schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107423",
"label": "benign",
"label_confidence": 0.458,
"severity": "critical",
"timestamp": "2026-01-06T03:43:00Z",
"trace_id": "59947146-bc17-5b78-596e-b4eb20d2abe2"
} | {
"account_age_days": 888,
"account_id": "ACCT-0BFC4C82BEC2",
"baseline_risk_score": 0.134,
"kyc_tier": "tier_3",
"session_entropy": 0.525
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 153,
"timestamp": "2026-01-06T03:43:00Z",
"transaction_amount_usd": 3941.22
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.532,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 4162.98,
"financial_exposure_usd": 5766.23,
"recoverable_pct": 0.715
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101960",
"label": "fraudulent",
"label_confidence": 0.908,
"severity": "medium",
"timestamp": "2026-01-02T08:40:00Z",
"trace_id": "b1c76e22-58bf-3df2-c021-6984d28e787f"
} | {
"account_age_days": 1948,
"account_id": "ACCT-2F28567AE730",
"baseline_risk_score": 0.417,
"kyc_tier": "tier_3",
"session_entropy": 0.786
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 228,
"timestamp": "2026-01-01T22:53:00Z",
"transaction_amount_usd": 22.73
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.812,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 341361.41,
"financial_exposure_usd": 381401.13,
"recoverable_pct": 0.013
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104216",
"label": "fraudulent",
"label_confidence": 0.88,
"severity": "high",
"timestamp": "2026-01-03T22:16:00Z",
"trace_id": "fa09d14a-ac1a-8802-6163-53d722c82286"
} | {
"account_age_days": 126,
"account_id": "ACCT-DD2B094EC381",
"baseline_risk_score": 0.08,
"kyc_tier": "tier_2",
"session_entropy": 0.93
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 1155,
"timestamp": "2026-01-03T22:16:00Z",
"transaction_amount_usd": 1026112
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.778,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1382440.23,
"financial_exposure_usd": 3386493.19,
"recoverable_pct": 0.757
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104425",
"label": "fraudulent",
"label_confidence": 0.626,
"severity": "medium",
"timestamp": "2026-01-04T01:45:00Z",
"trace_id": "603ccc26-0630-06fc-a134-6b5969e1e824"
} | {
"account_age_days": 1123,
"account_id": "ACCT-E8254F3E740B",
"baseline_risk_score": 0.428,
"kyc_tier": "tier_3",
"session_entropy": 0.76
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 946,
"timestamp": "2026-01-04T01:45:00Z",
"transaction_amount_usd": 1645950.82
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.357,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1496925.99,
"financial_exposure_usd": 2375633.26,
"recoverable_pct": 0.861
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109220",
"label": "benign",
"label_confidence": 0.543,
"severity": "low",
"timestamp": "2026-01-07T09:40:00Z",
"trace_id": "6df0c092-2a4b-3068-a6b3-7948fea55829"
} | {
"account_age_days": 886,
"account_id": "ACCT-396CFECD3182",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.446
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 788,
"timestamp": "2026-01-07T09:40:00Z",
"transaction_amount_usd": 12813.33
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.454,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2460.76,
"financial_exposure_usd": 2796.24,
"recoverable_pct": 0.854
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109254",
"label": "benign",
"label_confidence": 0.677,
"severity": "low",
"timestamp": "2026-01-07T10:14:00Z",
"trace_id": "db9cc7f4-bab9-e43e-7e3e-2a0fcc5d3994"
} | {
"account_age_days": 850,
"account_id": "ACCT-34420801532A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.889
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 185,
"timestamp": "2026-01-07T10:14:00Z",
"transaction_amount_usd": 7264.17
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.625,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2489.78,
"financial_exposure_usd": 3087.64,
"recoverable_pct": 0.867
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109755",
"label": "benign",
"label_confidence": 0.581,
"severity": "low",
"timestamp": "2026-01-07T18:35:00Z",
"trace_id": "69c01957-d78a-8cb7-7c90-c529d51ef5c5"
} | {
"account_age_days": 1006,
"account_id": "ACCT-15A6FAFB1B70",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.747
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 109,
"timestamp": "2026-01-07T13:20:00Z",
"transaction_amount_usd": 21.1
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.496,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1354.17,
"financial_exposure_usd": 1940.61,
"recoverable_pct": 0.478
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108771",
"label": "benign",
"label_confidence": 0.648,
"severity": "medium",
"timestamp": "2026-01-07T02:11:00Z",
"trace_id": "a0a23060-01db-b9ee-e38a-db87a319a95c"
} | {
"account_age_days": 1268,
"account_id": "ACCT-378D197BB44D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.401
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 129,
"timestamp": "2026-01-07T02:11:00Z",
"transaction_amount_usd": 927.9
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.48,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 2651.63,
"financial_exposure_usd": 2848.88,
"recoverable_pct": 0.855
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104559",
"label": "fraudulent",
"label_confidence": 0.8,
"severity": "high",
"timestamp": "2026-01-04T03:59:00Z",
"trace_id": "fe2114d1-2734-502b-59bf-4f6165b646d3"
} | {
"account_age_days": 868,
"account_id": "ACCT-70D26AC7B689",
"baseline_risk_score": 0.289,
"kyc_tier": "tier_2",
"session_entropy": 0.578
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 135,
"timestamp": "2026-01-04T02:16:00Z",
"transaction_amount_usd": 20.96
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.84,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 9059834.26,
"financial_exposure_usd": 9201839.4,
"recoverable_pct": 0.898
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109655",
"label": "benign",
"label_confidence": 0.51,
"severity": "medium",
"timestamp": "2026-01-07T16:55:00Z",
"trace_id": "6f1f7084-cc10-870b-6f73-ebdf2385072e"
} | {
"account_age_days": 980,
"account_id": "ACCT-408C90E7A344",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.92
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 381,
"timestamp": "2026-01-07T16:55:00Z",
"transaction_amount_usd": 1538.4
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.629,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1440.16,
"financial_exposure_usd": 2182.05,
"recoverable_pct": 0.719
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107125",
"label": "benign",
"label_confidence": 0.526,
"severity": "low",
"timestamp": "2026-01-05T22:45:00Z",
"trace_id": "89749ff5-e292-6d9f-bb31-a4575ecda61b"
} | {
"account_age_days": 867,
"account_id": "ACCT-182758B6E138",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.894
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 360,
"timestamp": "2026-01-05T22:45:00Z",
"transaction_amount_usd": 12229.36
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.625,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 4724.87,
"financial_exposure_usd": 5371.06,
"recoverable_pct": 0.508
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105768",
"label": "fraudulent",
"label_confidence": 0.852,
"severity": "medium",
"timestamp": "2026-01-05T00:08:00Z",
"trace_id": "5b645634-84a3-fb92-ea13-507b101f3de8"
} | {
"account_age_days": 1658,
"account_id": "ACCT-A60107B594A0",
"baseline_risk_score": 0.415,
"kyc_tier": "tier_1",
"session_entropy": 0.56
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 148,
"timestamp": "2026-01-05T00:08:00Z",
"transaction_amount_usd": 1344594.83
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.456,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4200473.64,
"financial_exposure_usd": 5105398.52,
"recoverable_pct": 0.843
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100949",
"label": "fraudulent",
"label_confidence": 0.787,
"severity": "high",
"timestamp": "2026-01-01T15:49:00Z",
"trace_id": "ffcfc73c-5e67-8c4d-84b8-c17f6586fee0"
} | {
"account_age_days": 963,
"account_id": "ACCT-606C186C17A4",
"baseline_risk_score": 0.615,
"kyc_tier": "tier_1",
"session_entropy": 0.577
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 293,
"timestamp": "2026-01-01T05:29:00Z",
"transaction_amount_usd": 17
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.444,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 278938.63,
"financial_exposure_usd": 539583.89,
"recoverable_pct": 0.666
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107157",
"label": "benign",
"label_confidence": 0.602,
"severity": "medium",
"timestamp": "2026-01-05T23:17:00Z",
"trace_id": "5351933b-e68f-1d6a-6bf8-86d81baa5a9c"
} | {
"account_age_days": 1407,
"account_id": "ACCT-E29859070BF2",
"baseline_risk_score": 0.163,
"kyc_tier": "tier_3",
"session_entropy": 0.705
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 269,
"timestamp": "2026-01-05T23:17:00Z",
"transaction_amount_usd": 4389.52
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.79,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3851.32,
"financial_exposure_usd": 4848.32,
"recoverable_pct": 0.94
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100980",
"label": "fraudulent",
"label_confidence": 0.902,
"severity": "high",
"timestamp": "2026-01-01T16:20:00Z",
"trace_id": "193d787d-fa1b-241f-462d-c7ce61d19b52"
} | {
"account_age_days": 1109,
"account_id": "ACCT-DB213812DCDE",
"baseline_risk_score": 0.369,
"kyc_tier": "tier_1",
"session_entropy": 0.888
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 668,
"timestamp": "2026-01-01T16:20:00Z",
"transaction_amount_usd": 116214.65
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.909,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 681487.64,
"financial_exposure_usd": 871955.5,
"recoverable_pct": 0.715
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103297",
"label": "fraudulent",
"label_confidence": 0.763,
"severity": "low",
"timestamp": "2026-01-03T06:57:00Z",
"trace_id": "dad226b4-3fd4-892d-ddd7-c4cda6c7e11a"
} | {
"account_age_days": 721,
"account_id": "ACCT-A66622CFBDAD",
"baseline_risk_score": 0.26,
"kyc_tier": "tier_2",
"session_entropy": 0.5
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "LU",
"latency_ms": 287,
"timestamp": "2026-01-03T06:57:00Z",
"transaction_amount_usd": 111962.62
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.592,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 248195.24,
"financial_exposure_usd": 576046.96,
"recoverable_pct": 0.283
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103967",
"label": "fraudulent",
"label_confidence": 0.815,
"severity": "high",
"timestamp": "2026-01-03T18:07:00Z",
"trace_id": "87bbc205-f0c4-868a-33fa-068c7faef16b"
} | {
"account_age_days": 1509,
"account_id": "ACCT-759C64FAE06F",
"baseline_risk_score": 0.25,
"kyc_tier": "tier_1",
"session_entropy": 0.776
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 629,
"timestamp": "2026-01-03T18:07:00Z",
"transaction_amount_usd": 1488920.03
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.603,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2610676.79,
"financial_exposure_usd": 2995534.9,
"recoverable_pct": 0.805
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106935",
"label": "benign",
"label_confidence": 0.495,
"severity": "high",
"timestamp": "2026-01-05T19:35:00Z",
"trace_id": "d73fe436-5b74-b318-7b35-250f9a29c263"
} | {
"account_age_days": 1803,
"account_id": "ACCT-660F1B814B23",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.225
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 535,
"timestamp": "2026-01-05T19:35:00Z",
"transaction_amount_usd": 7341.2
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.742,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3320.41,
"financial_exposure_usd": 4815.71,
"recoverable_pct": 0.466
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109485",
"label": "benign",
"label_confidence": 0.631,
"severity": "medium",
"timestamp": "2026-01-07T14:05:00Z",
"trace_id": "9a7bcf19-f647-44b5-7320-05d657d9fdd6"
} | {
"account_age_days": 341,
"account_id": "ACCT-049462A6C009",
"baseline_risk_score": 0.13,
"kyc_tier": "tier_1",
"session_entropy": 0.371
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 1038,
"timestamp": "2026-01-07T14:05:00Z",
"transaction_amount_usd": 13888.32
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.521,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3499.83,
"financial_exposure_usd": 7202.14,
"recoverable_pct": 0.698
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108188",
"label": "benign",
"label_confidence": 0.581,
"severity": "low",
"timestamp": "2026-01-06T16:28:00Z",
"trace_id": "c50eec66-4844-6cee-6ee8-ec4f03541456"
} | {
"account_age_days": 674,
"account_id": "ACCT-F0C3EA5C7467",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.56
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 564,
"timestamp": "2026-01-06T16:28:00Z",
"transaction_amount_usd": 2333.03
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.692,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1319.88,
"financial_exposure_usd": 2346.11,
"recoverable_pct": 0.875
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104006",
"label": "fraudulent",
"label_confidence": 0.721,
"severity": "high",
"timestamp": "2026-01-03T18:46:00Z",
"trace_id": "928b8d65-914d-5190-34d4-5f686c450b2f"
} | {
"account_age_days": 1151,
"account_id": "ACCT-5480FBBAA2B8",
"baseline_risk_score": 0.11,
"kyc_tier": "tier_1",
"session_entropy": 0.262
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 417,
"timestamp": "2026-01-03T18:46:00Z",
"transaction_amount_usd": 2867629.69
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.878,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3572610.19,
"financial_exposure_usd": 4591235.45,
"recoverable_pct": 0.587
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100840",
"label": "fraudulent",
"label_confidence": 0.799,
"severity": "critical",
"timestamp": "2026-01-01T14:00:00Z",
"trace_id": "eae56f61-2510-6cd4-3457-23f2e77bf4cf"
} | {
"account_age_days": 748,
"account_id": "ACCT-9F6278FEA7D8",
"baseline_risk_score": 0.295,
"kyc_tier": "tier_1",
"session_entropy": 0.244
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 299,
"timestamp": "2026-01-01T05:23:00Z",
"transaction_amount_usd": 14.57
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.646,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 778642,
"financial_exposure_usd": 1118521.05,
"recoverable_pct": 0.34
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104434",
"label": "fraudulent",
"label_confidence": 0.749,
"severity": "high",
"timestamp": "2026-01-04T01:54:00Z",
"trace_id": "fd34bf63-980a-1740-447b-441cf9e56dfc"
} | {
"account_age_days": 1984,
"account_id": "ACCT-F420EB325B32",
"baseline_risk_score": 0.146,
"kyc_tier": "tier_1",
"session_entropy": 0.705
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 235,
"timestamp": "2026-01-03T15:54:00Z",
"transaction_amount_usd": 23.62
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.576,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1678240.94,
"financial_exposure_usd": 2751702.96,
"recoverable_pct": 0.423
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107578",
"label": "benign",
"label_confidence": 0.533,
"severity": "medium",
"timestamp": "2026-01-06T06:18:00Z",
"trace_id": "8d2cf5f3-2888-f00c-1a26-334cc89fb370"
} | {
"account_age_days": 607,
"account_id": "ACCT-BA222D1827A7",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.275
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 942,
"timestamp": "2026-01-06T06:18:00Z",
"transaction_amount_usd": 4445.03
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.651,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 6267.68,
"financial_exposure_usd": 7368.93,
"recoverable_pct": 0.651
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101013",
"label": "fraudulent",
"label_confidence": 0.767,
"severity": "high",
"timestamp": "2026-01-01T16:53:00Z",
"trace_id": "f403fe63-1710-0685-6850-a57971ef5f95"
} | {
"account_age_days": 1134,
"account_id": "ACCT-296BC878B3E8",
"baseline_risk_score": 0.448,
"kyc_tier": "tier_3",
"session_entropy": 0.354
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 861,
"timestamp": "2026-01-01T16:53:00Z",
"transaction_amount_usd": 26682.08
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.61,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 294009.87,
"financial_exposure_usd": 660899.08,
"recoverable_pct": 0.299
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107537",
"label": "benign",
"label_confidence": 0.523,
"severity": "medium",
"timestamp": "2026-01-06T05:37:00Z",
"trace_id": "caa0fd8b-1a41-631b-34f4-6ff909dab367"
} | {
"account_age_days": 1823,
"account_id": "ACCT-BC1C3E1828CE",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.68
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 1066,
"timestamp": "2026-01-06T05:37:00Z",
"transaction_amount_usd": 946.6
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.528,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3036.84,
"financial_exposure_usd": 4415.39,
"recoverable_pct": 0.944
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107556",
"label": "benign",
"label_confidence": 0.651,
"severity": "low",
"timestamp": "2026-01-06T05:56:00Z",
"trace_id": "fa7ace46-13a1-dd10-2884-e896cb1ae12a"
} | {
"account_age_days": 1619,
"account_id": "ACCT-7D1CB4A2EFC9",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.537
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 117,
"timestamp": "2026-01-05T21:32:00Z",
"transaction_amount_usd": 1.21
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.657,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2789.8,
"financial_exposure_usd": 4188.9,
"recoverable_pct": 0.827
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107774",
"label": "benign",
"label_confidence": 0.53,
"severity": "low",
"timestamp": "2026-01-06T09:34:00Z",
"trace_id": "42b4a787-f216-1992-a7e8-c7f9b7a975e6"
} | {
"account_age_days": 702,
"account_id": "ACCT-3848FAC4D851",
"baseline_risk_score": 0.078,
"kyc_tier": "tier_3",
"session_entropy": 0.856
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 295,
"timestamp": "2026-01-06T02:29:00Z",
"transaction_amount_usd": 15.24
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.564,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1605.6,
"financial_exposure_usd": 2368.86,
"recoverable_pct": 0.404
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109211",
"label": "benign",
"label_confidence": 0.682,
"severity": "high",
"timestamp": "2026-01-07T09:31:00Z",
"trace_id": "7554f322-afea-6903-3e73-a5ee9d413f0e"
} | {
"account_age_days": 1247,
"account_id": "ACCT-D80403F29855",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.111
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 268,
"timestamp": "2026-01-07T09:31:00Z",
"transaction_amount_usd": 13012.53
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.619,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1678.96,
"financial_exposure_usd": 2278.57,
"recoverable_pct": 0.524
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104063",
"label": "fraudulent",
"label_confidence": 0.809,
"severity": "high",
"timestamp": "2026-01-03T19:43:00Z",
"trace_id": "08a34eb2-f76d-9137-2cb5-b97453072455"
} | {
"account_age_days": 20,
"account_id": "ACCT-6CE522FF0D3A",
"baseline_risk_score": 0.079,
"kyc_tier": "tier_2",
"session_entropy": 0.591
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 1047,
"timestamp": "2026-01-03T19:43:00Z",
"transaction_amount_usd": 2870786.71
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.811,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1274695.4,
"financial_exposure_usd": 2959133.83,
"recoverable_pct": 0.783
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103726",
"label": "fraudulent",
"label_confidence": 0.659,
"severity": "critical",
"timestamp": "2026-01-03T14:06:00Z",
"trace_id": "f831b2e7-9e65-6275-0ae4-0a0306402b1a"
} | {
"account_age_days": 1357,
"account_id": "ACCT-65E455A99CD6",
"baseline_risk_score": 0.311,
"kyc_tier": "tier_3",
"session_entropy": 0.298
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 270,
"timestamp": "2026-01-03T14:06:00Z",
"transaction_amount_usd": 2082893.19
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.425,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 5264191,
"financial_exposure_usd": 5806422.01,
"recoverable_pct": 0.57
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102439",
"label": "fraudulent",
"label_confidence": 0.969,
"severity": "high",
"timestamp": "2026-01-02T16:39:00Z",
"trace_id": "0ebb9bd2-8468-37dd-1ed9-1c9e65375611"
} | {
"account_age_days": 1790,
"account_id": "ACCT-28D0B0D9519C",
"baseline_risk_score": 0.487,
"kyc_tier": "tier_2",
"session_entropy": 0.688
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 297,
"timestamp": "2026-01-02T15:02:00Z",
"transaction_amount_usd": 16.59
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.555,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 393008.53,
"financial_exposure_usd": 514033.63,
"recoverable_pct": 0.779
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102321",
"label": "fraudulent",
"label_confidence": 0.85,
"severity": "critical",
"timestamp": "2026-01-02T14:41:00Z",
"trace_id": "e54973d3-0325-25fa-f66a-825fa032eab5"
} | {
"account_age_days": 644,
"account_id": "ACCT-4985CF34B1C0",
"baseline_risk_score": 0.546,
"kyc_tier": "tier_3",
"session_entropy": 0.487
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 358,
"timestamp": "2026-01-02T14:41:00Z",
"transaction_amount_usd": 17483.78
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.468,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 401991.78,
"financial_exposure_usd": 552308.68,
"recoverable_pct": 0.048
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109758",
"label": "benign",
"label_confidence": 0.729,
"severity": "critical",
"timestamp": "2026-01-07T18:38:00Z",
"trace_id": "0184274a-d8ed-5d9c-bf41-233cd74f914f"
} | {
"account_age_days": 36,
"account_id": "ACCT-226C4D24B8C8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.672
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 230,
"timestamp": "2026-01-07T18:38:00Z",
"transaction_amount_usd": 1496.32
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.525,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1332.56,
"financial_exposure_usd": 2735.88,
"recoverable_pct": 0.609
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104798",
"label": "fraudulent",
"label_confidence": 0.666,
"severity": "high",
"timestamp": "2026-01-04T07:58:00Z",
"trace_id": "e6b71eae-8d11-3e9e-8273-40f4109d4b3e"
} | {
"account_age_days": 371,
"account_id": "ACCT-C4F2841C8258",
"baseline_risk_score": 0.158,
"kyc_tier": "tier_2",
"session_entropy": 0.309
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 696,
"timestamp": "2026-01-04T07:58:00Z",
"transaction_amount_usd": 301015.34
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.872,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 5633781.18,
"financial_exposure_usd": 6936150.51,
"recoverable_pct": 0.691
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102360",
"label": "fraudulent",
"label_confidence": 0.923,
"severity": "critical",
"timestamp": "2026-01-02T15:20:00Z",
"trace_id": "1184d9eb-e571-feb6-a09a-296185caa39d"
} | {
"account_age_days": 321,
"account_id": "ACCT-9714FCDBBCC2",
"baseline_risk_score": 0.305,
"kyc_tier": "tier_3",
"session_entropy": 0.919
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "LU",
"latency_ms": 150,
"timestamp": "2026-01-02T15:20:00Z",
"transaction_amount_usd": 101565.62
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.924,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 1150269.99,
"financial_exposure_usd": 1268310.33,
"recoverable_pct": 0.592
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104396",
"label": "fraudulent",
"label_confidence": 0.726,
"severity": "medium",
"timestamp": "2026-01-04T01:16:00Z",
"trace_id": "d83d50fb-5ccb-0fd0-6cdf-77e1c76cb5e8"
} | {
"account_age_days": 484,
"account_id": "ACCT-8B55477BAAF0",
"baseline_risk_score": 0.368,
"kyc_tier": "tier_1",
"session_entropy": 0.219
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 796,
"timestamp": "2026-01-04T01:16:00Z",
"transaction_amount_usd": 2127954.81
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.897,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3443417.7,
"financial_exposure_usd": 5369003.92,
"recoverable_pct": 0.837
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106120",
"label": "fraudulent",
"label_confidence": 0.665,
"severity": "high",
"timestamp": "2026-01-05T06:00:00Z",
"trace_id": "c3733719-6e42-2487-4496-98b02f2222f3"
} | {
"account_age_days": 1173,
"account_id": "ACCT-E9A7DE286C52",
"baseline_risk_score": 0.205,
"kyc_tier": "tier_2",
"session_entropy": 0.378
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 113,
"timestamp": "2026-01-05T06:00:00Z",
"transaction_amount_usd": 2184306.89
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.468,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1784579.08,
"financial_exposure_usd": 2211296.58,
"recoverable_pct": 0.91
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104702",
"label": "fraudulent",
"label_confidence": 0.796,
"severity": "medium",
"timestamp": "2026-01-04T06:22:00Z",
"trace_id": "079e030b-9702-d941-5c21-9e314ab96fce"
} | {
"account_age_days": 513,
"account_id": "ACCT-5CF3A6C92D48",
"baseline_risk_score": 0.407,
"kyc_tier": "tier_2",
"session_entropy": 0.87
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 303,
"timestamp": "2026-01-04T01:32:00Z",
"transaction_amount_usd": 6.19
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.917,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1554472.09,
"financial_exposure_usd": 2786220.97,
"recoverable_pct": 0.633
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103741",
"label": "fraudulent",
"label_confidence": 0.669,
"severity": "high",
"timestamp": "2026-01-03T14:21:00Z",
"trace_id": "f22ba62a-5d21-2e69-8eea-ff4d1103acd1"
} | {
"account_age_days": 1504,
"account_id": "ACCT-A257DD0D95F8",
"baseline_risk_score": 0.415,
"kyc_tier": "tier_1",
"session_entropy": 0.121
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 813,
"timestamp": "2026-01-03T14:21:00Z",
"transaction_amount_usd": 2234280.47
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.515,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2349180.81,
"financial_exposure_usd": 5335191.68,
"recoverable_pct": 0.753
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107132",
"label": "benign",
"label_confidence": 0.547,
"severity": "low",
"timestamp": "2026-01-05T22:52:00Z",
"trace_id": "6e7249ee-2f25-5be7-19fe-82943b580d46"
} | {
"account_age_days": 154,
"account_id": "ACCT-93365027ED9A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.603
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 788,
"timestamp": "2026-01-05T22:52:00Z",
"transaction_amount_usd": 2358.1
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.603,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1101.9,
"financial_exposure_usd": 1434.39,
"recoverable_pct": 0.75
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101294",
"label": "fraudulent",
"label_confidence": 0.861,
"severity": "medium",
"timestamp": "2026-01-01T21:34:00Z",
"trace_id": "e2ebbe7c-9d0a-c65e-2a12-f55d242209fc"
} | {
"account_age_days": 115,
"account_id": "ACCT-4A79EE6B4063",
"baseline_risk_score": 0.488,
"kyc_tier": "tier_1",
"session_entropy": 0.378
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 250,
"timestamp": "2026-01-01T21:34:00Z",
"transaction_amount_usd": 25013
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.692,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 244249.06,
"financial_exposure_usd": 404424.18,
"recoverable_pct": 0.296
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107837",
"label": "benign",
"label_confidence": 0.576,
"severity": "low",
"timestamp": "2026-01-06T10:37:00Z",
"trace_id": "e9a6b629-e7f2-7d2e-0442-e984b121d8a9"
} | {
"account_age_days": 655,
"account_id": "ACCT-50E239412EDF",
"baseline_risk_score": 0.163,
"kyc_tier": "tier_2",
"session_entropy": 0.376
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 772,
"timestamp": "2026-01-06T10:37:00Z",
"transaction_amount_usd": 14927.38
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.503,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2526.63,
"financial_exposure_usd": 2800.07,
"recoverable_pct": 0.909
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106832",
"label": "benign",
"label_confidence": 0.639,
"severity": "high",
"timestamp": "2026-01-05T17:52:00Z",
"trace_id": "08ede25d-f5cf-30c0-57bc-becfbd74b42e"
} | {
"account_age_days": 831,
"account_id": "ACCT-933F9C78CC99",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.651
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 1048,
"timestamp": "2026-01-05T17:52:00Z",
"transaction_amount_usd": 13783.23
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.474,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 34.87,
"financial_exposure_usd": 74.21,
"recoverable_pct": 0.675
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106962",
"label": "benign",
"label_confidence": 0.647,
"severity": "medium",
"timestamp": "2026-01-05T20:02:00Z",
"trace_id": "dc6649c6-ff4f-cbcd-9458-5b670bcfb284"
} | {
"account_age_days": 674,
"account_id": "ACCT-F3A1F9A4DEEE",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.651
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 184,
"timestamp": "2026-01-05T10:20:00Z",
"transaction_amount_usd": 5.61
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.478,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2248.3,
"financial_exposure_usd": 4164.3,
"recoverable_pct": 0.814
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104538",
"label": "fraudulent",
"label_confidence": 0.651,
"severity": "critical",
"timestamp": "2026-01-04T03:38:00Z",
"trace_id": "6fc469c9-c6bf-e5f9-eeaf-301ec3919769"
} | {
"account_age_days": 215,
"account_id": "ACCT-51996779F94D",
"baseline_risk_score": 0.444,
"kyc_tier": "tier_1",
"session_entropy": 0.902
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 657,
"timestamp": "2026-01-04T03:38:00Z",
"transaction_amount_usd": 1301890.57
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.752,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1835266.25,
"financial_exposure_usd": 3453139.24,
"recoverable_pct": 0.509
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107543",
"label": "benign",
"label_confidence": 0.668,
"severity": "high",
"timestamp": "2026-01-06T05:43:00Z",
"trace_id": "870dfef5-cd9f-9a32-495d-3dd8060702f8"
} | {
"account_age_days": 1335,
"account_id": "ACCT-C38E42F225C0",
"baseline_risk_score": 0.171,
"kyc_tier": "tier_2",
"session_entropy": 0.211
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 373,
"timestamp": "2026-01-06T00:02:00Z",
"transaction_amount_usd": 1.36
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.615,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1703.54,
"financial_exposure_usd": 1855.41,
"recoverable_pct": 0.724
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106895",
"label": "benign",
"label_confidence": 0.733,
"severity": "medium",
"timestamp": "2026-01-05T18:55:00Z",
"trace_id": "2c229cfd-5b16-c9b4-6222-0b906b22c452"
} | {
"account_age_days": 514,
"account_id": "ACCT-7828E716059D",
"baseline_risk_score": 0.096,
"kyc_tier": "tier_3",
"session_entropy": 0.16
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 318,
"timestamp": "2026-01-05T18:55:00Z",
"transaction_amount_usd": 12489.87
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.738,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3094.81,
"financial_exposure_usd": 4360.76,
"recoverable_pct": 0.521
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106843",
"label": "benign",
"label_confidence": 0.571,
"severity": "high",
"timestamp": "2026-01-05T18:03:00Z",
"trace_id": "d534edc8-db97-d478-ff24-9f639659fed6"
} | {
"account_age_days": 688,
"account_id": "ACCT-31A38D25E7F8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.68
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 924,
"timestamp": "2026-01-05T18:03:00Z",
"transaction_amount_usd": 10344.06
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.729,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 4095.98,
"financial_exposure_usd": 5422.15,
"recoverable_pct": 0.74
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106196",
"label": "fraudulent",
"label_confidence": 0.604,
"severity": "high",
"timestamp": "2026-01-05T07:16:00Z",
"trace_id": "394c57ab-da48-04db-8820-b450d1184b71"
} | {
"account_age_days": 741,
"account_id": "ACCT-440D7796DC47",
"baseline_risk_score": 0.165,
"kyc_tier": "tier_2",
"session_entropy": 0.922
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 217,
"timestamp": "2026-01-04T22:25:00Z",
"transaction_amount_usd": 1.82
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.915,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4398667.25,
"financial_exposure_usd": 6282471.94,
"recoverable_pct": 0.825
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101692",
"label": "fraudulent",
"label_confidence": 0.826,
"severity": "high",
"timestamp": "2026-01-02T04:12:00Z",
"trace_id": "e9d2f9c7-691c-1cb2-a642-80bb6c51e175"
} | {
"account_age_days": 316,
"account_id": "ACCT-637210FC7D57",
"baseline_risk_score": 0.649,
"kyc_tier": "tier_3",
"session_entropy": 0.408
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 249,
"timestamp": "2026-01-02T04:12:00Z",
"transaction_amount_usd": 112698.97
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.593,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 218600.23,
"financial_exposure_usd": 388892.73,
"recoverable_pct": 0.636
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106889",
"label": "benign",
"label_confidence": 0.502,
"severity": "medium",
"timestamp": "2026-01-05T18:49:00Z",
"trace_id": "89645709-280f-4014-df84-bfc9f700ecd1"
} | {
"account_age_days": 610,
"account_id": "ACCT-B91907900AB1",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.639
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 407,
"timestamp": "2026-01-05T18:49:00Z",
"transaction_amount_usd": 6342.98
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.48,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 2999.47,
"financial_exposure_usd": 5260.17,
"recoverable_pct": 0.919
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107585",
"label": "benign",
"label_confidence": 0.599,
"severity": "high",
"timestamp": "2026-01-06T06:25:00Z",
"trace_id": "5e1c7f90-ef50-1c98-4496-33f3fdc20f9e"
} | {
"account_age_days": 888,
"account_id": "ACCT-AEED0AFF51CE",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.374
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 1165,
"timestamp": "2026-01-06T06:25:00Z",
"transaction_amount_usd": 6349.76
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.574,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1666.01,
"financial_exposure_usd": 4112.33,
"recoverable_pct": 0.687
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106566",
"label": "fraudulent",
"label_confidence": 0.765,
"severity": "medium",
"timestamp": "2026-01-05T13:26:00Z",
"trace_id": "ec20655d-a40b-8eab-986e-bff36edf6bbc"
} | {
"account_age_days": 1242,
"account_id": "ACCT-49F72713E371",
"baseline_risk_score": 0.198,
"kyc_tier": "tier_1",
"session_entropy": 0.385
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 163,
"timestamp": "2026-01-05T13:26:00Z",
"transaction_amount_usd": 2413920.7
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.73,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1791651.94,
"financial_exposure_usd": 3382222.24,
"recoverable_pct": 0.767
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101469",
"label": "fraudulent",
"label_confidence": 0.957,
"severity": "medium",
"timestamp": "2026-01-02T00:29:00Z",
"trace_id": "820c534d-65b0-2032-080a-d25a33814eee"
} | {
"account_age_days": 809,
"account_id": "ACCT-98DBA83DA371",
"baseline_risk_score": 0.308,
"kyc_tier": "tier_1",
"session_entropy": 0.634
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 123,
"timestamp": "2026-01-01T22:49:00Z",
"transaction_amount_usd": 11.85
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.745,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 525292.89,
"financial_exposure_usd": 558549.74,
"recoverable_pct": 0.843
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105380",
"label": "fraudulent",
"label_confidence": 0.799,
"severity": "high",
"timestamp": "2026-01-04T17:40:00Z",
"trace_id": "f81891d1-2462-1dc7-fecc-8860faf73b53"
} | {
"account_age_days": 1438,
"account_id": "ACCT-308F4E7E9686",
"baseline_risk_score": 0.159,
"kyc_tier": "tier_3",
"session_entropy": 0.232
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 267,
"timestamp": "2026-01-04T15:16:00Z",
"transaction_amount_usd": 17.4
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.396,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4216508.75,
"financial_exposure_usd": 5585390.72,
"recoverable_pct": 0.47
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109318",
"label": "benign",
"label_confidence": 0.595,
"severity": "low",
"timestamp": "2026-01-07T11:18:00Z",
"trace_id": "9a14f5d2-73c6-235e-750f-d9399f3e78ec"
} | {
"account_age_days": 1055,
"account_id": "ACCT-5A09C4ACB682",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.738
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 226,
"timestamp": "2026-01-07T10:42:00Z",
"transaction_amount_usd": 24.8
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.549,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2591.65,
"financial_exposure_usd": 3220.35,
"recoverable_pct": 0.559
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107749",
"label": "benign",
"label_confidence": 0.473,
"severity": "low",
"timestamp": "2026-01-06T09:09:00Z",
"trace_id": "fc42b4cc-9aac-6c6d-8978-e8ce823aa9bd"
} | {
"account_age_days": 604,
"account_id": "ACCT-9D2C6C3AE012",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.42
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 80,
"timestamp": "2026-01-06T09:09:00Z",
"transaction_amount_usd": 3528.43
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.699,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1599.69,
"financial_exposure_usd": 1807.74,
"recoverable_pct": 0.492
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100031",
"label": "fraudulent",
"label_confidence": 0.956,
"severity": "high",
"timestamp": "2026-01-01T00:31:00Z",
"trace_id": "3818cfd3-3889-936a-9d58-17e85e175b66"
} | {
"account_age_days": 371,
"account_id": "ACCT-081FC6DC78D9",
"baseline_risk_score": 0.274,
"kyc_tier": "tier_1",
"session_entropy": 0.344
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 1044,
"timestamp": "2026-01-01T00:31:00Z",
"transaction_amount_usd": 54869.95
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.575,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 324332.32,
"financial_exposure_usd": 484713.08,
"recoverable_pct": 0.78
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101858",
"label": "fraudulent",
"label_confidence": 0.956,
"severity": "high",
"timestamp": "2026-01-02T06:58:00Z",
"trace_id": "920e1dcd-024d-7930-ffb7-7e5d5c8c4b9f"
} | {
"account_age_days": 501,
"account_id": "ACCT-338755F3B1B5",
"baseline_risk_score": 0.563,
"kyc_tier": "tier_1",
"session_entropy": 0.127
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CH",
"latency_ms": 641,
"timestamp": "2026-01-02T06:58:00Z",
"transaction_amount_usd": 112822.8
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.932,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 549814.3,
"financial_exposure_usd": 1111771.88,
"recoverable_pct": 0.651
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107700",
"label": "benign",
"label_confidence": 0.459,
"severity": "high",
"timestamp": "2026-01-06T08:20:00Z",
"trace_id": "c7b617c3-7c44-baee-3d9e-9dd413a55cec"
} | {
"account_age_days": 724,
"account_id": "ACCT-31F1C4CED0CD",
"baseline_risk_score": 0.107,
"kyc_tier": "tier_1",
"session_entropy": 0.778
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 993,
"timestamp": "2026-01-06T08:20:00Z",
"transaction_amount_usd": 8320.36
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.597,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 7742.46,
"financial_exposure_usd": 8648.12,
"recoverable_pct": 0.57
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108959",
"label": "benign",
"label_confidence": 0.598,
"severity": "low",
"timestamp": "2026-01-07T05:19:00Z",
"trace_id": "81bccc17-8d17-e1de-5915-884c33df9dde"
} | {
"account_age_days": 1094,
"account_id": "ACCT-F1C30EA0C42D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.824
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 479,
"timestamp": "2026-01-07T05:19:00Z",
"transaction_amount_usd": 10746.3
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.687,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1514.37,
"financial_exposure_usd": 2268.48,
"recoverable_pct": 0.755
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104096",
"label": "fraudulent",
"label_confidence": 0.842,
"severity": "high",
"timestamp": "2026-01-03T20:16:00Z",
"trace_id": "b4519673-ccca-3873-4eee-36d4e0a182f9"
} | {
"account_age_days": 266,
"account_id": "ACCT-098D4A14E973",
"baseline_risk_score": 0.312,
"kyc_tier": "tier_1",
"session_entropy": 0.901
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 357,
"timestamp": "2026-01-03T10:51:00Z",
"transaction_amount_usd": 8.09
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.608,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1899854.05,
"financial_exposure_usd": 3852906.45,
"recoverable_pct": 0.748
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101824",
"label": "fraudulent",
"label_confidence": 0.964,
"severity": "high",
"timestamp": "2026-01-02T06:24:00Z",
"trace_id": "24785248-c0b5-770f-4b6d-35a0c7268b74"
} | {
"account_age_days": 1941,
"account_id": "ACCT-CD530AB5703A",
"baseline_risk_score": 0.325,
"kyc_tier": "tier_1",
"session_entropy": 0.685
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 1018,
"timestamp": "2026-01-02T06:24:00Z",
"transaction_amount_usd": 85795.23
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.943,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 271311.15,
"financial_exposure_usd": 360709.33,
"recoverable_pct": 0.699
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100975",
"label": "fraudulent",
"label_confidence": 0.886,
"severity": "critical",
"timestamp": "2026-01-01T16:15:00Z",
"trace_id": "854e0330-becd-0ffc-54e9-764f1f523682"
} | {
"account_age_days": 290,
"account_id": "ACCT-89D0C704BD76",
"baseline_risk_score": 0.55,
"kyc_tier": "tier_2",
"session_entropy": 0.576
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 251,
"timestamp": "2026-01-01T16:15:00Z",
"transaction_amount_usd": 18684.37
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.769,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 426894.93,
"financial_exposure_usd": 811656.8,
"recoverable_pct": 0.507
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103701",
"label": "fraudulent",
"label_confidence": 0.808,
"severity": "critical",
"timestamp": "2026-01-03T13:41:00Z",
"trace_id": "8d7ebf8e-53c3-8cba-bf78-6cb8ee3956e6"
} | {
"account_age_days": 600,
"account_id": "ACCT-67D86A3F63DD",
"baseline_risk_score": 0.296,
"kyc_tier": "tier_2",
"session_entropy": 0.903
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 336,
"timestamp": "2026-01-03T13:41:00Z",
"transaction_amount_usd": 952064.97
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.875,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2102609.45,
"financial_exposure_usd": 4085172.85,
"recoverable_pct": 0.827
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107349",
"label": "benign",
"label_confidence": 0.613,
"severity": "low",
"timestamp": "2026-01-06T02:29:00Z",
"trace_id": "926629f5-a8ec-f898-bd87-88bda9a4f759"
} | {
"account_age_days": 609,
"account_id": "ACCT-A1344C0ED3A9",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.55
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 474,
"timestamp": "2026-01-06T02:29:00Z",
"transaction_amount_usd": 10094.02
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.648,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 5489.31,
"financial_exposure_usd": 6527.4,
"recoverable_pct": 0.416
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107755",
"label": "benign",
"label_confidence": 0.537,
"severity": "high",
"timestamp": "2026-01-06T09:15:00Z",
"trace_id": "6a3bc3e6-fce3-83b6-d76f-f3d5b7d16932"
} | {
"account_age_days": 622,
"account_id": "ACCT-458B6B8A6E85",
"baseline_risk_score": 0.058,
"kyc_tier": "tier_1",
"session_entropy": 0.924
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 392,
"timestamp": "2026-01-06T09:15:00Z",
"transaction_amount_usd": 8184.39
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.503,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1533.69,
"financial_exposure_usd": 2170.86,
"recoverable_pct": 0.545
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104562",
"label": "fraudulent",
"label_confidence": 0.606,
"severity": "low",
"timestamp": "2026-01-04T04:02:00Z",
"trace_id": "36c6bcdb-dc58-fd66-fa4d-765782d8b66a"
} | {
"account_age_days": 335,
"account_id": "ACCT-7CA1A2AF7A69",
"baseline_risk_score": 0.123,
"kyc_tier": "tier_3",
"session_entropy": 0.602
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 639,
"timestamp": "2026-01-04T04:02:00Z",
"transaction_amount_usd": 1390451.26
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.4,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND poste... | {
"customer_funds_at_risk_usd": 1957061.68,
"financial_exposure_usd": 3242612.86,
"recoverable_pct": 0.972
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100419",
"label": "fraudulent",
"label_confidence": 0.932,
"severity": "critical",
"timestamp": "2026-01-01T06:59:00Z",
"trace_id": "89016a1b-6d56-06d3-57c4-e3d983a52e89"
} | {
"account_age_days": 552,
"account_id": "ACCT-41D6045C6CA5",
"baseline_risk_score": 0.511,
"kyc_tier": "tier_3",
"session_entropy": 0.384
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 1108,
"timestamp": "2026-01-01T06:59:00Z",
"transaction_amount_usd": 99900.48
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.563,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 441497.85,
"financial_exposure_usd": 996238.33,
"recoverable_pct": 0.304
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107863",
"label": "benign",
"label_confidence": 0.694,
"severity": "medium",
"timestamp": "2026-01-06T11:03:00Z",
"trace_id": "1a4df54a-d9c6-8db8-e1fe-a3e95ea49958"
} | {
"account_age_days": 1181,
"account_id": "ACCT-F6F0894AFE8E",
"baseline_risk_score": 0.065,
"kyc_tier": "tier_3",
"session_entropy": 0.124
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 1067,
"timestamp": "2026-01-06T11:03:00Z",
"transaction_amount_usd": 12281.53
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.781,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1177.87,
"financial_exposure_usd": 1587.43,
"recoverable_pct": 0.889
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103935",
"label": "fraudulent",
"label_confidence": 0.609,
"severity": "medium",
"timestamp": "2026-01-03T17:35:00Z",
"trace_id": "91a3b92d-f8a6-b20b-b81c-ef58170de5d6"
} | {
"account_age_days": 511,
"account_id": "ACCT-6F93465E1C86",
"baseline_risk_score": 0.362,
"kyc_tier": "tier_2",
"session_entropy": 0.634
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 712,
"timestamp": "2026-01-03T17:35:00Z",
"transaction_amount_usd": 1025937.97
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.878,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 5058511.29,
"financial_exposure_usd": 5633494.27,
"recoverable_pct": 0.622
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107403",
"label": "benign",
"label_confidence": 0.567,
"severity": "medium",
"timestamp": "2026-01-06T03:23:00Z",
"trace_id": "c52b1877-3547-b6fc-6b85-2d48189a46de"
} | {
"account_age_days": 1334,
"account_id": "ACCT-7534D024E724",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.659
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 872,
"timestamp": "2026-01-06T03:23:00Z",
"transaction_amount_usd": 12219.86
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.754,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 0, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 0,
"financial_exposure_usd": 0,
"recoverable_pct": 0.548
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107199",
"label": "benign",
"label_confidence": 0.714,
"severity": "low",
"timestamp": "2026-01-05T23:59:00Z",
"trace_id": "fa4b0b80-24d2-9c5a-552d-90041ac83208"
} | {
"account_age_days": 262,
"account_id": "ACCT-D053DA9288B3",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.757
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 113,
"timestamp": "2026-01-05T14:00:00Z",
"transaction_amount_usd": 21.32
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.482,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2175.16,
"financial_exposure_usd": 2217.11,
"recoverable_pct": 0.731
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109688",
"label": "benign",
"label_confidence": 0.64,
"severity": "medium",
"timestamp": "2026-01-07T17:28:00Z",
"trace_id": "5315173d-bfca-dddb-cecb-9d3ede2f87ee"
} | {
"account_age_days": 610,
"account_id": "ACCT-A881D5F39307",
"baseline_risk_score": 0.197,
"kyc_tier": "tier_1",
"session_entropy": 0.809
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 170,
"timestamp": "2026-01-07T12:31:00Z",
"transaction_amount_usd": 9.13
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.638,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 9858.68,
"financial_exposure_usd": 9975.92,
"recoverable_pct": 0.652
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105703",
"label": "fraudulent",
"label_confidence": 0.634,
"severity": "high",
"timestamp": "2026-01-04T23:03:00Z",
"trace_id": "c32bd47e-5e67-e9c4-534e-a78485022922"
} | {
"account_age_days": 141,
"account_id": "ACCT-D364D6CC24C8",
"baseline_risk_score": 0.293,
"kyc_tier": "tier_1",
"session_entropy": 0.752
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 378,
"timestamp": "2026-01-04T23:03:00Z",
"transaction_amount_usd": 1564337.7
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.921,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3143703.76,
"financial_exposure_usd": 3890862.28,
"recoverable_pct": 0.588
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104457",
"label": "fraudulent",
"label_confidence": 0.808,
"severity": "high",
"timestamp": "2026-01-04T02:17:00Z",
"trace_id": "7e490b50-0bdc-4310-b148-118ebc52cee1"
} | {
"account_age_days": 943,
"account_id": "ACCT-68BE7CEC260D",
"baseline_risk_score": 0.301,
"kyc_tier": "tier_2",
"session_entropy": 0.194
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 159,
"timestamp": "2026-01-03T22:42:00Z",
"transaction_amount_usd": 17.72
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.501,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 5252435.47,
"financial_exposure_usd": 5423244.05,
"recoverable_pct": 0.517
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100074",
"label": "fraudulent",
"label_confidence": 0.833,
"severity": "high",
"timestamp": "2026-01-01T01:14:00Z",
"trace_id": "bb7eb979-52dc-bffd-5900-8d658b2ab759"
} | {
"account_age_days": 1629,
"account_id": "ACCT-6A7BE8B1E3F3",
"baseline_risk_score": 0.506,
"kyc_tier": "tier_3",
"session_entropy": 0.799
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 357,
"timestamp": "2025-12-31T16:09:00Z",
"transaction_amount_usd": 11.23
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.844,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 444057.87,
"financial_exposure_usd": 618971.47,
"recoverable_pct": 0.624
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106221",
"label": "fraudulent",
"label_confidence": 0.672,
"severity": "critical",
"timestamp": "2026-01-05T07:41:00Z",
"trace_id": "65771db6-c7a5-8dc4-b510-5081e69ad127"
} | {
"account_age_days": 1874,
"account_id": "ACCT-DE90A06E6B8E",
"baseline_risk_score": 0.334,
"kyc_tier": "tier_3",
"session_entropy": 0.677
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 510,
"timestamp": "2026-01-05T07:41:00Z",
"transaction_amount_usd": 2647880.18
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.423,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3153356.19,
"financial_exposure_usd": 5933208.4,
"recoverable_pct": 0.493
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101663",
"label": "fraudulent",
"label_confidence": 0.818,
"severity": "high",
"timestamp": "2026-01-02T03:43:00Z",
"trace_id": "f7f64593-1d80-3a45-ef82-1c91da2515e4"
} | {
"account_age_days": 203,
"account_id": "ACCT-74E82A4DA8CA",
"baseline_risk_score": 0.366,
"kyc_tier": "tier_2",
"session_entropy": 0.881
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 665,
"timestamp": "2026-01-02T03:43:00Z",
"transaction_amount_usd": 60463.8
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.363,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 35533.12,
"financial_exposure_usd": 60038.59,
"recoverable_pct": 0.799
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100489",
"label": "fraudulent",
"label_confidence": 0.882,
"severity": "critical",
"timestamp": "2026-01-01T08:09:00Z",
"trace_id": "0b8a48fb-3d5f-d707-2659-185b0ec937c6"
} | {
"account_age_days": 1131,
"account_id": "ACCT-50216737B2E1",
"baseline_risk_score": 0.345,
"kyc_tier": "tier_2",
"session_entropy": 0.932
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 418,
"timestamp": "2026-01-01T08:09:00Z",
"transaction_amount_usd": 77568.47
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.777,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 739539.98,
"financial_exposure_usd": 944393.98,
"recoverable_pct": 0.767
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108197",
"label": "benign",
"label_confidence": 0.484,
"severity": "critical",
"timestamp": "2026-01-06T16:37:00Z",
"trace_id": "5f5b7554-f01a-2ec5-deae-fb1f298c3190"
} | {
"account_age_days": 1781,
"account_id": "ACCT-CE2688960432",
"baseline_risk_score": 0.06,
"kyc_tier": "tier_2",
"session_entropy": 0.89
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 236,
"timestamp": "2026-01-06T11:19:00Z",
"transaction_amount_usd": 2.99
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.586,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1453.76,
"financial_exposure_usd": 1755.25,
"recoverable_pct": 0.623
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103738",
"label": "fraudulent",
"label_confidence": 0.694,
"severity": "high",
"timestamp": "2026-01-03T14:18:00Z",
"trace_id": "6303346f-e2ef-243c-c215-afaea1e283c4"
} | {
"account_age_days": 1250,
"account_id": "ACCT-5D378C277FBB",
"baseline_risk_score": 0.057,
"kyc_tier": "tier_3",
"session_entropy": 0.495
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 552,
"timestamp": "2026-01-03T14:18:00Z",
"transaction_amount_usd": 1770742.73
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.682,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2997207.24,
"financial_exposure_usd": 4793207.18,
"recoverable_pct": 0.424
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107893",
"label": "benign",
"label_confidence": 0.462,
"severity": "high",
"timestamp": "2026-01-06T11:33:00Z",
"trace_id": "de550f29-700b-ed2c-c9c8-9498f45c4654"
} | {
"account_age_days": 1345,
"account_id": "ACCT-DF5B35F2763D",
"baseline_risk_score": 0.157,
"kyc_tier": "tier_2",
"session_entropy": 0.373
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 735,
"timestamp": "2026-01-06T11:33:00Z",
"transaction_amount_usd": 8010.92
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.553,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2337.1,
"financial_exposure_usd": 2949.44,
"recoverable_pct": 0.52
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102817",
"label": "fraudulent",
"label_confidence": 0.95,
"severity": "high",
"timestamp": "2026-01-02T22:57:00Z",
"trace_id": "34162235-7ccf-dc5c-b79f-6269cbe51761"
} | {
"account_age_days": 536,
"account_id": "ACCT-39B205C434AA",
"baseline_risk_score": 0.619,
"kyc_tier": "tier_1",
"session_entropy": 0.14
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 381,
"timestamp": "2026-01-02T16:05:00Z",
"transaction_amount_usd": 7.44
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.574,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 588523,
"financial_exposure_usd": 1026135.03,
"recoverable_pct": 0.447
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108247",
"label": "benign",
"label_confidence": 0.683,
"severity": "low",
"timestamp": "2026-01-06T17:27:00Z",
"trace_id": "e2035c30-5b2d-2af7-d802-911b9ae325db"
} | {
"account_age_days": 740,
"account_id": "ACCT-6DE31B68CEE7",
"baseline_risk_score": 0.18,
"kyc_tier": "tier_2",
"session_entropy": 0.711
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 1104,
"timestamp": "2026-01-06T17:27:00Z",
"transaction_amount_usd": 2774.18
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.583,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2283.48,
"financial_exposure_usd": 2291.6,
"recoverable_pct": 0.59
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109209",
"label": "benign",
"label_confidence": 0.698,
"severity": "critical",
"timestamp": "2026-01-07T09:29:00Z",
"trace_id": "a40b60d6-4a3c-838e-1106-85252f9af7cf"
} | {
"account_age_days": 512,
"account_id": "ACCT-9DAA31FBB204",
"baseline_risk_score": 0.197,
"kyc_tier": "tier_3",
"session_entropy": 0.591
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 774,
"timestamp": "2026-01-07T09:29:00Z",
"transaction_amount_usd": 2949.09
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.706,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 4344.88,
"financial_exposure_usd": 6529.68,
"recoverable_pct": 0.71
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109453",
"label": "benign",
"label_confidence": 0.531,
"severity": "low",
"timestamp": "2026-01-07T13:33:00Z",
"trace_id": "233e6178-3598-e1e1-ee1f-6664a4c1b96e"
} | {
"account_age_days": 999,
"account_id": "ACCT-5BD2F9D45704",
"baseline_risk_score": 0.175,
"kyc_tier": "tier_2",
"session_entropy": 0.601
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 940,
"timestamp": "2026-01-07T13:33:00Z",
"transaction_amount_usd": 7743.33
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.492,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 4399.92,
"financial_exposure_usd": 6099.45,
"recoverable_pct": 0.581
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104551",
"label": "fraudulent",
"label_confidence": 0.742,
"severity": "critical",
"timestamp": "2026-01-04T03:51:00Z",
"trace_id": "f2943feb-942d-1114-b3a2-104e1daa10ea"
} | {
"account_age_days": 1059,
"account_id": "ACCT-5526ABF46B23",
"baseline_risk_score": 0.196,
"kyc_tier": "tier_3",
"session_entropy": 0.584
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 581,
"timestamp": "2026-01-04T03:51:00Z",
"transaction_amount_usd": 1472665.94
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.472,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3249330,
"financial_exposure_usd": 3867985.24,
"recoverable_pct": 0.919
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107269",
"label": "benign",
"label_confidence": 0.588,
"severity": "high",
"timestamp": "2026-01-06T01:09:00Z",
"trace_id": "b9945572-f0a1-1c15-83ad-5b7ce9a7218e"
} | {
"account_age_days": 1205,
"account_id": "ACCT-82A9799AB37E",
"baseline_risk_score": 0.147,
"kyc_tier": "tier_2",
"session_entropy": 0.406
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 840,
"timestamp": "2026-01-06T01:09:00Z",
"transaction_amount_usd": 11444.11
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.532,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 492.11,
"financial_exposure_usd": 1197.14,
"recoverable_pct": 0.667
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101757",
"label": "fraudulent",
"label_confidence": 0.974,
"severity": "low",
"timestamp": "2026-01-02T05:17:00Z",
"trace_id": "a7196edb-6b03-e18e-90fd-34c6eec040d3"
} | {
"account_age_days": 792,
"account_id": "ACCT-1DF48D4E51A6",
"baseline_risk_score": 0.415,
"kyc_tier": "tier_2",
"session_entropy": 0.734
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 335,
"timestamp": "2026-01-02T03:08:00Z",
"transaction_amount_usd": 4.4
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.866,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 633651.54,
"financial_exposure_usd": 976309.57,
"recoverable_pct": 0.78
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101934",
"label": "fraudulent",
"label_confidence": 0.932,
"severity": "critical",
"timestamp": "2026-01-02T08:14:00Z",
"trace_id": "5382d7fb-ff36-341a-d2c3-d8b3fc942a78"
} | {
"account_age_days": 119,
"account_id": "ACCT-5C41972FB93F",
"baseline_risk_score": 0.255,
"kyc_tier": "tier_3",
"session_entropy": 0.447
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 301,
"timestamp": "2026-01-01T21:29:00Z",
"transaction_amount_usd": 13.96
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.876,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 954745.08,
"financial_exposure_usd": 982845.11,
"recoverable_pct": 0.329
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101427",
"label": "fraudulent",
"label_confidence": 0.819,
"severity": "high",
"timestamp": "2026-01-01T23:47:00Z",
"trace_id": "c5cd1d28-46cc-6947-1006-ba3244965eb6"
} | {
"account_age_days": 1570,
"account_id": "ACCT-D29258703AA6",
"baseline_risk_score": 0.624,
"kyc_tier": "tier_2",
"session_entropy": 0.76
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 641,
"timestamp": "2026-01-01T23:47:00Z",
"transaction_amount_usd": 21970.35
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.507,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 331280.8,
"financial_exposure_usd": 448146.54,
"recoverable_pct": 0.371
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105705",
"label": "fraudulent",
"label_confidence": 0.942,
"severity": "medium",
"timestamp": "2026-01-04T23:05:00Z",
"trace_id": "c9cba15c-091d-da84-559e-049c58b1adcb"
} | {
"account_age_days": 1610,
"account_id": "ACCT-BFF38FC2091D",
"baseline_risk_score": 0.279,
"kyc_tier": "tier_1",
"session_entropy": 0.825
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 540,
"timestamp": "2026-01-04T23:05:00Z",
"transaction_amount_usd": 1113585.65
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.653,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2011136.34,
"financial_exposure_usd": 2284978.43,
"recoverable_pct": 0.688
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108698",
"label": "benign",
"label_confidence": 0.627,
"severity": "low",
"timestamp": "2026-01-07T00:58:00Z",
"trace_id": "929947f4-8f91-2b05-789b-485105788fba"
} | {
"account_age_days": 1534,
"account_id": "ACCT-64E7C2D79900",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.782
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 476,
"timestamp": "2026-01-07T00:58:00Z",
"transaction_amount_usd": 11183.81
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.572,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1497.59,
"financial_exposure_usd": 3454.36,
"recoverable_pct": 0.917
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104070",
"label": "fraudulent",
"label_confidence": 0.861,
"severity": "low",
"timestamp": "2026-01-03T19:50:00Z",
"trace_id": "c64b339f-13d9-259a-3b77-8dc75bef4ded"
} | {
"account_age_days": 1518,
"account_id": "ACCT-FA477177BA71",
"baseline_risk_score": 0.271,
"kyc_tier": "tier_1",
"session_entropy": 0.62
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 274,
"timestamp": "2026-01-03T19:50:00Z",
"transaction_amount_usd": 2936961.93
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.897,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1173233.41,
"financial_exposure_usd": 1809326.39,
"recoverable_pct": 0.938
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102701",
"label": "fraudulent",
"label_confidence": 0.956,
"severity": "critical",
"timestamp": "2026-01-02T21:01:00Z",
"trace_id": "91758616-a7fd-d3a8-3e19-7ea25887a6b2"
} | {
"account_age_days": 493,
"account_id": "ACCT-78378AA12A9B",
"baseline_risk_score": 0.366,
"kyc_tier": "tier_3",
"session_entropy": 0.552
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 169,
"timestamp": "2026-01-02T19:47:00Z",
"transaction_amount_usd": 21.84
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.36,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 392180.06,
"financial_exposure_usd": 962542.61,
"recoverable_pct": 0.436
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108338",
"label": "benign",
"label_confidence": 0.685,
"severity": "medium",
"timestamp": "2026-01-06T18:58:00Z",
"trace_id": "24a2b051-e85e-76bd-0bef-2e905129a706"
} | {
"account_age_days": 130,
"account_id": "ACCT-7ACAF3DC9557",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.608
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 394,
"timestamp": "2026-01-06T08:28:00Z",
"transaction_amount_usd": 2.08
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.655,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1800.74,
"financial_exposure_usd": 2268.3,
"recoverable_pct": 0.576
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102648",
"label": "fraudulent",
"label_confidence": 0.791,
"severity": "high",
"timestamp": "2026-01-02T20:08:00Z",
"trace_id": "27046881-8eb5-8ad5-9847-0a942ad3582e"
} | {
"account_age_days": 1515,
"account_id": "ACCT-C68D128DCE4A",
"baseline_risk_score": 0.322,
"kyc_tier": "tier_1",
"session_entropy": 0.78
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 164,
"timestamp": "2026-01-02T10:31:00Z",
"transaction_amount_usd": 24.72
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.588,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 439488.18,
"financial_exposure_usd": 577666.33,
"recoverable_pct": 0.233
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103225",
"label": "fraudulent",
"label_confidence": 0.762,
"severity": "low",
"timestamp": "2026-01-03T05:45:00Z",
"trace_id": "20582a17-ff05-7311-b0c3-b0bafe602522"
} | {
"account_age_days": 384,
"account_id": "ACCT-F7E0D322EE55",
"baseline_risk_score": 0.323,
"kyc_tier": "tier_3",
"session_entropy": 0.511
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 844,
"timestamp": "2026-01-03T05:45:00Z",
"transaction_amount_usd": 24912.43
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.791,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 354176.28,
"financial_exposure_usd": 867360.95,
"recoverable_pct": 0.223
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.