schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100928",
"label": "fraudulent",
"label_confidence": 0.934,
"severity": "critical",
"timestamp": "2026-01-01T15:28:00Z",
"trace_id": "d791f01a-7abf-1053-e287-4082ca1b80b9"
} | {
"account_age_days": 1807,
"account_id": "ACCT-AD64CF1C1723",
"baseline_risk_score": 0.563,
"kyc_tier": "tier_3",
"session_entropy": 0.158
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 1181,
"timestamp": "2026-01-01T15:28:00Z",
"transaction_amount_usd": 19277.23
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.451,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 339160.46,
"financial_exposure_usd": 492209.78,
"recoverable_pct": 0.197
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106261",
"label": "fraudulent",
"label_confidence": 0.921,
"severity": "medium",
"timestamp": "2026-01-05T08:21:00Z",
"trace_id": "fce24094-0096-75d7-8236-5acf911a42b6"
} | {
"account_age_days": 813,
"account_id": "ACCT-4FF1DD05AFA2",
"baseline_risk_score": 0.449,
"kyc_tier": "tier_1",
"session_entropy": 0.705
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 123,
"timestamp": "2026-01-05T08:21:00Z",
"transaction_amount_usd": 773397.69
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.905,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3262980.15,
"financial_exposure_usd": 3423996.28,
"recoverable_pct": 0.49
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107721",
"label": "benign",
"label_confidence": 0.741,
"severity": "low",
"timestamp": "2026-01-06T08:41:00Z",
"trace_id": "bfa0df0d-fa95-8b3a-81aa-363f6f4b97ae"
} | {
"account_age_days": 1971,
"account_id": "ACCT-D64F2A68086C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.708
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 854,
"timestamp": "2026-01-06T08:41:00Z",
"transaction_amount_usd": 7929.94
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.665,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3548.02,
"financial_exposure_usd": 4156.56,
"recoverable_pct": 0.843
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108820",
"label": "benign",
"label_confidence": 0.643,
"severity": "high",
"timestamp": "2026-01-07T03:00:00Z",
"trace_id": "edd20d72-3a5f-fd72-ca2e-93397d65e36d"
} | {
"account_age_days": 67,
"account_id": "ACCT-A8382536827D",
"baseline_risk_score": 0.114,
"kyc_tier": "tier_3",
"session_entropy": 0.282
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 1004,
"timestamp": "2026-01-07T03:00:00Z",
"transaction_amount_usd": 10389.5
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.478,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1794.78,
"financial_exposure_usd": 2620.49,
"recoverable_pct": 0.837
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102813",
"label": "fraudulent",
"label_confidence": 0.929,
"severity": "medium",
"timestamp": "2026-01-02T22:53:00Z",
"trace_id": "9703dba6-6ff3-9ec3-3391-e35a7b911f0a"
} | {
"account_age_days": 557,
"account_id": "ACCT-6112A46E4CE0",
"baseline_risk_score": 0.31,
"kyc_tier": "tier_2",
"session_entropy": 0.788
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 147,
"timestamp": "2026-01-02T16:35:00Z",
"transaction_amount_usd": 19.79
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.738,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 306364,
"financial_exposure_usd": 475470.68,
"recoverable_pct": 0.565
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101374",
"label": "fraudulent",
"label_confidence": 0.969,
"severity": "medium",
"timestamp": "2026-01-01T22:54:00Z",
"trace_id": "38ec5fe7-db43-bfcc-23e9-99687edcae87"
} | {
"account_age_days": 1507,
"account_id": "ACCT-FA8E79864269",
"baseline_risk_score": 0.358,
"kyc_tier": "tier_3",
"session_entropy": 0.502
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 828,
"timestamp": "2026-01-01T22:54:00Z",
"transaction_amount_usd": 31627.46
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.402,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 123119.35,
"financial_exposure_usd": 152936.44,
"recoverable_pct": 0.184
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105352",
"label": "fraudulent",
"label_confidence": 0.675,
"severity": "medium",
"timestamp": "2026-01-04T17:12:00Z",
"trace_id": "bc734eb4-5f10-6954-ccef-76ea85f2a837"
} | {
"account_age_days": 834,
"account_id": "ACCT-3788915A94F6",
"baseline_risk_score": 0.433,
"kyc_tier": "tier_3",
"session_entropy": 0.119
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 719,
"timestamp": "2026-01-04T17:12:00Z",
"transaction_amount_usd": 2109915.91
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.834,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5113070.63,
"financial_exposure_usd": 5912038.56,
"recoverable_pct": 0.838
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105632",
"label": "fraudulent",
"label_confidence": 0.895,
"severity": "high",
"timestamp": "2026-01-04T21:52:00Z",
"trace_id": "e6bdbae5-c61b-1e4b-daa1-5589c1ff6366"
} | {
"account_age_days": 1873,
"account_id": "ACCT-6457F44795B4",
"baseline_risk_score": 0.097,
"kyc_tier": "tier_2",
"session_entropy": 0.252
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 782,
"timestamp": "2026-01-04T21:52:00Z",
"transaction_amount_usd": 1519181.44
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.467,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1475730.37,
"financial_exposure_usd": 2867342.43,
"recoverable_pct": 0.623
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107902",
"label": "benign",
"label_confidence": 0.567,
"severity": "low",
"timestamp": "2026-01-06T11:42:00Z",
"trace_id": "f11c0f10-a0d9-6e08-786d-ac5f9134c3db"
} | {
"account_age_days": 317,
"account_id": "ACCT-F65A9291648E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.596
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 612,
"timestamp": "2026-01-06T11:42:00Z",
"transaction_amount_usd": 5000.31
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.685,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1749.64,
"financial_exposure_usd": 1982.04,
"recoverable_pct": 0.508
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101614",
"label": "fraudulent",
"label_confidence": 0.751,
"severity": "high",
"timestamp": "2026-01-02T02:54:00Z",
"trace_id": "5946892b-3f44-1be5-c326-1bcf981eec0d"
} | {
"account_age_days": 597,
"account_id": "ACCT-6BB3D47773C4",
"baseline_risk_score": 0.645,
"kyc_tier": "tier_1",
"session_entropy": 0.543
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 294,
"timestamp": "2026-01-02T02:54:00Z",
"transaction_amount_usd": 76289.2
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.389,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 311184.96,
"financial_exposure_usd": 326718.14,
"recoverable_pct": 0.016
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107407",
"label": "benign",
"label_confidence": 0.462,
"severity": "medium",
"timestamp": "2026-01-06T03:27:00Z",
"trace_id": "d683d4bc-7dcf-5778-3071-83d32370ca4b"
} | {
"account_age_days": 1418,
"account_id": "ACCT-28434A656F1E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.42
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 375,
"timestamp": "2026-01-06T03:27:00Z",
"transaction_amount_usd": 10386.13
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.501,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 484.27,
"financial_exposure_usd": 510.58,
"recoverable_pct": 0.477
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109425",
"label": "benign",
"label_confidence": 0.687,
"severity": "medium",
"timestamp": "2026-01-07T13:05:00Z",
"trace_id": "5156f7f3-32bd-e19f-9d17-75f763a157c1"
} | {
"account_age_days": 10,
"account_id": "ACCT-B15ED5FDF175",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.346
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 301,
"timestamp": "2026-01-07T04:05:00Z",
"transaction_amount_usd": 10.05
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.715,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2379.64,
"financial_exposure_usd": 3799.1,
"recoverable_pct": 0.945
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109825",
"label": "benign",
"label_confidence": 0.546,
"severity": "low",
"timestamp": "2026-01-07T19:45:00Z",
"trace_id": "2f3aa687-f5dc-f33c-56da-e9a7e38d8929"
} | {
"account_age_days": 530,
"account_id": "ACCT-669D9149D6EF",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.715
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 227,
"timestamp": "2026-01-07T18:10:00Z",
"transaction_amount_usd": 23.66
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.547,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1194.01,
"financial_exposure_usd": 2049.83,
"recoverable_pct": 0.452
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103848",
"label": "fraudulent",
"label_confidence": 0.604,
"severity": "low",
"timestamp": "2026-01-03T16:08:00Z",
"trace_id": "c318fcc4-7e3c-9e2c-d0d7-8a5f98633ce6"
} | {
"account_age_days": 39,
"account_id": "ACCT-05692788FCED",
"baseline_risk_score": 0.258,
"kyc_tier": "tier_1",
"session_entropy": 0.915
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 715,
"timestamp": "2026-01-03T16:08:00Z",
"transaction_amount_usd": 554247.51
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.424,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3008603.97,
"financial_exposure_usd": 4729432.3,
"recoverable_pct": 0.843
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105248",
"label": "fraudulent",
"label_confidence": 0.939,
"severity": "medium",
"timestamp": "2026-01-04T15:28:00Z",
"trace_id": "7225d0ab-2542-4576-2000-9e045fbbde36"
} | {
"account_age_days": 1428,
"account_id": "ACCT-A37E47404DFB",
"baseline_risk_score": 0.139,
"kyc_tier": "tier_2",
"session_entropy": 0.948
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 169,
"timestamp": "2026-01-04T05:04:00Z",
"transaction_amount_usd": 13.66
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.77,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2054108.41,
"financial_exposure_usd": 2647195.5,
"recoverable_pct": 0.567
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102220",
"label": "fraudulent",
"label_confidence": 0.931,
"severity": "low",
"timestamp": "2026-01-02T13:00:00Z",
"trace_id": "30bb472d-97fd-431c-ede8-d18126bd9620"
} | {
"account_age_days": 421,
"account_id": "ACCT-B91360A04A21",
"baseline_risk_score": 0.648,
"kyc_tier": "tier_2",
"session_entropy": 0.599
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 368,
"timestamp": "2026-01-02T01:34:00Z",
"transaction_amount_usd": 11.07
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.555,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 9",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 601309.29,
"financial_exposure_usd": 634536.43,
"recoverable_pct": 0.473
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105283",
"label": "fraudulent",
"label_confidence": 0.61,
"severity": "low",
"timestamp": "2026-01-04T16:03:00Z",
"trace_id": "19aa41c8-9839-6cec-fb6d-704f356efa98"
} | {
"account_age_days": 145,
"account_id": "ACCT-073E73B8A6C1",
"baseline_risk_score": 0.16,
"kyc_tier": "tier_1",
"session_entropy": 0.827
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 1010,
"timestamp": "2026-01-04T16:03:00Z",
"transaction_amount_usd": 2877896.5
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.609,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3248489.61,
"financial_exposure_usd": 7058273.64,
"recoverable_pct": 0.43
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100868",
"label": "fraudulent",
"label_confidence": 0.959,
"severity": "critical",
"timestamp": "2026-01-01T14:28:00Z",
"trace_id": "ba6dbd38-115a-9359-4984-fcee38bb30ab"
} | {
"account_age_days": 1743,
"account_id": "ACCT-05F9579E034A",
"baseline_risk_score": 0.646,
"kyc_tier": "tier_3",
"session_entropy": 0.127
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 828,
"timestamp": "2026-01-01T14:28:00Z",
"transaction_amount_usd": 103706.08
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.674,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 269026.85,
"financial_exposure_usd": 270325.35,
"recoverable_pct": 0.441
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107190",
"label": "benign",
"label_confidence": 0.748,
"severity": "medium",
"timestamp": "2026-01-05T23:50:00Z",
"trace_id": "1b8a94cd-8683-4bf0-50c3-0b4fbe39cc0f"
} | {
"account_age_days": 821,
"account_id": "ACCT-B227A51BAAD3",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.581
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 1156,
"timestamp": "2026-01-05T23:50:00Z",
"transaction_amount_usd": 5148.43
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.485,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 4049.55,
"financial_exposure_usd": 6077.55,
"recoverable_pct": 0.568
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102644",
"label": "fraudulent",
"label_confidence": 0.917,
"severity": "critical",
"timestamp": "2026-01-02T20:04:00Z",
"trace_id": "82c33c76-69a3-1579-7fe3-52fc503f0e3b"
} | {
"account_age_days": 456,
"account_id": "ACCT-3449F54340A5",
"baseline_risk_score": 0.41,
"kyc_tier": "tier_2",
"session_entropy": 0.309
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 180,
"timestamp": "2026-01-02T16:42:00Z",
"transaction_amount_usd": 18.07
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.651,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 336207.03,
"financial_exposure_usd": 404368.85,
"recoverable_pct": 0.469
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102505",
"label": "fraudulent",
"label_confidence": 0.789,
"severity": "low",
"timestamp": "2026-01-02T17:45:00Z",
"trace_id": "7c8cc710-a895-4410-ee53-9e1087ff31eb"
} | {
"account_age_days": 484,
"account_id": "ACCT-D95B8405B0AB",
"baseline_risk_score": 0.546,
"kyc_tier": "tier_3",
"session_entropy": 0.631
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 259,
"timestamp": "2026-01-02T13:56:00Z",
"transaction_amount_usd": 10.66
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.35,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 300690.83,
"financial_exposure_usd": 499660.34,
"recoverable_pct": 0.451
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109887",
"label": "benign",
"label_confidence": 0.464,
"severity": "critical",
"timestamp": "2026-01-07T20:47:00Z",
"trace_id": "970058f5-dd5b-640b-d738-528e0d639174"
} | {
"account_age_days": 267,
"account_id": "ACCT-499BFDED2F51",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.219
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 116,
"timestamp": "2026-01-07T20:47:00Z",
"transaction_amount_usd": 4534.68
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.671,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 874.05,
"financial_exposure_usd": 1232.53,
"recoverable_pct": 0.786
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108411",
"label": "benign",
"label_confidence": 0.515,
"severity": "low",
"timestamp": "2026-01-06T20:11:00Z",
"trace_id": "50518bcc-7c15-8e19-78c5-ab8337144237"
} | {
"account_age_days": 389,
"account_id": "ACCT-AE980E82219E",
"baseline_risk_score": 0.064,
"kyc_tier": "tier_1",
"session_entropy": 0.82
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 731,
"timestamp": "2026-01-06T20:11:00Z",
"transaction_amount_usd": 13948.65
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.728,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 5267.06,
"financial_exposure_usd": 5402.15,
"recoverable_pct": 0.752
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108868",
"label": "benign",
"label_confidence": 0.719,
"severity": "low",
"timestamp": "2026-01-07T03:48:00Z",
"trace_id": "3140d865-c6ee-f79f-bc27-9e69a1adf657"
} | {
"account_age_days": 542,
"account_id": "ACCT-AC4E7A530730",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.889
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 987,
"timestamp": "2026-01-07T03:48:00Z",
"transaction_amount_usd": 4287.07
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.667,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1738.68,
"financial_exposure_usd": 3079,
"recoverable_pct": 0.724
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109401",
"label": "benign",
"label_confidence": 0.735,
"severity": "low",
"timestamp": "2026-01-07T12:41:00Z",
"trace_id": "58a26c95-c031-cff9-d584-3f78c2dca8a8"
} | {
"account_age_days": 1618,
"account_id": "ACCT-DB249D822956",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.407
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 608,
"timestamp": "2026-01-07T12:41:00Z",
"transaction_amount_usd": 4766.08
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.546,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2413.74,
"financial_exposure_usd": 2628.78,
"recoverable_pct": 0.862
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101338",
"label": "fraudulent",
"label_confidence": 0.909,
"severity": "critical",
"timestamp": "2026-01-01T22:18:00Z",
"trace_id": "2ab287bb-21a3-36d0-d973-19e635cd136d"
} | {
"account_age_days": 1415,
"account_id": "ACCT-312F1ABAE03C",
"baseline_risk_score": 0.318,
"kyc_tier": "tier_2",
"session_entropy": 0.386
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 378,
"timestamp": "2026-01-01T10:20:00Z",
"transaction_amount_usd": 4.87
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.689,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 316185.59,
"financial_exposure_usd": 340999.16,
"recoverable_pct": 0.52
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107220",
"label": "benign",
"label_confidence": 0.741,
"severity": "medium",
"timestamp": "2026-01-06T00:20:00Z",
"trace_id": "2fde43a3-674c-73c6-aaea-0841c977ced9"
} | {
"account_age_days": 1026,
"account_id": "ACCT-373D026F7CE7",
"baseline_risk_score": 0.195,
"kyc_tier": "tier_2",
"session_entropy": 0.585
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 1125,
"timestamp": "2026-01-06T00:20:00Z",
"transaction_amount_usd": 1368.21
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.494,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 563.92,
"financial_exposure_usd": 690.08,
"recoverable_pct": 0.795
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101601",
"label": "fraudulent",
"label_confidence": 0.758,
"severity": "high",
"timestamp": "2026-01-02T02:41:00Z",
"trace_id": "875c16bd-3ecc-cb0e-be6c-256a7eb084b6"
} | {
"account_age_days": 1823,
"account_id": "ACCT-80393171ABA7",
"baseline_risk_score": 0.252,
"kyc_tier": "tier_1",
"session_entropy": 0.332
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 707,
"timestamp": "2026-01-02T02:41:00Z",
"transaction_amount_usd": 108542.55
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.841,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 256903.65,
"financial_exposure_usd": 369684.64,
"recoverable_pct": 0.567
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105389",
"label": "fraudulent",
"label_confidence": 0.882,
"severity": "high",
"timestamp": "2026-01-04T17:49:00Z",
"trace_id": "f410cc0c-fc14-52cd-fdaa-bef07fbe5f0b"
} | {
"account_age_days": 963,
"account_id": "ACCT-31610E6D66BB",
"baseline_risk_score": 0.171,
"kyc_tier": "tier_1",
"session_entropy": 0.754
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 200,
"timestamp": "2026-01-04T17:49:00Z",
"transaction_amount_usd": 1463758.25
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.502,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5425849.88,
"financial_exposure_usd": 6206380.88,
"recoverable_pct": 0.838
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101573",
"label": "fraudulent",
"label_confidence": 0.922,
"severity": "low",
"timestamp": "2026-01-02T02:13:00Z",
"trace_id": "2f5cebba-5fa8-8ade-c01b-d1a0ae909a97"
} | {
"account_age_days": 961,
"account_id": "ACCT-796C0BF9763C",
"baseline_risk_score": 0.491,
"kyc_tier": "tier_3",
"session_entropy": 0.404
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NL",
"latency_ms": 504,
"timestamp": "2026-01-02T02:13:00Z",
"transaction_amount_usd": 47973.56
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.373,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 385841.29,
"financial_exposure_usd": 609703.29,
"recoverable_pct": 0.812
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108376",
"label": "benign",
"label_confidence": 0.681,
"severity": "high",
"timestamp": "2026-01-06T19:36:00Z",
"trace_id": "7ff026df-ce0a-601b-5483-28254909cd80"
} | {
"account_age_days": 1996,
"account_id": "ACCT-D3FDAB9A7BB3",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.758
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 122,
"timestamp": "2026-01-06T19:36:00Z",
"transaction_amount_usd": 9972.72
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.594,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3801.48,
"financial_exposure_usd": 3834.6,
"recoverable_pct": 0.814
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108791",
"label": "benign",
"label_confidence": 0.53,
"severity": "low",
"timestamp": "2026-01-07T02:31:00Z",
"trace_id": "e4b32574-4617-61ba-068a-04cec259a35c"
} | {
"account_age_days": 23,
"account_id": "ACCT-A765A54420F1",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.255
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 782,
"timestamp": "2026-01-07T02:31:00Z",
"transaction_amount_usd": 2344.76
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.76,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 1272.65,
"financial_exposure_usd": 1687.45,
"recoverable_pct": 0.958
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104478",
"label": "fraudulent",
"label_confidence": 0.732,
"severity": "high",
"timestamp": "2026-01-04T02:38:00Z",
"trace_id": "5e84fd67-9cec-85b2-5444-bcd1ad3045f2"
} | {
"account_age_days": 1211,
"account_id": "ACCT-B478CA45CAC8",
"baseline_risk_score": 0.172,
"kyc_tier": "tier_1",
"session_entropy": 0.683
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 254,
"timestamp": "2026-01-04T01:24:00Z",
"transaction_amount_usd": 10.53
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.749,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2476133.02,
"financial_exposure_usd": 4254053.35,
"recoverable_pct": 0.642
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105223",
"label": "fraudulent",
"label_confidence": 0.9,
"severity": "high",
"timestamp": "2026-01-04T15:03:00Z",
"trace_id": "8c6f4136-6861-6be4-72a2-00bfc26d8ae0"
} | {
"account_age_days": 1770,
"account_id": "ACCT-B38EDB0DFBF6",
"baseline_risk_score": 0.201,
"kyc_tier": "tier_1",
"session_entropy": 0.444
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 332,
"timestamp": "2026-01-04T15:03:00Z",
"transaction_amount_usd": 129313.93
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.558,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4392787.56,
"financial_exposure_usd": 4407968.46,
"recoverable_pct": 0.564
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105623",
"label": "fraudulent",
"label_confidence": 0.945,
"severity": "critical",
"timestamp": "2026-01-04T21:43:00Z",
"trace_id": "f92a7aff-8968-1097-3db7-f7bce39ec008"
} | {
"account_age_days": 1290,
"account_id": "ACCT-180588691228",
"baseline_risk_score": 0.087,
"kyc_tier": "tier_3",
"session_entropy": 0.304
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 404,
"timestamp": "2026-01-04T21:43:00Z",
"transaction_amount_usd": 2009138.35
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.447,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2735743.65,
"financial_exposure_usd": 4852434.04,
"recoverable_pct": 0.579
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104462",
"label": "fraudulent",
"label_confidence": 0.875,
"severity": "medium",
"timestamp": "2026-01-04T02:22:00Z",
"trace_id": "b9fa66dc-3663-aaaf-3325-698af2e55dc6"
} | {
"account_age_days": 1822,
"account_id": "ACCT-9B2DDE22BEB7",
"baseline_risk_score": 0.149,
"kyc_tier": "tier_1",
"session_entropy": 0.408
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 672,
"timestamp": "2026-01-04T02:22:00Z",
"transaction_amount_usd": 1521369.6
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.931,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2325290.47,
"financial_exposure_usd": 3538281.43,
"recoverable_pct": 0.86
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108033",
"label": "benign",
"label_confidence": 0.485,
"severity": "low",
"timestamp": "2026-01-06T13:53:00Z",
"trace_id": "9db333a3-64b6-1653-1241-5ea703b667d3"
} | {
"account_age_days": 1855,
"account_id": "ACCT-0F7B4FBB69A4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.929
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 1103,
"timestamp": "2026-01-06T13:53:00Z",
"transaction_amount_usd": 11502.89
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.513,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 836.97,
"financial_exposure_usd": 1337.73,
"recoverable_pct": 0.754
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103766",
"label": "fraudulent",
"label_confidence": 0.898,
"severity": "medium",
"timestamp": "2026-01-03T14:46:00Z",
"trace_id": "a52293bb-14e6-3d30-82cf-bc798c279e57"
} | {
"account_age_days": 1971,
"account_id": "ACCT-A9A4E1E64EA3",
"baseline_risk_score": 0.168,
"kyc_tier": "tier_3",
"session_entropy": 0.404
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 359,
"timestamp": "2026-01-03T09:26:00Z",
"transaction_amount_usd": 1.45
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.934,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 5470555.66,
"financial_exposure_usd": 6403192,
"recoverable_pct": 0.668
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102683",
"label": "fraudulent",
"label_confidence": 0.822,
"severity": "high",
"timestamp": "2026-01-02T20:43:00Z",
"trace_id": "3a5163f7-e926-03a1-ad49-86a3cc910c74"
} | {
"account_age_days": 22,
"account_id": "ACCT-25CEC9CB1C18",
"baseline_risk_score": 0.529,
"kyc_tier": "tier_3",
"session_entropy": 0.324
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 295,
"timestamp": "2026-01-02T11:49:00Z",
"transaction_amount_usd": 15.24
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.518,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 477156.91,
"financial_exposure_usd": 674202.64,
"recoverable_pct": 0.567
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104190",
"label": "fraudulent",
"label_confidence": 0.828,
"severity": "high",
"timestamp": "2026-01-03T21:50:00Z",
"trace_id": "c0be3e8e-38df-0840-3f35-514326abb177"
} | {
"account_age_days": 1424,
"account_id": "ACCT-9831BC822269",
"baseline_risk_score": 0.077,
"kyc_tier": "tier_1",
"session_entropy": 0.768
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 615,
"timestamp": "2026-01-03T21:50:00Z",
"transaction_amount_usd": 1773225.55
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.692,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1706440.36,
"financial_exposure_usd": 2942170.94,
"recoverable_pct": 0.77
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104395",
"label": "fraudulent",
"label_confidence": 0.928,
"severity": "high",
"timestamp": "2026-01-04T01:15:00Z",
"trace_id": "b8142bfd-a9ed-4ebf-22ac-ef3599e3c159"
} | {
"account_age_days": 927,
"account_id": "ACCT-774B5E491243",
"baseline_risk_score": 0.318,
"kyc_tier": "tier_2",
"session_entropy": 0.55
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 1008,
"timestamp": "2026-01-04T01:15:00Z",
"transaction_amount_usd": 652314.52
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.503,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4391311.46,
"financial_exposure_usd": 5751747.06,
"recoverable_pct": 0.912
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105899",
"label": "fraudulent",
"label_confidence": 0.771,
"severity": "medium",
"timestamp": "2026-01-05T02:19:00Z",
"trace_id": "81f79144-0ac9-a9c3-e91f-577de95d3455"
} | {
"account_age_days": 1782,
"account_id": "ACCT-A886A62D98E1",
"baseline_risk_score": 0.331,
"kyc_tier": "tier_1",
"session_entropy": 0.189
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 215,
"timestamp": "2026-01-04T20:40:00Z",
"transaction_amount_usd": 9.42
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.701,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3895286.25,
"financial_exposure_usd": 4386362.41,
"recoverable_pct": 0.883
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109113",
"label": "benign",
"label_confidence": 0.696,
"severity": "medium",
"timestamp": "2026-01-07T07:53:00Z",
"trace_id": "9061faa0-44a8-2233-a75d-a124a6a9691e"
} | {
"account_age_days": 1773,
"account_id": "ACCT-60C34037114C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.536
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 927,
"timestamp": "2026-01-07T07:53:00Z",
"transaction_amount_usd": 9222.76
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.788,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 455.53,
"financial_exposure_usd": 1059.13,
"recoverable_pct": 0.823
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106380",
"label": "fraudulent",
"label_confidence": 0.707,
"severity": "medium",
"timestamp": "2026-01-05T10:20:00Z",
"trace_id": "a43933d1-f8c6-3665-7ca6-4946542e7218"
} | {
"account_age_days": 1290,
"account_id": "ACCT-0247472E2C77",
"baseline_risk_score": 0.119,
"kyc_tier": "tier_2",
"session_entropy": 0.141
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 520,
"timestamp": "2026-01-05T10:20:00Z",
"transaction_amount_usd": 2674886.4
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.749,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3605064.67,
"financial_exposure_usd": 5498060.57,
"recoverable_pct": 0.673
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108708",
"label": "benign",
"label_confidence": 0.556,
"severity": "high",
"timestamp": "2026-01-07T01:08:00Z",
"trace_id": "ee10eaa4-7ef5-f8e6-75a6-8cf9e4f869d0"
} | {
"account_age_days": 1184,
"account_id": "ACCT-2EBE74FDEFC0",
"baseline_risk_score": 0.098,
"kyc_tier": "tier_2",
"session_entropy": 0.909
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 801,
"timestamp": "2026-01-07T01:08:00Z",
"transaction_amount_usd": 10936.52
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.526,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1431.39,
"financial_exposure_usd": 1449.49,
"recoverable_pct": 0.865
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101616",
"label": "fraudulent",
"label_confidence": 0.846,
"severity": "medium",
"timestamp": "2026-01-02T02:56:00Z",
"trace_id": "62d6a373-6fe5-6c2d-be83-78f38163b32b"
} | {
"account_age_days": 1920,
"account_id": "ACCT-10058C8678BC",
"baseline_risk_score": 0.556,
"kyc_tier": "tier_1",
"session_entropy": 0.162
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 317,
"timestamp": "2026-01-01T16:37:00Z",
"transaction_amount_usd": 18.86
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.943,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 286820.32,
"financial_exposure_usd": 302917.54,
"recoverable_pct": 0.22
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109063",
"label": "benign",
"label_confidence": 0.737,
"severity": "low",
"timestamp": "2026-01-07T07:03:00Z",
"trace_id": "7f49a114-2987-2f69-7c28-1ac04f781efb"
} | {
"account_age_days": 137,
"account_id": "ACCT-62E7B1B44D9E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.239
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 347,
"timestamp": "2026-01-07T07:03:00Z",
"transaction_amount_usd": 8023.78
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.546,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2896.21,
"financial_exposure_usd": 3557.11,
"recoverable_pct": 0.989
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107882",
"label": "benign",
"label_confidence": 0.684,
"severity": "critical",
"timestamp": "2026-01-06T11:22:00Z",
"trace_id": "eae5e3b0-524c-f17f-f3f4-e26f6bb9ec2a"
} | {
"account_age_days": 351,
"account_id": "ACCT-0F4C11A5179C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.915
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 1069,
"timestamp": "2026-01-06T11:22:00Z",
"transaction_amount_usd": 10579.3
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.588,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2294.46,
"financial_exposure_usd": 3307.24,
"recoverable_pct": 0.407
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104477",
"label": "fraudulent",
"label_confidence": 0.851,
"severity": "medium",
"timestamp": "2026-01-04T02:37:00Z",
"trace_id": "5e6c4d4f-5cc4-4561-007b-99acdcb88257"
} | {
"account_age_days": 225,
"account_id": "ACCT-2DCA5F9F77FA",
"baseline_risk_score": 0.444,
"kyc_tier": "tier_1",
"session_entropy": 0.386
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 506,
"timestamp": "2026-01-04T02:37:00Z",
"transaction_amount_usd": 1560390.98
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.719,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3978729.96,
"financial_exposure_usd": 4337736.93,
"recoverable_pct": 0.562
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109578",
"label": "benign",
"label_confidence": 0.466,
"severity": "medium",
"timestamp": "2026-01-07T15:38:00Z",
"trace_id": "1bf7c056-1f3a-afe9-6988-5f3acc0218e2"
} | {
"account_age_days": 1589,
"account_id": "ACCT-377440C63C44",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.822
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 491,
"timestamp": "2026-01-07T15:38:00Z",
"transaction_amount_usd": 14049.45
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.487,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1255.52,
"financial_exposure_usd": 2062.64,
"recoverable_pct": 0.515
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103072",
"label": "fraudulent",
"label_confidence": 0.828,
"severity": "high",
"timestamp": "2026-01-03T03:12:00Z",
"trace_id": "56badfed-abc0-17a8-653e-b3e63fcc1260"
} | {
"account_age_days": 1331,
"account_id": "ACCT-C212DD368763",
"baseline_risk_score": 0.359,
"kyc_tier": "tier_2",
"session_entropy": 0.93
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 757,
"timestamp": "2026-01-03T03:12:00Z",
"transaction_amount_usd": 97681.5
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.622,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 328197.74,
"financial_exposure_usd": 583937.43,
"recoverable_pct": 0.413
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105244",
"label": "fraudulent",
"label_confidence": 0.729,
"severity": "high",
"timestamp": "2026-01-04T15:24:00Z",
"trace_id": "c33057f3-cb42-a645-0964-23d50ec28c19"
} | {
"account_age_days": 882,
"account_id": "ACCT-3642D8C6AFBA",
"baseline_risk_score": 0.385,
"kyc_tier": "tier_2",
"session_entropy": 0.732
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 372,
"timestamp": "2026-01-04T15:24:00Z",
"transaction_amount_usd": 2470883.88
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.464,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4133516.3,
"financial_exposure_usd": 4565931.04,
"recoverable_pct": 0.674
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103301",
"label": "fraudulent",
"label_confidence": 0.835,
"severity": "low",
"timestamp": "2026-01-03T07:01:00Z",
"trace_id": "ec03baf6-2bb6-2ccc-1658-8c5a09f8c6cc"
} | {
"account_age_days": 1323,
"account_id": "ACCT-200C0F9E9D53",
"baseline_risk_score": 0.271,
"kyc_tier": "tier_2",
"session_entropy": 0.349
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 178,
"timestamp": "2026-01-03T07:01:00Z",
"transaction_amount_usd": 52660.59
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.594,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 733339.22,
"financial_exposure_usd": 937682.17,
"recoverable_pct": 0.669
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108547",
"label": "benign",
"label_confidence": 0.653,
"severity": "low",
"timestamp": "2026-01-06T22:27:00Z",
"trace_id": "4d703108-4e56-9e79-151a-a232a0fd0924"
} | {
"account_age_days": 1042,
"account_id": "ACCT-59DBC6D1EFF8",
"baseline_risk_score": 0.154,
"kyc_tier": "tier_2",
"session_entropy": 0.742
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 386,
"timestamp": "2026-01-06T10:17:00Z",
"transaction_amount_usd": 22.58
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.539,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1722.79,
"financial_exposure_usd": 2521.19,
"recoverable_pct": 0.748
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105551",
"label": "fraudulent",
"label_confidence": 0.901,
"severity": "high",
"timestamp": "2026-01-04T20:31:00Z",
"trace_id": "26ccb040-e05d-0ad2-063e-d70d84692ced"
} | {
"account_age_days": 795,
"account_id": "ACCT-359EC49D4369",
"baseline_risk_score": 0.374,
"kyc_tier": "tier_3",
"session_entropy": 0.312
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 289,
"timestamp": "2026-01-04T15:01:00Z",
"transaction_amount_usd": 4.53
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.865,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2307593.11,
"financial_exposure_usd": 3184256.48,
"recoverable_pct": 0.655
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108182",
"label": "benign",
"label_confidence": 0.583,
"severity": "low",
"timestamp": "2026-01-06T16:22:00Z",
"trace_id": "b1beba06-f2ce-ad62-bb15-023f8941ac3e"
} | {
"account_age_days": 1921,
"account_id": "ACCT-5CE0A888757C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.869
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 263,
"timestamp": "2026-01-06T16:22:00Z",
"transaction_amount_usd": 4002.82
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.666,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1510.34,
"financial_exposure_usd": 2425.28,
"recoverable_pct": 0.442
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109483",
"label": "benign",
"label_confidence": 0.514,
"severity": "high",
"timestamp": "2026-01-07T14:03:00Z",
"trace_id": "e13fcaf1-2cae-a54c-51ed-bdc88ff44cbd"
} | {
"account_age_days": 693,
"account_id": "ACCT-83E117F8CA7E",
"baseline_risk_score": 0.191,
"kyc_tier": "tier_1",
"session_entropy": 0.207
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 513,
"timestamp": "2026-01-07T14:03:00Z",
"transaction_amount_usd": 4743.42
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.514,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1005.1,
"financial_exposure_usd": 1166.73,
"recoverable_pct": 0.842
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101421",
"label": "fraudulent",
"label_confidence": 0.939,
"severity": "high",
"timestamp": "2026-01-01T23:41:00Z",
"trace_id": "834fdc8b-6f3f-f798-2fc0-1e83b7e36c39"
} | {
"account_age_days": 1037,
"account_id": "ACCT-F351C9B4F868",
"baseline_risk_score": 0.591,
"kyc_tier": "tier_2",
"session_entropy": 0.885
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 761,
"timestamp": "2026-01-01T23:41:00Z",
"transaction_amount_usd": 104814.27
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.85,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 632365.02,
"financial_exposure_usd": 1210018.85,
"recoverable_pct": 0.11
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106568",
"label": "fraudulent",
"label_confidence": 0.948,
"severity": "medium",
"timestamp": "2026-01-05T13:28:00Z",
"trace_id": "74a8b25d-34d3-b15b-82cf-04ee61480bc3"
} | {
"account_age_days": 1366,
"account_id": "ACCT-D4E2831BAB3D",
"baseline_risk_score": 0.441,
"kyc_tier": "tier_1",
"session_entropy": 0.334
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 520,
"timestamp": "2026-01-05T13:28:00Z",
"transaction_amount_usd": 2565694.22
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.384,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5223918.28,
"financial_exposure_usd": 6183435.69,
"recoverable_pct": 0.752
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107858",
"label": "benign",
"label_confidence": 0.597,
"severity": "high",
"timestamp": "2026-01-06T10:58:00Z",
"trace_id": "21be8872-263c-c6c6-6697-aca958612a7d"
} | {
"account_age_days": 1939,
"account_id": "ACCT-C11C9B91FFAC",
"baseline_risk_score": 0.056,
"kyc_tier": "tier_2",
"session_entropy": 0.665
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 846,
"timestamp": "2026-01-06T10:58:00Z",
"transaction_amount_usd": 3700.85
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.68,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1444.21,
"financial_exposure_usd": 2376.66,
"recoverable_pct": 0.581
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101498",
"label": "fraudulent",
"label_confidence": 0.804,
"severity": "high",
"timestamp": "2026-01-02T00:58:00Z",
"trace_id": "df53e149-283e-0c07-490e-efee19004783"
} | {
"account_age_days": 843,
"account_id": "ACCT-290FC8741F83",
"baseline_risk_score": 0.459,
"kyc_tier": "tier_3",
"session_entropy": 0.176
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 108,
"timestamp": "2026-01-01T21:08:00Z",
"transaction_amount_usd": 21.92
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.879,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 793566.77,
"financial_exposure_usd": 1499752.65,
"recoverable_pct": 0.833
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100004",
"label": "fraudulent",
"label_confidence": 0.776,
"severity": "critical",
"timestamp": "2026-01-01T00:04:00Z",
"trace_id": "a53f8a28-abf3-e3fc-2181-3d25655238a6"
} | {
"account_age_days": 76,
"account_id": "ACCT-E767DCEAB0E6",
"baseline_risk_score": 0.474,
"kyc_tier": "tier_2",
"session_entropy": 0.227
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "US",
"latency_ms": 284,
"timestamp": "2026-01-01T00:04:00Z",
"transaction_amount_usd": 111517.69
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.682,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 315389.78,
"financial_exposure_usd": 661933.72,
"recoverable_pct": 0.262
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103129",
"label": "fraudulent",
"label_confidence": 0.805,
"severity": "medium",
"timestamp": "2026-01-03T04:09:00Z",
"trace_id": "13a3794a-b1cf-b7f8-a84f-c99837a7be4a"
} | {
"account_age_days": 1854,
"account_id": "ACCT-CFA94ED56286",
"baseline_risk_score": 0.373,
"kyc_tier": "tier_2",
"session_entropy": 0.588
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "US",
"latency_ms": 286,
"timestamp": "2026-01-03T04:09:00Z",
"transaction_amount_usd": 107100.84
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.414,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 823610.55,
"financial_exposure_usd": 959686.72,
"recoverable_pct": 0.748
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103247",
"label": "fraudulent",
"label_confidence": 0.802,
"severity": "high",
"timestamp": "2026-01-03T06:07:00Z",
"trace_id": "07fa6936-67c6-ec15-01e7-b7c30a7d0011"
} | {
"account_age_days": 423,
"account_id": "ACCT-D9A3169F068E",
"baseline_risk_score": 0.576,
"kyc_tier": "tier_2",
"session_entropy": 0.609
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "FR",
"latency_ms": 488,
"timestamp": "2026-01-03T06:07:00Z",
"transaction_amount_usd": 67874.26
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.475,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 452774.9,
"financial_exposure_usd": 507480.31,
"recoverable_pct": 0.202
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109275",
"label": "benign",
"label_confidence": 0.568,
"severity": "medium",
"timestamp": "2026-01-07T10:35:00Z",
"trace_id": "f07720c9-2428-fc9c-fed3-6fe31ba38a15"
} | {
"account_age_days": 707,
"account_id": "ACCT-2586B98F6E43",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.201
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 305,
"timestamp": "2026-01-07T06:47:00Z",
"transaction_amount_usd": 14.96
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.725,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 4481.34,
"financial_exposure_usd": 5661.04,
"recoverable_pct": 0.967
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104627",
"label": "fraudulent",
"label_confidence": 0.866,
"severity": "high",
"timestamp": "2026-01-04T05:07:00Z",
"trace_id": "9a0af7a8-cf67-d974-6927-7ea1aa039331"
} | {
"account_age_days": 1369,
"account_id": "ACCT-96861C7FD027",
"baseline_risk_score": 0.29,
"kyc_tier": "tier_3",
"session_entropy": 0.131
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 281,
"timestamp": "2026-01-03T23:57:00Z",
"transaction_amount_usd": 0.44
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.683,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3321633.3,
"financial_exposure_usd": 5322404.13,
"recoverable_pct": 0.745
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109479",
"label": "benign",
"label_confidence": 0.676,
"severity": "medium",
"timestamp": "2026-01-07T13:59:00Z",
"trace_id": "1d089084-47c4-68c5-96ad-014be12f3dc0"
} | {
"account_age_days": 1802,
"account_id": "ACCT-78EA457B1774",
"baseline_risk_score": 0.168,
"kyc_tier": "tier_3",
"session_entropy": 0.396
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 365,
"timestamp": "2026-01-07T07:11:00Z",
"transaction_amount_usd": 12.28
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.527,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2845.24,
"financial_exposure_usd": 3462.02,
"recoverable_pct": 0.414
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106515",
"label": "fraudulent",
"label_confidence": 0.906,
"severity": "low",
"timestamp": "2026-01-05T12:35:00Z",
"trace_id": "cbf9a568-7fba-14b3-0594-a59aeb47b240"
} | {
"account_age_days": 1099,
"account_id": "ACCT-3295AA45C106",
"baseline_risk_score": 0.184,
"kyc_tier": "tier_2",
"session_entropy": 0.791
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 190,
"timestamp": "2026-01-05T12:35:00Z",
"transaction_amount_usd": 1038026.66
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.536,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2611978.54,
"financial_exposure_usd": 4380987.56,
"recoverable_pct": 0.845
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107338",
"label": "benign",
"label_confidence": 0.516,
"severity": "critical",
"timestamp": "2026-01-06T02:18:00Z",
"trace_id": "9fa2b36b-6275-0887-5873-447348ff89bb"
} | {
"account_age_days": 329,
"account_id": "ACCT-60F09D09EF0F",
"baseline_risk_score": 0.121,
"kyc_tier": "tier_3",
"session_entropy": 0.271
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 713,
"timestamp": "2026-01-06T02:18:00Z",
"transaction_amount_usd": 11067.1
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.682,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 4636.3,
"financial_exposure_usd": 5701.17,
"recoverable_pct": 0.877
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103049",
"label": "fraudulent",
"label_confidence": 0.887,
"severity": "critical",
"timestamp": "2026-01-03T02:49:00Z",
"trace_id": "01673dfc-6883-2316-09da-0f0c44615a99"
} | {
"account_age_days": 205,
"account_id": "ACCT-EB6E25F1A191",
"baseline_risk_score": 0.388,
"kyc_tier": "tier_2",
"session_entropy": 0.303
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 360,
"timestamp": "2026-01-02T15:52:00Z",
"transaction_amount_usd": 2.3
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.403,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 493330.26,
"financial_exposure_usd": 766388.42,
"recoverable_pct": 0.104
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100846",
"label": "fraudulent",
"label_confidence": 0.972,
"severity": "high",
"timestamp": "2026-01-01T14:06:00Z",
"trace_id": "aaad68e4-45a7-9cdb-a628-de2ea8983a55"
} | {
"account_age_days": 1055,
"account_id": "ACCT-5071E6FEBBEA",
"baseline_risk_score": 0.559,
"kyc_tier": "tier_3",
"session_entropy": 0.168
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 317,
"timestamp": "2026-01-01T14:06:00Z",
"transaction_amount_usd": 7248.3
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.422,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 334392.48,
"financial_exposure_usd": 477464.04,
"recoverable_pct": 0.564
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101368",
"label": "fraudulent",
"label_confidence": 0.792,
"severity": "high",
"timestamp": "2026-01-01T22:48:00Z",
"trace_id": "7ba54cf5-f83e-8075-e01a-61c1a178adee"
} | {
"account_age_days": 1175,
"account_id": "ACCT-27B8C035F9E0",
"baseline_risk_score": 0.345,
"kyc_tier": "tier_3",
"session_entropy": 0.869
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 1071,
"timestamp": "2026-01-01T22:48:00Z",
"transaction_amount_usd": 74429.04
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.477,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 350544.74,
"financial_exposure_usd": 821891.53,
"recoverable_pct": 0.609
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106575",
"label": "fraudulent",
"label_confidence": 0.893,
"severity": "high",
"timestamp": "2026-01-05T13:35:00Z",
"trace_id": "270fedef-6aa8-5672-09b7-14ac7bf6896b"
} | {
"account_age_days": 472,
"account_id": "ACCT-8BC1CA9717B6",
"baseline_risk_score": 0.191,
"kyc_tier": "tier_3",
"session_entropy": 0.88
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 871,
"timestamp": "2026-01-05T13:35:00Z",
"transaction_amount_usd": 182201.41
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.9,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND poste... | {
"customer_funds_at_risk_usd": 2677971.31,
"financial_exposure_usd": 3270524.88,
"recoverable_pct": 0.54
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104290",
"label": "fraudulent",
"label_confidence": 0.933,
"severity": "high",
"timestamp": "2026-01-03T23:30:00Z",
"trace_id": "5ed3cb9f-c98c-7f1b-8030-c11cd3d6c4ad"
} | {
"account_age_days": 1021,
"account_id": "ACCT-BDAC2B9E27C4",
"baseline_risk_score": 0.436,
"kyc_tier": "tier_3",
"session_entropy": 0.572
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 161,
"timestamp": "2026-01-03T23:30:00Z",
"transaction_amount_usd": 145493.42
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.723,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 5599781.63,
"financial_exposure_usd": 8231940.78,
"recoverable_pct": 0.505
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102379",
"label": "fraudulent",
"label_confidence": 0.925,
"severity": "medium",
"timestamp": "2026-01-02T15:39:00Z",
"trace_id": "5f65a190-e837-84dd-899d-511cef0ecd06"
} | {
"account_age_days": 1978,
"account_id": "ACCT-FA02DB80C5EE",
"baseline_risk_score": 0.629,
"kyc_tier": "tier_2",
"session_entropy": 0.617
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "JP",
"latency_ms": 708,
"timestamp": "2026-01-02T15:39:00Z",
"transaction_amount_usd": 109856.44
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.91,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 741894.27,
"financial_exposure_usd": 1156379.26,
"recoverable_pct": 0.633
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100146",
"label": "fraudulent",
"label_confidence": 0.761,
"severity": "high",
"timestamp": "2026-01-01T02:26:00Z",
"trace_id": "420fd9a8-d45b-4e9b-b61e-c0ed8ddd2994"
} | {
"account_age_days": 733,
"account_id": "ACCT-4F00BA6AF189",
"baseline_risk_score": 0.566,
"kyc_tier": "tier_2",
"session_entropy": 0.107
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 268,
"timestamp": "2026-01-01T02:26:00Z",
"transaction_amount_usd": 85267.66
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.65,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 757175.43,
"financial_exposure_usd": 889637.72,
"recoverable_pct": 0.617
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106747",
"label": "benign",
"label_confidence": 0.49,
"severity": "critical",
"timestamp": "2026-01-05T16:27:00Z",
"trace_id": "de00d3dd-0629-b3a5-41b7-7bfeea206ff7"
} | {
"account_age_days": 96,
"account_id": "ACCT-7B3923041EA3",
"baseline_risk_score": 0.169,
"kyc_tier": "tier_2",
"session_entropy": 0.765
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 796,
"timestamp": "2026-01-05T16:27:00Z",
"transaction_amount_usd": 5374.3
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.673,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1981.49,
"financial_exposure_usd": 2171.26,
"recoverable_pct": 0.502
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101484",
"label": "fraudulent",
"label_confidence": 0.882,
"severity": "high",
"timestamp": "2026-01-02T00:44:00Z",
"trace_id": "f0f2fbff-be84-5511-c6aa-6fa3cc4b0817"
} | {
"account_age_days": 901,
"account_id": "ACCT-43F532E1E132",
"baseline_risk_score": 0.325,
"kyc_tier": "tier_3",
"session_entropy": 0.215
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NL",
"latency_ms": 1050,
"timestamp": "2026-01-02T00:44:00Z",
"transaction_amount_usd": 19863.56
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.895,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 569732.48,
"financial_exposure_usd": 1152388.67,
"recoverable_pct": 0.529
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109225",
"label": "benign",
"label_confidence": 0.564,
"severity": "medium",
"timestamp": "2026-01-07T09:45:00Z",
"trace_id": "3daa3876-aba1-f371-fb89-cc67c3bf67a6"
} | {
"account_age_days": 1837,
"account_id": "ACCT-492C6B1CA9D7",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.152
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 338,
"timestamp": "2026-01-07T09:45:00Z",
"transaction_amount_usd": 3658.57
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.471,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1389.9,
"financial_exposure_usd": 2180.95,
"recoverable_pct": 0.843
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101428",
"label": "fraudulent",
"label_confidence": 0.813,
"severity": "high",
"timestamp": "2026-01-01T23:48:00Z",
"trace_id": "2544a65a-014a-374a-5089-00c239dd6128"
} | {
"account_age_days": 1698,
"account_id": "ACCT-358C5028D1A7",
"baseline_risk_score": 0.59,
"kyc_tier": "tier_3",
"session_entropy": 0.886
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 1014,
"timestamp": "2026-01-01T23:48:00Z",
"transaction_amount_usd": 81433.65
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.461,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 300535.61,
"financial_exposure_usd": 648098.06,
"recoverable_pct": 0.385
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108788",
"label": "benign",
"label_confidence": 0.463,
"severity": "medium",
"timestamp": "2026-01-07T02:28:00Z",
"trace_id": "11580c33-4ab3-54d3-39c0-f4c4d5c2634f"
} | {
"account_age_days": 610,
"account_id": "ACCT-1EDE72A44D6C",
"baseline_risk_score": 0.163,
"kyc_tier": "tier_3",
"session_entropy": 0.497
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 646,
"timestamp": "2026-01-07T02:28:00Z",
"transaction_amount_usd": 5841.72
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.713,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1809.63,
"financial_exposure_usd": 3710.66,
"recoverable_pct": 0.878
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108005",
"label": "benign",
"label_confidence": 0.477,
"severity": "medium",
"timestamp": "2026-01-06T13:25:00Z",
"trace_id": "863c2969-4867-1150-16b3-769d8f6d9ff1"
} | {
"account_age_days": 1170,
"account_id": "ACCT-0C21A380F6C4",
"baseline_risk_score": 0.089,
"kyc_tier": "tier_1",
"session_entropy": 0.749
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 305,
"timestamp": "2026-01-06T02:24:00Z",
"transaction_amount_usd": 15.21
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.635,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2595.18,
"financial_exposure_usd": 3164.93,
"recoverable_pct": 0.67
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102076",
"label": "fraudulent",
"label_confidence": 0.814,
"severity": "low",
"timestamp": "2026-01-02T10:36:00Z",
"trace_id": "8081baab-c96f-d09a-d6f0-3088bb13623e"
} | {
"account_age_days": 1114,
"account_id": "ACCT-D5AB15FDA2DE",
"baseline_risk_score": 0.644,
"kyc_tier": "tier_1",
"session_entropy": 0.328
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 136,
"timestamp": "2026-01-02T10:36:00Z",
"transaction_amount_usd": 15827.11
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.392,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 433314.35,
"financial_exposure_usd": 731269.71,
"recoverable_pct": 0.504
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104884",
"label": "fraudulent",
"label_confidence": 0.686,
"severity": "low",
"timestamp": "2026-01-04T09:24:00Z",
"trace_id": "679500bb-cc67-927a-c6f5-705dc8e5d89f"
} | {
"account_age_days": 856,
"account_id": "ACCT-4FDAD6FDAC72",
"baseline_risk_score": 0.16,
"kyc_tier": "tier_3",
"session_entropy": 0.947
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 1022,
"timestamp": "2026-01-04T09:24:00Z",
"transaction_amount_usd": 1453097.32
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.628,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2345718.14,
"financial_exposure_usd": 3563212.37,
"recoverable_pct": 0.82
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105674",
"label": "fraudulent",
"label_confidence": 0.708,
"severity": "high",
"timestamp": "2026-01-04T22:34:00Z",
"trace_id": "b3fbd967-230b-f4f4-a6f4-08afbc73d4ae"
} | {
"account_age_days": 244,
"account_id": "ACCT-199DC512D725",
"baseline_risk_score": 0.305,
"kyc_tier": "tier_3",
"session_entropy": 0.59
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 575,
"timestamp": "2026-01-04T22:34:00Z",
"transaction_amount_usd": 1861205.1
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.637,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1953008.89,
"financial_exposure_usd": 2886095.85,
"recoverable_pct": 0.57
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104620",
"label": "fraudulent",
"label_confidence": 0.84,
"severity": "high",
"timestamp": "2026-01-04T05:00:00Z",
"trace_id": "95edf28e-dee0-6000-e7f5-ec86e2681abe"
} | {
"account_age_days": 1953,
"account_id": "ACCT-28BE379321D4",
"baseline_risk_score": 0.085,
"kyc_tier": "tier_3",
"session_entropy": 0.253
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 282,
"timestamp": "2026-01-03T18:59:00Z",
"transaction_amount_usd": 8.8
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.8,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND... | {
"customer_funds_at_risk_usd": 6021110.02,
"financial_exposure_usd": 6944764.53,
"recoverable_pct": 0.823
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107818",
"label": "benign",
"label_confidence": 0.546,
"severity": "medium",
"timestamp": "2026-01-06T10:18:00Z",
"trace_id": "ae7a5771-91bf-91f9-2afe-56026a07611e"
} | {
"account_age_days": 1257,
"account_id": "ACCT-8BE3DF9DB5EF",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.908
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 641,
"timestamp": "2026-01-06T10:18:00Z",
"transaction_amount_usd": 13519.24
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.546,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1980.58,
"financial_exposure_usd": 2352.74,
"recoverable_pct": 0.889
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107492",
"label": "benign",
"label_confidence": 0.659,
"severity": "medium",
"timestamp": "2026-01-06T04:52:00Z",
"trace_id": "7534aa58-6d11-3d66-9faa-3d93c7692933"
} | {
"account_age_days": 788,
"account_id": "ACCT-2A82DC9B79B3",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.545
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 321,
"timestamp": "2026-01-06T04:11:00Z",
"transaction_amount_usd": 7.98
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.573,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2199.53,
"financial_exposure_usd": 3765.52,
"recoverable_pct": 0.866
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107748",
"label": "benign",
"label_confidence": 0.707,
"severity": "low",
"timestamp": "2026-01-06T09:08:00Z",
"trace_id": "641c517e-6e79-ce3e-c21f-39ffbe47eec8"
} | {
"account_age_days": 5,
"account_id": "ACCT-97AE8A4CD2A5",
"baseline_risk_score": 0.185,
"kyc_tier": "tier_2",
"session_entropy": 0.785
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 505,
"timestamp": "2026-01-06T09:08:00Z",
"transaction_amount_usd": 7286.74
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.471,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1099.68,
"financial_exposure_usd": 2423.58,
"recoverable_pct": 0.613
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108584",
"label": "benign",
"label_confidence": 0.596,
"severity": "low",
"timestamp": "2026-01-06T23:04:00Z",
"trace_id": "a0f0ee3b-cdf7-0cab-4efa-b22ff84a10c3"
} | {
"account_age_days": 485,
"account_id": "ACCT-94B6CCF91298",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.164
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 793,
"timestamp": "2026-01-06T23:04:00Z",
"transaction_amount_usd": 2778.28
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.564,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1910.83,
"financial_exposure_usd": 3916.94,
"recoverable_pct": 0.708
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101033",
"label": "fraudulent",
"label_confidence": 0.778,
"severity": "medium",
"timestamp": "2026-01-01T17:13:00Z",
"trace_id": "685d0751-1a19-5aa4-a111-f44b66a917c7"
} | {
"account_age_days": 1906,
"account_id": "ACCT-5C1ED84FB2A6",
"baseline_risk_score": 0.528,
"kyc_tier": "tier_1",
"session_entropy": 0.163
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 271,
"timestamp": "2026-01-01T17:13:00Z",
"transaction_amount_usd": 14420.2
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.713,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 375406.5,
"financial_exposure_usd": 743677.35,
"recoverable_pct": 0.732
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106171",
"label": "fraudulent",
"label_confidence": 0.842,
"severity": "critical",
"timestamp": "2026-01-05T06:51:00Z",
"trace_id": "ccad618e-b9df-2635-2732-4484226bfbb6"
} | {
"account_age_days": 814,
"account_id": "ACCT-F932CB8AFDEB",
"baseline_risk_score": 0.137,
"kyc_tier": "tier_1",
"session_entropy": 0.714
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 149,
"timestamp": "2026-01-05T04:44:00Z",
"transaction_amount_usd": 7.26
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.843,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2543652.09,
"financial_exposure_usd": 3340527.42,
"recoverable_pct": 0.545
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100235",
"label": "fraudulent",
"label_confidence": 0.943,
"severity": "medium",
"timestamp": "2026-01-01T03:55:00Z",
"trace_id": "d478f5dc-1c5b-b4ce-b79c-cfc935cffe16"
} | {
"account_age_days": 900,
"account_id": "ACCT-2913CB764507",
"baseline_risk_score": 0.596,
"kyc_tier": "tier_1",
"session_entropy": 0.508
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 332,
"timestamp": "2026-01-01T03:55:00Z",
"transaction_amount_usd": 41292.16
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.819,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 333533.23,
"financial_exposure_usd": 528789.16,
"recoverable_pct": 0.839
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108910",
"label": "benign",
"label_confidence": 0.615,
"severity": "medium",
"timestamp": "2026-01-07T04:30:00Z",
"trace_id": "e34b3d7a-2e8b-6a3f-ca68-c83b4ae67f1e"
} | {
"account_age_days": 1832,
"account_id": "ACCT-146CAD0DE175",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.891
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 994,
"timestamp": "2026-01-07T04:30:00Z",
"transaction_amount_usd": 318.56
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.552,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3501.02,
"financial_exposure_usd": 5175.44,
"recoverable_pct": 0.752
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100531",
"label": "fraudulent",
"label_confidence": 0.894,
"severity": "critical",
"timestamp": "2026-01-01T08:51:00Z",
"trace_id": "b144544f-feda-dee6-dc51-ee4ac14906fd"
} | {
"account_age_days": 656,
"account_id": "ACCT-E059F743590B",
"baseline_risk_score": 0.266,
"kyc_tier": "tier_3",
"session_entropy": 0.512
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 387,
"timestamp": "2026-01-01T00:17:00Z",
"transaction_amount_usd": 19.53
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.722,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 779535.89,
"financial_exposure_usd": 906080.09,
"recoverable_pct": 0.458
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108939",
"label": "benign",
"label_confidence": 0.545,
"severity": "critical",
"timestamp": "2026-01-07T04:59:00Z",
"trace_id": "12165254-78ec-44aa-d26f-1bcc936d5866"
} | {
"account_age_days": 999,
"account_id": "ACCT-E6B78727D687",
"baseline_risk_score": 0.119,
"kyc_tier": "tier_3",
"session_entropy": 0.288
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 82,
"timestamp": "2026-01-07T03:32:00Z",
"transaction_amount_usd": 13.65
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.735,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2113.53,
"financial_exposure_usd": 2650.04,
"recoverable_pct": 0.703
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102876",
"label": "fraudulent",
"label_confidence": 0.879,
"severity": "critical",
"timestamp": "2026-01-02T23:56:00Z",
"trace_id": "e98a865d-8dd6-f53c-153e-add19d12b44c"
} | {
"account_age_days": 224,
"account_id": "ACCT-11E262C2B99D",
"baseline_risk_score": 0.53,
"kyc_tier": "tier_1",
"session_entropy": 0.261
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 634,
"timestamp": "2026-01-02T23:56:00Z",
"transaction_amount_usd": 76290.4
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.476,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 407402.29,
"financial_exposure_usd": 426006.33,
"recoverable_pct": 0.573
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108675",
"label": "benign",
"label_confidence": 0.548,
"severity": "low",
"timestamp": "2026-01-07T00:35:00Z",
"trace_id": "ad5f318c-1b34-5078-5660-39ef770d1677"
} | {
"account_age_days": 237,
"account_id": "ACCT-5D94955D6E08",
"baseline_risk_score": 0.183,
"kyc_tier": "tier_1",
"session_entropy": 0.34
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 274,
"timestamp": "2026-01-06T23:26:00Z",
"transaction_amount_usd": 13.99
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.651,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 939.82,
"financial_exposure_usd": 1587.05,
"recoverable_pct": 0.427
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102674",
"label": "fraudulent",
"label_confidence": 0.912,
"severity": "medium",
"timestamp": "2026-01-02T20:34:00Z",
"trace_id": "e4983add-7a9f-5ae6-c6eb-b119e7e1bb59"
} | {
"account_age_days": 1759,
"account_id": "ACCT-5A277D6957A2",
"baseline_risk_score": 0.315,
"kyc_tier": "tier_3",
"session_entropy": 0.514
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 190,
"timestamp": "2026-01-02T09:41:00Z",
"transaction_amount_usd": 17.82
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.379,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 334609.11,
"financial_exposure_usd": 711678.27,
"recoverable_pct": 0.218
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103180",
"label": "fraudulent",
"label_confidence": 0.924,
"severity": "medium",
"timestamp": "2026-01-03T05:00:00Z",
"trace_id": "400a2aa0-1b7b-ae04-9d3f-4662e8eca5a8"
} | {
"account_age_days": 655,
"account_id": "ACCT-8525A2757D17",
"baseline_risk_score": 0.357,
"kyc_tier": "tier_1",
"session_entropy": 0.87
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 621,
"timestamp": "2026-01-03T05:00:00Z",
"transaction_amount_usd": 43706.66
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.582,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 371619.69,
"financial_exposure_usd": 789614,
"recoverable_pct": 0.787
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.