bd-d354b16c959c"
} | {
"account_age_days": 244,
"account_id": "ACCT-517B42472702",
"baseline_risk_score": 0.224,
"kyc_tier": "tier_2",
"session_entropy": 0.901
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 907,
"timestamp": "2026-01-03T07:41:00Z",
"transaction_amount_usd": 1438773.93
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.681,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1722562.48,
"financial_exposure_usd": 2775060.26,
"recoverable_pct": 0.441
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108955",
"label": "benign",
"label_confidence": 0.585,
"severity": "medium",
"timestamp": "2026-01-07T05:15:00Z",
"trace_id": "f736c4a5-2e99-b485-eba5-cd0202e4891d"
} | {
"account_age_days": 303,
"account_id": "ACCT-97E9E25C830B",
"baseline_risk_score": 0.103,
"kyc_tier": "tier_2",
"session_entropy": 0.926
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 178,
"timestamp": "2026-01-07T05:15:00Z",
"transaction_amount_usd": 14607.44
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.782,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1039.39,
"financial_exposure_usd": 2571.64,
"recoverable_pct": 0.614
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102061",
"label": "fraudulent",
"label_confidence": 0.967,
"severity": "high",
"timestamp": "2026-01-02T10:21:00Z",
"trace_id": "e91e5870-f4f6-c034-2085-9c6ffc07cd8a"
} | {
"account_age_days": 1147,
"account_id": "ACCT-2C5294031A74",
"baseline_risk_score": 0.638,
"kyc_tier": "tier_3",
"session_entropy": 0.854
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 116,
"timestamp": "2026-01-02T04:57:00Z",
"transaction_amount_usd": 13.7
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.478,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 541269.69,
"financial_exposure_usd": 810855.58,
"recoverable_pct": 0.395
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102906",
"label": "fraudulent",
"label_confidence": 0.891,
"severity": "low",
"timestamp": "2026-01-03T00:26:00Z",
"trace_id": "9941f6eb-ebc3-c768-87da-750b83f61065"
} | {
"account_age_days": 1932,
"account_id": "ACCT-CEAA5323B20E",
"baseline_risk_score": 0.481,
"kyc_tier": "tier_2",
"session_entropy": 0.682
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 413,
"timestamp": "2026-01-03T00:26:00Z",
"transaction_amount_usd": 21774.3
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.511,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 600058.23,
"financial_exposure_usd": 1139740.34,
"recoverable_pct": 0.811
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104640",
"label": "fraudulent",
"label_confidence": 0.729,
"severity": "medium",
"timestamp": "2026-01-04T05:20:00Z",
"trace_id": "6cefb2cc-8c9e-c1ca-ff5b-f3f9cc18adef"
} | {
"account_age_days": 12,
"account_id": "ACCT-2447ECC98B8B",
"baseline_risk_score": 0.34,
"kyc_tier": "tier_1",
"session_entropy": 0.69
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 244,
"timestamp": "2026-01-04T05:20:00Z",
"transaction_amount_usd": 1541063.89
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.686,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3313175.36,
"financial_exposure_usd": 4435534.78,
"recoverable_pct": 0.667
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103802",
"label": "fraudulent",
"label_confidence": 0.879,
"severity": "medium",
"timestamp": "2026-01-03T15:22:00Z",
"trace_id": "a3654308-6b77-a7c5-53f7-5538774fb7be"
} | {
"account_age_days": 570,
"account_id": "ACCT-C75CA29E8D16",
"baseline_risk_score": 0.35,
"kyc_tier": "tier_1",
"session_entropy": 0.86
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 99,
"timestamp": "2026-01-03T08:09:00Z",
"transaction_amount_usd": 8.49
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.821,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2655617.25,
"financial_exposure_usd": 5015003.99,
"recoverable_pct": 0.83
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108867",
"label": "benign",
"label_confidence": 0.556,
"severity": "critical",
"timestamp": "2026-01-07T03:47:00Z",
"trace_id": "43e16ff5-edfe-cead-be07-eab1a5b46aac"
} | {
"account_age_days": 182,
"account_id": "ACCT-83DCD3FFF1D9",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.602
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 104,
"timestamp": "2026-01-06T17:18:00Z",
"transaction_amount_usd": 18.16
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.632,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1973.09,
"financial_exposure_usd": 2209.58,
"recoverable_pct": 0.924
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108655",
"label": "benign",
"label_confidence": 0.619,
"severity": "low",
"timestamp": "2026-01-07T00:15:00Z",
"trace_id": "d5db8c31-5712-7390-6bec-21cd2a0cac3a"
} | {
"account_age_days": 1676,
"account_id": "ACCT-A71571569243",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.891
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 116,
"timestamp": "2026-01-06T21:47:00Z",
"transaction_amount_usd": 22.19
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.516,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1933.82,
"financial_exposure_usd": 3992.3,
"recoverable_pct": 0.972
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101749",
"label": "fraudulent",
"label_confidence": 0.855,
"severity": "medium",
"timestamp": "2026-01-02T05:09:00Z",
"trace_id": "679083ab-e519-59d4-e0ef-0377d8d08413"
} | {
"account_age_days": 1486,
"account_id": "ACCT-AE1B604A6FE5",
"baseline_risk_score": 0.327,
"kyc_tier": "tier_3",
"session_entropy": 0.16
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 519,
"timestamp": "2026-01-02T05:09:00Z",
"transaction_amount_usd": 74089.18
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.469,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 213343.28,
"financial_exposure_usd": 269259.93,
"recoverable_pct": 0.699
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107794",
"label": "benign",
"label_confidence": 0.46,
"severity": "medium",
"timestamp": "2026-01-06T09:54:00Z",
"trace_id": "1103415a-de47-de7c-b7f6-6c5353fd089a"
} | {
"account_age_days": 1595,
"account_id": "ACCT-49C78084025E",
"baseline_risk_score": 0.092,
"kyc_tier": "tier_2",
"session_entropy": 0.197
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 679,
"timestamp": "2026-01-06T09:54:00Z",
"transaction_amount_usd": 744
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.709,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1203.26,
"financial_exposure_usd": 1763.74,
"recoverable_pct": 0.584
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101303",
"label": "fraudulent",
"label_confidence": 0.935,
"severity": "high",
"timestamp": "2026-01-01T21:43:00Z",
"trace_id": "cd7a3429-c524-0536-7d57-05605d8cd584"
} | {
"account_age_days": 827,
"account_id": "ACCT-F978E7E3AEE0",
"baseline_risk_score": 0.625,
"kyc_tier": "tier_1",
"session_entropy": 0.176
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "LU",
"latency_ms": 162,
"timestamp": "2026-01-01T21:43:00Z",
"transaction_amount_usd": 13134.52
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.794,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 602223.65,
"financial_exposure_usd": 764731.83,
"recoverable_pct": 0.11
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104795",
"label": "fraudulent",
"label_confidence": 0.802,
"severity": "critical",
"timestamp": "2026-01-04T07:55:00Z",
"trace_id": "90ad8aa7-a9a5-766f-a79e-12b736550d94"
} | {
"account_age_days": 499,
"account_id": "ACCT-A0BE355C764D",
"baseline_risk_score": 0.15,
"kyc_tier": "tier_3",
"session_entropy": 0.535
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 505,
"timestamp": "2026-01-04T07:55:00Z",
"transaction_amount_usd": 1191586.28
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.853,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 103783.5,
"financial_exposure_usd": 234942.17,
"recoverable_pct": 0.583
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102860",
"label": "fraudulent",
"label_confidence": 0.848,
"severity": "medium",
"timestamp": "2026-01-02T23:40:00Z",
"trace_id": "998f79a7-7867-5a1d-d440-c83642867034"
} | {
"account_age_days": 893,
"account_id": "ACCT-58B3AD987DE6",
"baseline_risk_score": 0.398,
"kyc_tier": "tier_3",
"session_entropy": 0.904
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "FR",
"latency_ms": 358,
"timestamp": "2026-01-02T23:40:00Z",
"transaction_amount_usd": 99626.29
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.568,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 910324.69,
"financial_exposure_usd": 1105639.88,
"recoverable_pct": 0.051
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108760",
"label": "benign",
"label_confidence": 0.716,
"severity": "medium",
"timestamp": "2026-01-07T02:00:00Z",
"trace_id": "6d2c3b22-2ba6-8401-4c18-4bc46d492a7e"
} | {
"account_age_days": 318,
"account_id": "ACCT-776CE335C85B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.73
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 1063,
"timestamp": "2026-01-07T02:00:00Z",
"transaction_amount_usd": 5945.51
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.797,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 617.04,
"financial_exposure_usd": 875.8,
"recoverable_pct": 0.868
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106789",
"label": "benign",
"label_confidence": 0.52,
"severity": "medium",
"timestamp": "2026-01-05T17:09:00Z",
"trace_id": "230356c6-06bc-0421-b483-6c3d6dd572e8"
} | {
"account_age_days": 906,
"account_id": "ACCT-A368E064ED3D",
"baseline_risk_score": 0.184,
"kyc_tier": "tier_1",
"session_entropy": 0.494
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 122,
"timestamp": "2026-01-05T17:09:00Z",
"transaction_amount_usd": 13376.4
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.632,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2993.61,
"financial_exposure_usd": 6225.79,
"recoverable_pct": 0.422
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103516",
"label": "fraudulent",
"label_confidence": 0.806,
"severity": "high",
"timestamp": "2026-01-03T10:36:00Z",
"trace_id": "db151b40-cc26-87f3-1811-c76e68bd010f"
} | {
"account_age_days": 674,
"account_id": "ACCT-28DFF42E7BAC",
"baseline_risk_score": 0.221,
"kyc_tier": "tier_1",
"session_entropy": 0.788
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 137,
"timestamp": "2026-01-03T08:38:00Z",
"transaction_amount_usd": 24.97
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.914,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4553133.34,
"financial_exposure_usd": 5800706.62,
"recoverable_pct": 0.837
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106855",
"label": "benign",
"label_confidence": 0.705,
"severity": "low",
"timestamp": "2026-01-05T18:15:00Z",
"trace_id": "f569f1ec-957f-caaf-f161-6fc868330ced"
} | {
"account_age_days": 344,
"account_id": "ACCT-1577A913302D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.531
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 837,
"timestamp": "2026-01-05T18:15:00Z",
"transaction_amount_usd": 12372.74
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.669,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 4089.06,
"financial_exposure_usd": 5519.39,
"recoverable_pct": 0.506
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107754",
"label": "benign",
"label_confidence": 0.569,
"severity": "medium",
"timestamp": "2026-01-06T09:14:00Z",
"trace_id": "4235857b-8df1-d972-3cef-a51bce2b70d7"
} | {
"account_age_days": 817,
"account_id": "ACCT-F975BE158D5A",
"baseline_risk_score": 0.121,
"kyc_tier": "tier_1",
"session_entropy": 0.125
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 886,
"timestamp": "2026-01-06T09:14:00Z",
"transaction_amount_usd": 2407.83
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.702,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1453.89,
"financial_exposure_usd": 2705.28,
"recoverable_pct": 0.877
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104628",
"label": "fraudulent",
"label_confidence": 0.876,
"severity": "high",
"timestamp": "2026-01-04T05:08:00Z",
"trace_id": "464c6bd1-0b23-65e6-2707-c0f4ea25a2ff"
} | {
"account_age_days": 102,
"account_id": "ACCT-B36162B8AE93",
"baseline_risk_score": 0.274,
"kyc_tier": "tier_2",
"session_entropy": 0.17
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 318,
"timestamp": "2026-01-03T20:55:00Z",
"transaction_amount_usd": 10.82
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.571,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 586443.31,
"financial_exposure_usd": 587191.81,
"recoverable_pct": 0.986
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101996",
"label": "fraudulent",
"label_confidence": 0.831,
"severity": "high",
"timestamp": "2026-01-02T09:16:00Z",
"trace_id": "127730a8-5c50-ec23-8410-eb6d298dad1b"
} | {
"account_age_days": 1142,
"account_id": "ACCT-EFD439FF4000",
"baseline_risk_score": 0.337,
"kyc_tier": "tier_3",
"session_entropy": 0.902
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 622,
"timestamp": "2026-01-02T09:16:00Z",
"transaction_amount_usd": 79782.85
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.581,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 291230.09,
"financial_exposure_usd": 589690.47,
"recoverable_pct": 0.271
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105875",
"label": "fraudulent",
"label_confidence": 0.918,
"severity": "medium",
"timestamp": "2026-01-05T01:55:00Z",
"trace_id": "cf56a68e-bd06-5a45-3d7b-8ffd19d51c5c"
} | {
"account_age_days": 1851,
"account_id": "ACCT-607D1393DE3A",
"baseline_risk_score": 0.341,
"kyc_tier": "tier_2",
"session_entropy": 0.452
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 373,
"timestamp": "2026-01-04T20:50:00Z",
"transaction_amount_usd": 24.94
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.744,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3811807.09,
"financial_exposure_usd": 5278208.82,
"recoverable_pct": 0.406
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106501",
"label": "fraudulent",
"label_confidence": 0.914,
"severity": "medium",
"timestamp": "2026-01-05T12:21:00Z",
"trace_id": "dbce1a0e-cbf1-adee-54cd-4d105928082d"
} | {
"account_age_days": 1916,
"account_id": "ACCT-F1CE46D111FD",
"baseline_risk_score": 0.32,
"kyc_tier": "tier_3",
"session_entropy": 0.44
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 1000,
"timestamp": "2026-01-05T12:21:00Z",
"transaction_amount_usd": 1498194.53
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.379,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2572994.74,
"financial_exposure_usd": 3407251.4,
"recoverable_pct": 0.83
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106223",
"label": "fraudulent",
"label_confidence": 0.761,
"severity": "medium",
"timestamp": "2026-01-05T07:43:00Z",
"trace_id": "95dc7a76-916a-4219-a852-1a7dd6e29f96"
} | {
"account_age_days": 1885,
"account_id": "ACCT-B09A0EE9ECF8",
"baseline_risk_score": 0.107,
"kyc_tier": "tier_1",
"session_entropy": 0.781
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 418,
"timestamp": "2026-01-05T07:43:00Z",
"transaction_amount_usd": 435803.54
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.604,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 6441465.64,
"financial_exposure_usd": 7122462.34,
"recoverable_pct": 0.874
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100111",
"label": "fraudulent",
"label_confidence": 0.922,
"severity": "high",
"timestamp": "2026-01-01T01:51:00Z",
"trace_id": "1a482803-0204-0c81-5577-32970d093c73"
} | {
"account_age_days": 1243,
"account_id": "ACCT-2C5CCE54210C",
"baseline_risk_score": 0.363,
"kyc_tier": "tier_2",
"session_entropy": 0.27
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 675,
"timestamp": "2026-01-01T01:51:00Z",
"transaction_amount_usd": 52098.66
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.826,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 582904.17,
"financial_exposure_usd": 1001224.74,
"recoverable_pct": 0.178
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109168",
"label": "benign",
"label_confidence": 0.618,
"severity": "low",
"timestamp": "2026-01-07T08:48:00Z",
"trace_id": "dbfafd9e-0885-408e-7867-32bfecdfed5f"
} | {
"account_age_days": 1323,
"account_id": "ACCT-2C8E853CC6CB",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.581
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 217,
"timestamp": "2026-01-07T00:10:00Z",
"transaction_amount_usd": 21.11
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.694,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 5153.37,
"financial_exposure_usd": 10325.17,
"recoverable_pct": 0.786
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103686",
"label": "fraudulent",
"label_confidence": 0.602,
"severity": "high",
"timestamp": "2026-01-03T13:26:00Z",
"trace_id": "81dad153-08e1-1e86-5eeb-fd6412173190"
} | {
"account_age_days": 1536,
"account_id": "ACCT-CC8FB316F2BB",
"baseline_risk_score": 0.064,
"kyc_tier": "tier_1",
"session_entropy": 0.634
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 85,
"timestamp": "2026-01-03T03:04:00Z",
"transaction_amount_usd": 10.72
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.677,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5452571.62,
"financial_exposure_usd": 5471321.07,
"recoverable_pct": 0.408
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102485",
"label": "fraudulent",
"label_confidence": 0.92,
"severity": "low",
"timestamp": "2026-01-02T17:25:00Z",
"trace_id": "0f17fb6f-6060-acfa-7952-e2a33dc30670"
} | {
"account_age_days": 435,
"account_id": "ACCT-1E8933030D23",
"baseline_risk_score": 0.324,
"kyc_tier": "tier_2",
"session_entropy": 0.238
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 726,
"timestamp": "2026-01-02T17:25:00Z",
"transaction_amount_usd": 111821.04
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.762,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 798705.24,
"financial_exposure_usd": 842347.92,
"recoverable_pct": 0.713
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106311",
"label": "fraudulent",
"label_confidence": 0.77,
"severity": "medium",
"timestamp": "2026-01-05T09:11:00Z",
"trace_id": "f6ce56a6-4b70-5b2f-6b71-caaa5940e9cf"
} | {
"account_age_days": 1605,
"account_id": "ACCT-5433E7E8FEE3",
"baseline_risk_score": 0.353,
"kyc_tier": "tier_3",
"session_entropy": 0.713
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 328,
"timestamp": "2026-01-05T09:11:00Z",
"transaction_amount_usd": 1503879.39
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.641,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4573088.83,
"financial_exposure_usd": 4898290.02,
"recoverable_pct": 0.456
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105189",
"label": "fraudulent",
"label_confidence": 0.747,
"severity": "high",
"timestamp": "2026-01-04T14:29:00Z",
"trace_id": "51897a9d-f19e-c07a-9f29-4d506cbea6ee"
} | {
"account_age_days": 1408,
"account_id": "ACCT-AFE939C31E3E",
"baseline_risk_score": 0.179,
"kyc_tier": "tier_3",
"session_entropy": 0.212
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 187,
"timestamp": "2026-01-04T08:28:00Z",
"transaction_amount_usd": 4.73
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.87,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 2425188.11,
"financial_exposure_usd": 5550435.2,
"recoverable_pct": 0.434
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109419",
"label": "benign",
"label_confidence": 0.741,
"severity": "high",
"timestamp": "2026-01-07T12:59:00Z",
"trace_id": "19e1be96-0c6f-a298-3aa2-42d3bf551d5d"
} | {
"account_age_days": 775,
"account_id": "ACCT-E345BC545E88",
"baseline_risk_score": 0.123,
"kyc_tier": "tier_2",
"session_entropy": 0.469
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 1186,
"timestamp": "2026-01-07T12:59:00Z",
"transaction_amount_usd": 9217.64
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.71,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 1169.74,
"financial_exposure_usd": 1781.93,
"recoverable_pct": 0.667
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108733",
"label": "benign",
"label_confidence": 0.477,
"severity": "low",
"timestamp": "2026-01-07T01:33:00Z",
"trace_id": "f91c96af-f62b-5837-4531-96e15cb42825"
} | {
"account_age_days": 116,
"account_id": "ACCT-CF6C7D43BAEF",
"baseline_risk_score": 0.066,
"kyc_tier": "tier_2",
"session_entropy": 0.299
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 1189,
"timestamp": "2026-01-07T01:33:00Z",
"transaction_amount_usd": 9518.4
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.557,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 410.36,
"financial_exposure_usd": 428.05,
"recoverable_pct": 0.642
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101234",
"label": "fraudulent",
"label_confidence": 0.867,
"severity": "critical",
"timestamp": "2026-01-01T20:34:00Z",
"trace_id": "7c536e6a-2d52-b315-0f63-4d7328c580a3"
} | {
"account_age_days": 1094,
"account_id": "ACCT-5285E52E67C1",
"baseline_risk_score": 0.409,
"kyc_tier": "tier_2",
"session_entropy": 0.656
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 1083,
"timestamp": "2026-01-01T20:34:00Z",
"transaction_amount_usd": 95096.46
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.789,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 216594.59,
"financial_exposure_usd": 242597.19,
"recoverable_pct": 0.825
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100581",
"label": "fraudulent",
"label_confidence": 0.799,
"severity": "high",
"timestamp": "2026-01-01T09:41:00Z",
"trace_id": "42e32c21-15e5-d4dd-3d31-7eeaea951de8"
} | {
"account_age_days": 1747,
"account_id": "ACCT-33CDB1A96589",
"baseline_risk_score": 0.6,
"kyc_tier": "tier_3",
"session_entropy": 0.307
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 338,
"timestamp": "2026-01-01T08:50:00Z",
"transaction_amount_usd": 0.7
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.582,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 664143.34,
"financial_exposure_usd": 974597.92,
"recoverable_pct": 0.633
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107323",
"label": "benign",
"label_confidence": 0.584,
"severity": "medium",
"timestamp": "2026-01-06T02:03:00Z",
"trace_id": "4aeb4bf0-e400-0ec6-fed2-7336d613ad24"
} | {
"account_age_days": 679,
"account_id": "ACCT-96E274424A45",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.782
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 797,
"timestamp": "2026-01-06T02:03:00Z",
"transaction_amount_usd": 8683.2
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.748,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2640.55,
"financial_exposure_usd": 3998.9,
"recoverable_pct": 0.688
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107907",
"label": "benign",
"label_confidence": 0.563,
"severity": "low",
"timestamp": "2026-01-06T11:47:00Z",
"trace_id": "4d9cce90-fafa-65e0-0861-c4db04748260"
} | {
"account_age_days": 1413,
"account_id": "ACCT-B4246A996E24",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.891
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 644,
"timestamp": "2026-01-06T11:47:00Z",
"transaction_amount_usd": 12168.13
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.497,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 2",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 482.16,
"financial_exposure_usd": 645.45,
"recoverable_pct": 0.694
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105936",
"label": "fraudulent",
"label_confidence": 0.778,
"severity": "medium",
"timestamp": "2026-01-05T02:56:00Z",
"trace_id": "e8617f3b-c8e7-0e3f-f9ce-e18dd1236055"
} | {
"account_age_days": 19,
"account_id": "ACCT-CDE67A9B9C9C",
"baseline_risk_score": 0.277,
"kyc_tier": "tier_3",
"session_entropy": 0.651
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 378,
"timestamp": "2026-01-04T23:22:00Z",
"transaction_amount_usd": 22.75
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.878,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 563848.4,
"financial_exposure_usd": 1139384.38,
"recoverable_pct": 0.56
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109371",
"label": "benign",
"label_confidence": 0.736,
"severity": "medium",
"timestamp": "2026-01-07T12:11:00Z",
"trace_id": "05030510-c2e4-6ef8-5636-6df03fa5061e"
} | {
"account_age_days": 1035,
"account_id": "ACCT-F533D4330C97",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.294
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 399,
"timestamp": "2026-01-07T05:38:00Z",
"transaction_amount_usd": 19.96
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.742,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1990.02,
"financial_exposure_usd": 2425.66,
"recoverable_pct": 0.961
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102177",
"label": "fraudulent",
"label_confidence": 0.883,
"severity": "high",
"timestamp": "2026-01-02T12:17:00Z",
"trace_id": "74a31bcf-c805-ff54-ca47-4b838a378f24"
} | {
"account_age_days": 1660,
"account_id": "ACCT-6D520DDB32F6",
"baseline_risk_score": 0.399,
"kyc_tier": "tier_2",
"session_entropy": 0.36
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 238,
"timestamp": "2026-01-02T12:17:00Z",
"transaction_amount_usd": 115066.02
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.903,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 619310.74,
"financial_exposure_usd": 880710.12,
"recoverable_pct": 0.228
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105000",
"label": "fraudulent",
"label_confidence": 0.895,
"severity": "high",
"timestamp": "2026-01-04T11:20:00Z",
"trace_id": "70658f3a-f2e6-1700-1f30-4197a716532c"
} | {
"account_age_days": 306,
"account_id": "ACCT-B72F2BE1A683",
"baseline_risk_score": 0.074,
"kyc_tier": "tier_1",
"session_entropy": 0.343
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 89,
"timestamp": "2026-01-04T11:20:00Z",
"transaction_amount_usd": 217731.44
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.78,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 6698547.03,
"financial_exposure_usd": 7419035.2,
"recoverable_pct": 0.628
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104213",
"label": "fraudulent",
"label_confidence": 0.702,
"severity": "low",
"timestamp": "2026-01-03T22:13:00Z",
"trace_id": "2a27172c-ae32-528f-ead8-15331979a1c2"
} | {
"account_age_days": 7,
"account_id": "ACCT-C1961D231984",
"baseline_risk_score": 0.159,
"kyc_tier": "tier_3",
"session_entropy": 0.79
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 315,
"timestamp": "2026-01-03T17:33:00Z",
"transaction_amount_usd": 16.16
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.407,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1558395.05,
"financial_exposure_usd": 3777161.04,
"recoverable_pct": 0.783
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102071",
"label": "fraudulent",
"label_confidence": 0.824,
"severity": "critical",
"timestamp": "2026-01-02T10:31:00Z",
"trace_id": "769afbc3-f5df-7979-2936-d8bc07027563"
} | {
"account_age_days": 1649,
"account_id": "ACCT-5E5195C01B5B",
"baseline_risk_score": 0.252,
"kyc_tier": "tier_1",
"session_entropy": 0.37
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 770,
"timestamp": "2026-01-02T10:31:00Z",
"transaction_amount_usd": 34692.39
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.636,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 456476.1,
"financial_exposure_usd": 689575.23,
"recoverable_pct": 0.529
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107037",
"label": "benign",
"label_confidence": 0.497,
"severity": "high",
"timestamp": "2026-01-05T21:17:00Z",
"trace_id": "e53a5963-1e5a-60c5-67a9-6f9ce9a58239"
} | {
"account_age_days": 812,
"account_id": "ACCT-E54EA6AB0D39",
"baseline_risk_score": 0.059,
"kyc_tier": "tier_1",
"session_entropy": 0.836
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 119,
"timestamp": "2026-01-05T21:17:00Z",
"transaction_amount_usd": 9403.31
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.6,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tra... | {
"customer_funds_at_risk_usd": 2274.1,
"financial_exposure_usd": 2711.29,
"recoverable_pct": 0.836
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108335",
"label": "benign",
"label_confidence": 0.557,
"severity": "low",
"timestamp": "2026-01-06T18:55:00Z",
"trace_id": "ce1b0fa7-4eab-3a93-236d-e1abe3503d92"
} | {
"account_age_days": 341,
"account_id": "ACCT-355630C845F1",
"baseline_risk_score": 0.066,
"kyc_tier": "tier_1",
"session_entropy": 0.768
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 589,
"timestamp": "2026-01-06T18:55:00Z",
"transaction_amount_usd": 3129.03
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.724,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3923.55,
"financial_exposure_usd": 4058.97,
"recoverable_pct": 0.653
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101241",
"label": "fraudulent",
"label_confidence": 0.864,
"severity": "high",
"timestamp": "2026-01-01T20:41:00Z",
"trace_id": "a5b31d23-d008-909b-ac6d-9547f9401b61"
} | {
"account_age_days": 861,
"account_id": "ACCT-A0AABC5290BB",
"baseline_risk_score": 0.448,
"kyc_tier": "tier_2",
"session_entropy": 0.778
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "BR",
"latency_ms": 215,
"timestamp": "2026-01-01T20:41:00Z",
"transaction_amount_usd": 7062.12
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.386,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 622301.44,
"financial_exposure_usd": 864509.57,
"recoverable_pct": 0.413
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102283",
"label": "fraudulent",
"label_confidence": 0.939,
"severity": "high",
"timestamp": "2026-01-02T14:03:00Z",
"trace_id": "48002164-df89-6a25-20a7-b1c2bf342260"
} | {
"account_age_days": 1294,
"account_id": "ACCT-DC39613F3E9E",
"baseline_risk_score": 0.314,
"kyc_tier": "tier_1",
"session_entropy": 0.136
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "HK",
"latency_ms": 461,
"timestamp": "2026-01-02T14:03:00Z",
"transaction_amount_usd": 23257.32
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.376,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 647778.87,
"financial_exposure_usd": 1072008.03,
"recoverable_pct": 0.405
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104237",
"label": "fraudulent",
"label_confidence": 0.865,
"severity": "medium",
"timestamp": "2026-01-03T22:37:00Z",
"trace_id": "b940fc19-94be-35bc-9af2-7fb81bdffc30"
} | {
"account_age_days": 314,
"account_id": "ACCT-AE6C1B218C0A",
"baseline_risk_score": 0.348,
"kyc_tier": "tier_3",
"session_entropy": 0.124
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 1081,
"timestamp": "2026-01-03T22:37:00Z",
"transaction_amount_usd": 791101.09
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.808,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 5330380.07,
"financial_exposure_usd": 5445838.53,
"recoverable_pct": 0.964
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107533",
"label": "benign",
"label_confidence": 0.462,
"severity": "high",
"timestamp": "2026-01-06T05:33:00Z",
"trace_id": "5b44bafd-eb13-ed41-de21-21f9da6f2ad2"
} | {
"account_age_days": 1477,
"account_id": "ACCT-CC19F6D0BA93",
"baseline_risk_score": 0.093,
"kyc_tier": "tier_3",
"session_entropy": 0.297
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 509,
"timestamp": "2026-01-06T05:33:00Z",
"transaction_amount_usd": 3773.8
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.587,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 2",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2666.83,
"financial_exposure_usd": 4122.74,
"recoverable_pct": 0.865
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107608",
"label": "benign",
"label_confidence": 0.608,
"severity": "medium",
"timestamp": "2026-01-06T06:48:00Z",
"trace_id": "718f2634-e284-4847-0104-edf0bd9fc485"
} | {
"account_age_days": 1059,
"account_id": "ACCT-289EDEB4E437",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.424
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 584,
"timestamp": "2026-01-06T06:48:00Z",
"transaction_amount_usd": 4140.72
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.586,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1392.64,
"financial_exposure_usd": 1439.35,
"recoverable_pct": 0.43
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109821",
"label": "benign",
"label_confidence": 0.61,
"severity": "medium",
"timestamp": "2026-01-07T19:41:00Z",
"trace_id": "846a6af6-5e2c-02bb-580c-dcc8be28a744"
} | {
"account_age_days": 5,
"account_id": "ACCT-ACB87A8621E8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.38
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 957,
"timestamp": "2026-01-07T19:41:00Z",
"transaction_amount_usd": 6204.94
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.46,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 2083.07,
"financial_exposure_usd": 3047.6,
"recoverable_pct": 0.995
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106257",
"label": "fraudulent",
"label_confidence": 0.657,
"severity": "medium",
"timestamp": "2026-01-05T08:17:00Z",
"trace_id": "0ea2000d-e0bf-b453-2b2a-2c23330a5b72"
} | {
"account_age_days": 827,
"account_id": "ACCT-1F42D2BE99E9",
"baseline_risk_score": 0.173,
"kyc_tier": "tier_2",
"session_entropy": 0.888
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 91,
"timestamp": "2026-01-05T08:17:00Z",
"transaction_amount_usd": 1914460.14
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.741,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4993984.23,
"financial_exposure_usd": 5365327.51,
"recoverable_pct": 0.847
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105556",
"label": "fraudulent",
"label_confidence": 0.699,
"severity": "low",
"timestamp": "2026-01-04T20:36:00Z",
"trace_id": "32f571bc-9b59-75fe-3756-5897909b7871"
} | {
"account_age_days": 1955,
"account_id": "ACCT-05049ACD4468",
"baseline_risk_score": 0.398,
"kyc_tier": "tier_2",
"session_entropy": 0.367
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 956,
"timestamp": "2026-01-04T20:36:00Z",
"transaction_amount_usd": 1885779.69
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.492,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 6889458.1,
"financial_exposure_usd": 9441159.05,
"recoverable_pct": 0.61
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106719",
"label": "benign",
"label_confidence": 0.596,
"severity": "medium",
"timestamp": "2026-01-05T15:59:00Z",
"trace_id": "364d51c5-2894-1fe4-6467-e2d0e6d9241f"
} | {
"account_age_days": 989,
"account_id": "ACCT-5908E4142806",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.892
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 817,
"timestamp": "2026-01-05T15:59:00Z",
"transaction_amount_usd": 1962.27
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.731,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 4049.69,
"financial_exposure_usd": 5672.26,
"recoverable_pct": 0.495
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101269",
"label": "fraudulent",
"label_confidence": 0.813,
"severity": "low",
"timestamp": "2026-01-01T21:09:00Z",
"trace_id": "15dd63cf-a810-e0f9-e656-3645312c9c9d"
} | {
"account_age_days": 1935,
"account_id": "ACCT-604E92FC0831",
"baseline_risk_score": 0.631,
"kyc_tier": "tier_2",
"session_entropy": 0.544
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 516,
"timestamp": "2026-01-01T21:09:00Z",
"transaction_amount_usd": 44799.22
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.358,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 311131.68,
"financial_exposure_usd": 490543.86,
"recoverable_pct": 0.508
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101838",
"label": "fraudulent",
"label_confidence": 0.94,
"severity": "high",
"timestamp": "2026-01-02T06:38:00Z",
"trace_id": "16af02bf-c8c0-9e7b-bb80-8d0bf143e217"
} | {
"account_age_days": 1930,
"account_id": "ACCT-C3680E03C60B",
"baseline_risk_score": 0.437,
"kyc_tier": "tier_3",
"session_entropy": 0.883
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 187,
"timestamp": "2026-01-02T06:38:00Z",
"transaction_amount_usd": 64869.76
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.563,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 1131705.26,
"financial_exposure_usd": 1463941.53,
"recoverable_pct": 0.495
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101919",
"label": "fraudulent",
"label_confidence": 0.902,
"severity": "high",
"timestamp": "2026-01-02T07:59:00Z",
"trace_id": "7d8f7e5f-811e-1254-7ebd-e82d95180d43"
} | {
"account_age_days": 118,
"account_id": "ACCT-8CDF94133D99",
"baseline_risk_score": 0.639,
"kyc_tier": "tier_3",
"session_entropy": 0.789
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 1030,
"timestamp": "2026-01-02T07:59:00Z",
"transaction_amount_usd": 119648.45
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.377,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 3",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 392500.32,
"financial_exposure_usd": 859465.79,
"recoverable_pct": 0.47
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106022",
"label": "fraudulent",
"label_confidence": 0.796,
"severity": "medium",
"timestamp": "2026-01-05T04:22:00Z",
"trace_id": "0ed44b9d-0d37-80de-9ce8-8d30033ef93c"
} | {
"account_age_days": 1940,
"account_id": "ACCT-095055F591B0",
"baseline_risk_score": 0.093,
"kyc_tier": "tier_2",
"session_entropy": 0.323
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 721,
"timestamp": "2026-01-05T04:22:00Z",
"transaction_amount_usd": 2341540.79
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.69,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 3366060.1,
"financial_exposure_usd": 5415579.19,
"recoverable_pct": 0.788
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109727",
"label": "benign",
"label_confidence": 0.689,
"severity": "medium",
"timestamp": "2026-01-07T18:07:00Z",
"trace_id": "c9ee8a54-0596-dd62-4173-155782a76fa4"
} | {
"account_age_days": 624,
"account_id": "ACCT-571384BBD50C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.467
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 210,
"timestamp": "2026-01-07T18:07:00Z",
"transaction_amount_usd": 5165.94
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.564,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2047.19,
"financial_exposure_usd": 2144.39,
"recoverable_pct": 0.791
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105780",
"label": "fraudulent",
"label_confidence": 0.625,
"severity": "medium",
"timestamp": "2026-01-05T00:20:00Z",
"trace_id": "2df08397-73c9-104a-432f-3cc8f93654f9"
} | {
"account_age_days": 587,
"account_id": "ACCT-2AE42578B0A3",
"baseline_risk_score": 0.133,
"kyc_tier": "tier_2",
"session_entropy": 0.74
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 208,
"timestamp": "2026-01-05T00:20:00Z",
"transaction_amount_usd": 1509319.35
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.89,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 4266517.55,
"financial_exposure_usd": 4645618.65,
"recoverable_pct": 0.45
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100601",
"label": "fraudulent",
"label_confidence": 0.852,
"severity": "critical",
"timestamp": "2026-01-01T10:01:00Z",
"trace_id": "4cafbbf2-0252-bebf-11d1-3c8aaa65cc1b"
} | {
"account_age_days": 1496,
"account_id": "ACCT-7D57C09D6137",
"baseline_risk_score": 0.38,
"kyc_tier": "tier_1",
"session_entropy": 0.276
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 233,
"timestamp": "2026-01-01T10:01:00Z",
"transaction_amount_usd": 72112.23
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.932,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 610121.43,
"financial_exposure_usd": 719762.4,
"recoverable_pct": 0.562
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103640",
"label": "fraudulent",
"label_confidence": 0.644,
"severity": "high",
"timestamp": "2026-01-03T12:40:00Z",
"trace_id": "dc7a7ec7-9a13-6b36-1724-df5d5120d92d"
} | {
"account_age_days": 963,
"account_id": "ACCT-676098A1DE2B",
"baseline_risk_score": 0.372,
"kyc_tier": "tier_1",
"session_entropy": 0.444
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 311,
"timestamp": "2026-01-03T12:40:00Z",
"transaction_amount_usd": 2790634.57
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.83,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4277320.23,
"financial_exposure_usd": 4916298.37,
"recoverable_pct": 0.415
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102875",
"label": "fraudulent",
"label_confidence": 0.78,
"severity": "critical",
"timestamp": "2026-01-02T23:55:00Z",
"trace_id": "d58f23a0-5ebb-afe9-25f2-6ec2e3b6ab7e"
} | {
"account_age_days": 584,
"account_id": "ACCT-2B63251A34C3",
"baseline_risk_score": 0.276,
"kyc_tier": "tier_3",
"session_entropy": 0.492
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 128,
"timestamp": "2026-01-02T18:22:00Z",
"transaction_amount_usd": 11.36
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.446,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 598283.15,
"financial_exposure_usd": 709248.97,
"recoverable_pct": 0.839
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109400",
"label": "benign",
"label_confidence": 0.64,
"severity": "medium",
"timestamp": "2026-01-07T12:40:00Z",
"trace_id": "b0beab97-ea36-d796-add8-1051cf89a86c"
} | {
"account_age_days": 1569,
"account_id": "ACCT-44AA207EB7EB",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.671
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 961,
"timestamp": "2026-01-07T12:40:00Z",
"transaction_amount_usd": 281.27
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.646,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 906.77,
"financial_exposure_usd": 1295.02,
"recoverable_pct": 0.716
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105903",
"label": "fraudulent",
"label_confidence": 0.899,
"severity": "high",
"timestamp": "2026-01-05T02:23:00Z",
"trace_id": "f92a3ba4-a361-c5aa-fa47-7a9522ef2f8e"
} | {
"account_age_days": 444,
"account_id": "ACCT-46F82963AB49",
"baseline_risk_score": 0.1,
"kyc_tier": "tier_1",
"session_entropy": 0.677
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 654,
"timestamp": "2026-01-05T02:23:00Z",
"transaction_amount_usd": 1440177.89
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.545,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1592461.7,
"financial_exposure_usd": 3195484.65,
"recoverable_pct": 0.661
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108088",
"label": "benign",
"label_confidence": 0.555,
"severity": "medium",
"timestamp": "2026-01-06T14:48:00Z",
"trace_id": "e3249546-a3fc-f10f-b86c-5a7f4aee20d2"
} | {
"account_age_days": 1583,
"account_id": "ACCT-2D273862FA90",
"baseline_risk_score": 0.167,
"kyc_tier": "tier_1",
"session_entropy": 0.561
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 197,
"timestamp": "2026-01-06T14:48:00Z",
"transaction_amount_usd": 5862.97
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.768,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1346.52,
"financial_exposure_usd": 1865.91,
"recoverable_pct": 0.534
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109204",
"label": "benign",
"label_confidence": 0.699,
"severity": "high",
"timestamp": "2026-01-07T09:24:00Z",
"trace_id": "15f9a512-f720-3480-7ca2-cafe7072754f"
} | {
"account_age_days": 1147,
"account_id": "ACCT-A4370907FC58",
"baseline_risk_score": 0.096,
"kyc_tier": "tier_3",
"session_entropy": 0.821
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 542,
"timestamp": "2026-01-07T09:24:00Z",
"transaction_amount_usd": 5792.5
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.522,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2683.41,
"financial_exposure_usd": 3202.73,
"recoverable_pct": 0.552
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100219",
"label": "fraudulent",
"label_confidence": 0.875,
"severity": "high",
"timestamp": "2026-01-01T03:39:00Z",
"trace_id": "5dde7466-7f03-66ef-7027-24eb060fc65e"
} | {
"account_age_days": 1047,
"account_id": "ACCT-AAC5E8A32567",
"baseline_risk_score": 0.503,
"kyc_tier": "tier_1",
"session_entropy": 0.208
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 222,
"timestamp": "2025-12-31T19:49:00Z",
"transaction_amount_usd": 10.47
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.637,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 729620.96,
"financial_exposure_usd": 986381.56,
"recoverable_pct": 0.21
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104626",
"label": "fraudulent",
"label_confidence": 0.805,
"severity": "high",
"timestamp": "2026-01-04T05:06:00Z",
"trace_id": "18cc0e9f-e7af-53c1-827e-d1a118ac2dc6"
} | {
"account_age_days": 1194,
"account_id": "ACCT-FAD872DB961E",
"baseline_risk_score": 0.098,
"kyc_tier": "tier_2",
"session_entropy": 0.436
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 957,
"timestamp": "2026-01-04T05:06:00Z",
"transaction_amount_usd": 1296532.14
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.487,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 5760407.76,
"financial_exposure_usd": 6071112.78,
"recoverable_pct": 0.598
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101551",
"label": "fraudulent",
"label_confidence": 0.825,
"severity": "high",
"timestamp": "2026-01-02T01:51:00Z",
"trace_id": "1e1b2606-2cb7-ae1f-a1d9-01ec077cad7e"
} | {
"account_age_days": 383,
"account_id": "ACCT-0A1161187521",
"baseline_risk_score": 0.573,
"kyc_tier": "tier_1",
"session_entropy": 0.423
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 167,
"timestamp": "2026-01-02T01:11:00Z",
"transaction_amount_usd": 15.19
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.502,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 475406.32,
"financial_exposure_usd": 526271.76,
"recoverable_pct": 0.777
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107681",
"label": "benign",
"label_confidence": 0.461,
"severity": "low",
"timestamp": "2026-01-06T08:01:00Z",
"trace_id": "71961d0c-e984-a34e-7f1d-f1861f3258f7"
} | {
"account_age_days": 1014,
"account_id": "ACCT-8E216588A291",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.356
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 986,
"timestamp": "2026-01-06T08:01:00Z",
"transaction_amount_usd": 409.56
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.678,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 5732.7,
"financial_exposure_usd": 6905.12,
"recoverable_pct": 0.498
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.