schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106787",
"label": "benign",
"label_confidence": 0.712,
"severity": "medium",
"timestamp": "2026-01-05T17:07:00Z",
"trace_id": "fed758c6-456d-eb3c-2a7a-d21eca439163"
} | {
"account_age_days": 331,
"account_id": "ACCT-E48E8BCE48D0",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.191
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 983,
"timestamp": "2026-01-05T17:07:00Z",
"transaction_amount_usd": 8451.04
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.525,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 4606.73,
"financial_exposure_usd": 6871.19,
"recoverable_pct": 0.663
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107188",
"label": "benign",
"label_confidence": 0.699,
"severity": "high",
"timestamp": "2026-01-05T23:48:00Z",
"trace_id": "bbd9e18d-fe08-31bd-bf0f-c979521ffe8d"
} | {
"account_age_days": 917,
"account_id": "ACCT-5E7940078ADB",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.67
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 845,
"timestamp": "2026-01-05T23:48:00Z",
"transaction_amount_usd": 1775.43
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.69,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 1545.71,
"financial_exposure_usd": 2868.85,
"recoverable_pct": 0.781
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101505",
"label": "fraudulent",
"label_confidence": 0.9,
"severity": "medium",
"timestamp": "2026-01-02T01:05:00Z",
"trace_id": "2afd5ef9-b27d-c823-a7e1-4b7e2871a2c1"
} | {
"account_age_days": 469,
"account_id": "ACCT-466F51266182",
"baseline_risk_score": 0.476,
"kyc_tier": "tier_1",
"session_entropy": 0.226
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 172,
"timestamp": "2026-01-01T21:51:00Z",
"transaction_amount_usd": 2.96
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.525,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 632885.66,
"financial_exposure_usd": 879242.34,
"recoverable_pct": 0.055
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101600",
"label": "fraudulent",
"label_confidence": 0.774,
"severity": "critical",
"timestamp": "2026-01-02T02:40:00Z",
"trace_id": "e12e3c58-fda9-e049-ce97-ed43142e7e9b"
} | {
"account_age_days": 926,
"account_id": "ACCT-92EB46A89AB9",
"baseline_risk_score": 0.648,
"kyc_tier": "tier_3",
"session_entropy": 0.531
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 746,
"timestamp": "2026-01-02T02:40:00Z",
"transaction_amount_usd": 70290.15
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.745,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 671799.18,
"financial_exposure_usd": 808513.22,
"recoverable_pct": 0.362
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104345",
"label": "fraudulent",
"label_confidence": 0.674,
"severity": "low",
"timestamp": "2026-01-04T00:25:00Z",
"trace_id": "14212c42-a6a1-3ffa-2571-cc163901e258"
} | {
"account_age_days": 864,
"account_id": "ACCT-6F072F0570D7",
"baseline_risk_score": 0.384,
"kyc_tier": "tier_3",
"session_entropy": 0.298
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 362,
"timestamp": "2026-01-04T00:25:00Z",
"transaction_amount_usd": 587989.48
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.352,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 163690.02,
"financial_exposure_usd": 322615.66,
"recoverable_pct": 0.864
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100120",
"label": "fraudulent",
"label_confidence": 0.928,
"severity": "medium",
"timestamp": "2026-01-01T02:00:00Z",
"trace_id": "eaadcb2f-0f89-2df6-f97a-822c15e59a0f"
} | {
"account_age_days": 758,
"account_id": "ACCT-9A73CD2F4F05",
"baseline_risk_score": 0.604,
"kyc_tier": "tier_1",
"session_entropy": 0.391
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "FR",
"latency_ms": 985,
"timestamp": "2026-01-01T02:00:00Z",
"transaction_amount_usd": 106865.01
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.702,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 117276.96,
"financial_exposure_usd": 269980.44,
"recoverable_pct": 0.431
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108995",
"label": "benign",
"label_confidence": 0.739,
"severity": "medium",
"timestamp": "2026-01-07T05:55:00Z",
"trace_id": "b53de8aa-c4a9-ad3e-a7f2-0f2b6094bc9e"
} | {
"account_age_days": 1753,
"account_id": "ACCT-B5C6486DADD3",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.855
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 677,
"timestamp": "2026-01-07T05:55:00Z",
"transaction_amount_usd": 12064.99
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.653,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3163.46,
"financial_exposure_usd": 4520.05,
"recoverable_pct": 0.79
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104736",
"label": "fraudulent",
"label_confidence": 0.792,
"severity": "high",
"timestamp": "2026-01-04T06:56:00Z",
"trace_id": "48cbc932-0e80-6182-6e44-82c569721bd5"
} | {
"account_age_days": 916,
"account_id": "ACCT-B7E1C21DC32D",
"baseline_risk_score": 0.37,
"kyc_tier": "tier_3",
"session_entropy": 0.829
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 140,
"timestamp": "2026-01-04T06:56:00Z",
"transaction_amount_usd": 2802119.91
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.799,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 298530.87,
"financial_exposure_usd": 440660.6,
"recoverable_pct": 0.526
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108052",
"label": "benign",
"label_confidence": 0.655,
"severity": "high",
"timestamp": "2026-01-06T14:12:00Z",
"trace_id": "1dd4af18-2dd2-778c-9452-9326ee211bc0"
} | {
"account_age_days": 1001,
"account_id": "ACCT-20E68BC4950A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.178
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 733,
"timestamp": "2026-01-06T14:12:00Z",
"transaction_amount_usd": 10758.1
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.734,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 401.3,
"financial_exposure_usd": 784.55,
"recoverable_pct": 0.461
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103770",
"label": "fraudulent",
"label_confidence": 0.642,
"severity": "medium",
"timestamp": "2026-01-03T14:50:00Z",
"trace_id": "bb623876-644d-c814-f301-a94e6a2b7611"
} | {
"account_age_days": 205,
"account_id": "ACCT-1AC207F9E187",
"baseline_risk_score": 0.172,
"kyc_tier": "tier_1",
"session_entropy": 0.815
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 1113,
"timestamp": "2026-01-03T14:50:00Z",
"transaction_amount_usd": 505372.18
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.352,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3491686.93,
"financial_exposure_usd": 4679044.95,
"recoverable_pct": 0.824
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102426",
"label": "fraudulent",
"label_confidence": 0.924,
"severity": "critical",
"timestamp": "2026-01-02T16:26:00Z",
"trace_id": "dc0282df-9662-2a38-b597-168811dadaf8"
} | {
"account_age_days": 893,
"account_id": "ACCT-FCB36A989221",
"baseline_risk_score": 0.351,
"kyc_tier": "tier_1",
"session_entropy": 0.941
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 192,
"timestamp": "2026-01-02T04:52:00Z",
"transaction_amount_usd": 16.8
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.849,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 672598.12,
"financial_exposure_usd": 1119861.43,
"recoverable_pct": 0.444
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109890",
"label": "benign",
"label_confidence": 0.555,
"severity": "low",
"timestamp": "2026-01-07T20:50:00Z",
"trace_id": "4cbd0320-6a0a-9613-96a9-a526ceaff38b"
} | {
"account_age_days": 656,
"account_id": "ACCT-8AFCF867E48B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.471
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 594,
"timestamp": "2026-01-07T20:50:00Z",
"transaction_amount_usd": 11886.62
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.47,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 570.06,
"financial_exposure_usd": 789.32,
"recoverable_pct": 0.812
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105113",
"label": "fraudulent",
"label_confidence": 0.601,
"severity": "low",
"timestamp": "2026-01-04T13:13:00Z",
"trace_id": "d8ecc387-d3cd-c107-6875-122b0823e7e1"
} | {
"account_age_days": 1149,
"account_id": "ACCT-01BAD1E0990D",
"baseline_risk_score": 0.418,
"kyc_tier": "tier_1",
"session_entropy": 0.907
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 139,
"timestamp": "2026-01-04T10:30:00Z",
"transaction_amount_usd": 2.88
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.45,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 3138317.19,
"financial_exposure_usd": 6790446.99,
"recoverable_pct": 0.713
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103349",
"label": "fraudulent",
"label_confidence": 0.779,
"severity": "high",
"timestamp": "2026-01-03T07:49:00Z",
"trace_id": "224be43b-eeb1-b5cf-6fb9-91693a7b3754"
} | {
"account_age_days": 1042,
"account_id": "ACCT-96EBB396D05D",
"baseline_risk_score": 0.118,
"kyc_tier": "tier_1",
"session_entropy": 0.776
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 1051,
"timestamp": "2026-01-03T07:49:00Z",
"transaction_amount_usd": 2950139.46
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.48,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 3557669.15,
"financial_exposure_usd": 4136900.39,
"recoverable_pct": 0.61
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106779",
"label": "benign",
"label_confidence": 0.542,
"severity": "medium",
"timestamp": "2026-01-05T16:59:00Z",
"trace_id": "b5c18f4d-fda8-f4c6-ed73-871103709360"
} | {
"account_age_days": 1869,
"account_id": "ACCT-5F8D0D3A9F17",
"baseline_risk_score": 0.059,
"kyc_tier": "tier_1",
"session_entropy": 0.662
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 821,
"timestamp": "2026-01-05T16:59:00Z",
"transaction_amount_usd": 10531.81
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.678,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 4939.61,
"financial_exposure_usd": 5477.38,
"recoverable_pct": 0.79
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100264",
"label": "fraudulent",
"label_confidence": 0.77,
"severity": "critical",
"timestamp": "2026-01-01T04:24:00Z",
"trace_id": "d820d362-8a61-81ae-e771-8e1bd1df4ff0"
} | {
"account_age_days": 175,
"account_id": "ACCT-C3BD7384176C",
"baseline_risk_score": 0.402,
"kyc_tier": "tier_1",
"session_entropy": 0.651
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 212,
"timestamp": "2026-01-01T00:22:00Z",
"transaction_amount_usd": 16.52
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.885,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 550294.87,
"financial_exposure_usd": 628996.14,
"recoverable_pct": 0.51
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109652",
"label": "benign",
"label_confidence": 0.696,
"severity": "low",
"timestamp": "2026-01-07T16:52:00Z",
"trace_id": "d5d8f657-f27f-795b-aa99-ec223eafb629"
} | {
"account_age_days": 1902,
"account_id": "ACCT-62A99020DF97",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.67
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 1110,
"timestamp": "2026-01-07T16:52:00Z",
"transaction_amount_usd": 11562
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.48,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 580.55,
"financial_exposure_usd": 1305.55,
"recoverable_pct": 0.551
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107517",
"label": "benign",
"label_confidence": 0.569,
"severity": "low",
"timestamp": "2026-01-06T05:17:00Z",
"trace_id": "7be6df7a-b907-f7aa-7784-1c7243fdc417"
} | {
"account_age_days": 1085,
"account_id": "ACCT-E22A43E2EB5F",
"baseline_risk_score": 0.191,
"kyc_tier": "tier_3",
"session_entropy": 0.68
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 749,
"timestamp": "2026-01-06T05:17:00Z",
"transaction_amount_usd": 11830.67
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.617,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2563,
"financial_exposure_usd": 5331.28,
"recoverable_pct": 0.848
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102845",
"label": "fraudulent",
"label_confidence": 0.897,
"severity": "medium",
"timestamp": "2026-01-02T23:25:00Z",
"trace_id": "6f64f21f-d67c-01df-617f-37f6c5c613dd"
} | {
"account_age_days": 1405,
"account_id": "ACCT-F0C93D51EEC5",
"baseline_risk_score": 0.357,
"kyc_tier": "tier_1",
"session_entropy": 0.773
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 1164,
"timestamp": "2026-01-02T23:25:00Z",
"transaction_amount_usd": 38774.71
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.506,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 421862.5,
"financial_exposure_usd": 812660.75,
"recoverable_pct": 0.806
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108380",
"label": "benign",
"label_confidence": 0.598,
"severity": "low",
"timestamp": "2026-01-06T19:40:00Z",
"trace_id": "8bb858c3-6e04-c172-d0a1-3f9512707161"
} | {
"account_age_days": 926,
"account_id": "ACCT-19B1421E2483",
"baseline_risk_score": 0.067,
"kyc_tier": "tier_3",
"session_entropy": 0.68
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 908,
"timestamp": "2026-01-06T19:40:00Z",
"transaction_amount_usd": 11095.38
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.534,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 960.83,
"financial_exposure_usd": 2212.9,
"recoverable_pct": 0.558
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108272",
"label": "benign",
"label_confidence": 0.546,
"severity": "medium",
"timestamp": "2026-01-06T17:52:00Z",
"trace_id": "0654d42a-f99b-112b-98d0-57361658ea1e"
} | {
"account_age_days": 1254,
"account_id": "ACCT-FCC3048CB847",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.614
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 663,
"timestamp": "2026-01-06T17:52:00Z",
"transaction_amount_usd": 9580.56
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.782,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1576.26,
"financial_exposure_usd": 2113.05,
"recoverable_pct": 0.601
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100642",
"label": "fraudulent",
"label_confidence": 0.957,
"severity": "medium",
"timestamp": "2026-01-01T10:42:00Z",
"trace_id": "b028653f-c8ff-4dd8-47c7-8498f9159063"
} | {
"account_age_days": 1175,
"account_id": "ACCT-B48D5C1B6F83",
"baseline_risk_score": 0.407,
"kyc_tier": "tier_2",
"session_entropy": 0.451
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 787,
"timestamp": "2026-01-01T10:42:00Z",
"transaction_amount_usd": 81505.5
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.675,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 801555.78,
"financial_exposure_usd": 840015.75,
"recoverable_pct": 0.634
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107921",
"label": "benign",
"label_confidence": 0.566,
"severity": "medium",
"timestamp": "2026-01-06T12:01:00Z",
"trace_id": "3432fb80-4c26-88d6-0fa8-cfc195342d53"
} | {
"account_age_days": 985,
"account_id": "ACCT-38E59886E7D7",
"baseline_risk_score": 0.064,
"kyc_tier": "tier_2",
"session_entropy": 0.347
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 203,
"timestamp": "2026-01-06T06:31:00Z",
"transaction_amount_usd": 22.12
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.585,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 859.39,
"financial_exposure_usd": 1632.55,
"recoverable_pct": 0.802
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102421",
"label": "fraudulent",
"label_confidence": 0.866,
"severity": "high",
"timestamp": "2026-01-02T16:21:00Z",
"trace_id": "bd9ae3dc-91fa-d6cf-9593-5d2359118f6b"
} | {
"account_age_days": 53,
"account_id": "ACCT-A8E9A8D6D1B9",
"baseline_risk_score": 0.588,
"kyc_tier": "tier_2",
"session_entropy": 0.849
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 94,
"timestamp": "2026-01-02T10:00:00Z",
"transaction_amount_usd": 4.8
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.642,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 201582.79,
"financial_exposure_usd": 405809.3,
"recoverable_pct": 0.497
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101353",
"label": "fraudulent",
"label_confidence": 0.865,
"severity": "medium",
"timestamp": "2026-01-01T22:33:00Z",
"trace_id": "81b9e996-a9a6-38b0-b621-361ea893721c"
} | {
"account_age_days": 1292,
"account_id": "ACCT-0EE481E2837A",
"baseline_risk_score": 0.337,
"kyc_tier": "tier_2",
"session_entropy": 0.256
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 694,
"timestamp": "2026-01-01T22:33:00Z",
"transaction_amount_usd": 29360.52
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.544,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 420653.53,
"financial_exposure_usd": 887871.66,
"recoverable_pct": 0.376
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101155",
"label": "fraudulent",
"label_confidence": 0.971,
"severity": "medium",
"timestamp": "2026-01-01T19:15:00Z",
"trace_id": "896aa090-46f2-c8ba-892d-b0db5e1a94b4"
} | {
"account_age_days": 212,
"account_id": "ACCT-AAD2E4270355",
"baseline_risk_score": 0.348,
"kyc_tier": "tier_3",
"session_entropy": 0.884
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 917,
"timestamp": "2026-01-01T19:15:00Z",
"transaction_amount_usd": 39073.39
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.368,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 760279.68,
"financial_exposure_usd": 1026759.04,
"recoverable_pct": 0.231
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105927",
"label": "fraudulent",
"label_confidence": 0.796,
"severity": "high",
"timestamp": "2026-01-05T02:47:00Z",
"trace_id": "02b6d006-4db2-528a-97bc-2f28647e5cd6"
} | {
"account_age_days": 638,
"account_id": "ACCT-474A36F99220",
"baseline_risk_score": 0.127,
"kyc_tier": "tier_1",
"session_entropy": 0.861
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 1111,
"timestamp": "2026-01-05T02:47:00Z",
"transaction_amount_usd": 2236544.2
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.686,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3445664.26,
"financial_exposure_usd": 4547836.81,
"recoverable_pct": 0.768
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102716",
"label": "fraudulent",
"label_confidence": 0.801,
"severity": "high",
"timestamp": "2026-01-02T21:16:00Z",
"trace_id": "680d8c16-62cb-630d-7c5e-3c4581494774"
} | {
"account_age_days": 324,
"account_id": "ACCT-9DEB3BDC9626",
"baseline_risk_score": 0.389,
"kyc_tier": "tier_1",
"session_entropy": 0.497
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 141,
"timestamp": "2026-01-02T12:49:00Z",
"transaction_amount_usd": 23.36
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.848,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 669605.8,
"financial_exposure_usd": 1313574.54,
"recoverable_pct": 0.051
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100277",
"label": "fraudulent",
"label_confidence": 0.856,
"severity": "critical",
"timestamp": "2026-01-01T04:37:00Z",
"trace_id": "09f68439-6f77-cc54-8bb1-07defaa0a297"
} | {
"account_age_days": 1409,
"account_id": "ACCT-1841D873634D",
"baseline_risk_score": 0.649,
"kyc_tier": "tier_1",
"session_entropy": 0.611
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 693,
"timestamp": "2026-01-01T04:37:00Z",
"transaction_amount_usd": 70800.18
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.547,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 177274.51,
"financial_exposure_usd": 215532.43,
"recoverable_pct": 0.378
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100336",
"label": "fraudulent",
"label_confidence": 0.855,
"severity": "critical",
"timestamp": "2026-01-01T05:36:00Z",
"trace_id": "d2ec1379-8040-6ea6-3245-5848cbcf3687"
} | {
"account_age_days": 939,
"account_id": "ACCT-430D741A85C5",
"baseline_risk_score": 0.367,
"kyc_tier": "tier_1",
"session_entropy": 0.334
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "US",
"latency_ms": 680,
"timestamp": "2026-01-01T05:36:00Z",
"transaction_amount_usd": 54111.91
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.787,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 870466.99,
"financial_exposure_usd": 1200082.45,
"recoverable_pct": 0.384
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101746",
"label": "fraudulent",
"label_confidence": 0.942,
"severity": "medium",
"timestamp": "2026-01-02T05:06:00Z",
"trace_id": "e8f303ae-c35c-34d4-af67-50cfd63abffe"
} | {
"account_age_days": 847,
"account_id": "ACCT-AD8AB61C5B21",
"baseline_risk_score": 0.515,
"kyc_tier": "tier_1",
"session_entropy": 0.817
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 825,
"timestamp": "2026-01-02T05:06:00Z",
"transaction_amount_usd": 34167.2
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.655,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 275013.58,
"financial_exposure_usd": 523283.5,
"recoverable_pct": 0.118
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109754",
"label": "benign",
"label_confidence": 0.742,
"severity": "low",
"timestamp": "2026-01-07T18:34:00Z",
"trace_id": "25333572-e2a8-1a8c-6f56-ab7d177ed5e9"
} | {
"account_age_days": 349,
"account_id": "ACCT-1DAB6FFE2834",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.875
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 1109,
"timestamp": "2026-01-07T18:34:00Z",
"transaction_amount_usd": 14390.07
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.7,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tra... | {
"customer_funds_at_risk_usd": 1116.29,
"financial_exposure_usd": 2614.6,
"recoverable_pct": 0.439
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107039",
"label": "benign",
"label_confidence": 0.655,
"severity": "low",
"timestamp": "2026-01-05T21:19:00Z",
"trace_id": "f5eb12ca-94d8-c46b-cc80-72d4b08a2759"
} | {
"account_age_days": 1125,
"account_id": "ACCT-1C3F6FCE4851",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.726
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 476,
"timestamp": "2026-01-05T21:19:00Z",
"transaction_amount_usd": 5219.58
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.786,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3776.21,
"financial_exposure_usd": 5069.62,
"recoverable_pct": 0.423
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104463",
"label": "fraudulent",
"label_confidence": 0.814,
"severity": "high",
"timestamp": "2026-01-04T02:23:00Z",
"trace_id": "a486e9af-3f47-ce22-0f70-5845ad9258f7"
} | {
"account_age_days": 127,
"account_id": "ACCT-CEF56EF6D092",
"baseline_risk_score": 0.068,
"kyc_tier": "tier_2",
"session_entropy": 0.381
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 642,
"timestamp": "2026-01-04T02:23:00Z",
"transaction_amount_usd": 1807977.32
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.537,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 10089770.5,
"financial_exposure_usd": 10300706.85,
"recoverable_pct": 0.554
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108822",
"label": "benign",
"label_confidence": 0.726,
"severity": "medium",
"timestamp": "2026-01-07T03:02:00Z",
"trace_id": "3756a32c-1efb-4fda-e0a8-7c02ae3fb6db"
} | {
"account_age_days": 270,
"account_id": "ACCT-230198AEFE7D",
"baseline_risk_score": 0.198,
"kyc_tier": "tier_1",
"session_entropy": 0.371
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 878,
"timestamp": "2026-01-07T03:02:00Z",
"transaction_amount_usd": 1972.16
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.527,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 4478.44,
"financial_exposure_usd": 4537.93,
"recoverable_pct": 0.727
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105867",
"label": "fraudulent",
"label_confidence": 0.779,
"severity": "critical",
"timestamp": "2026-01-05T01:47:00Z",
"trace_id": "5169172f-9670-b2f2-eb71-1cb1507eac57"
} | {
"account_age_days": 1247,
"account_id": "ACCT-F13E107FAE62",
"baseline_risk_score": 0.156,
"kyc_tier": "tier_2",
"session_entropy": 0.56
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 399,
"timestamp": "2026-01-05T01:47:00Z",
"transaction_amount_usd": 2612198.28
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.854,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3598502.33,
"financial_exposure_usd": 5712456,
"recoverable_pct": 0.827
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102203",
"label": "fraudulent",
"label_confidence": 0.864,
"severity": "critical",
"timestamp": "2026-01-02T12:43:00Z",
"trace_id": "43ebcbd5-789b-7b5a-54a0-9a55b1258239"
} | {
"account_age_days": 1763,
"account_id": "ACCT-7A71780EA1B2",
"baseline_risk_score": 0.554,
"kyc_tier": "tier_3",
"session_entropy": 0.255
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 128,
"timestamp": "2026-01-02T12:43:00Z",
"transaction_amount_usd": 99057.51
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.761,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 800871.83,
"financial_exposure_usd": 934624.16,
"recoverable_pct": 0.328
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100585",
"label": "fraudulent",
"label_confidence": 0.832,
"severity": "low",
"timestamp": "2026-01-01T09:45:00Z",
"trace_id": "4419b399-9784-dbb8-9583-1ef9989b9822"
} | {
"account_age_days": 1877,
"account_id": "ACCT-810E541CE3C1",
"baseline_risk_score": 0.534,
"kyc_tier": "tier_3",
"session_entropy": 0.685
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 540,
"timestamp": "2026-01-01T09:45:00Z",
"transaction_amount_usd": 67676
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.548,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 831785.78,
"financial_exposure_usd": 975601.95,
"recoverable_pct": 0.407
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103063",
"label": "fraudulent",
"label_confidence": 0.79,
"severity": "low",
"timestamp": "2026-01-03T03:03:00Z",
"trace_id": "5c54faab-38e8-5a12-4bad-43937356a0fd"
} | {
"account_age_days": 400,
"account_id": "ACCT-FFC30BEABC2A",
"baseline_risk_score": 0.621,
"kyc_tier": "tier_3",
"session_entropy": 0.395
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 82,
"timestamp": "2026-01-02T16:36:00Z",
"transaction_amount_usd": 20.72
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.675,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 259061.24,
"financial_exposure_usd": 449854,
"recoverable_pct": 0.614
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103832",
"label": "fraudulent",
"label_confidence": 0.631,
"severity": "high",
"timestamp": "2026-01-03T15:52:00Z",
"trace_id": "04a9ca62-bbc5-3f39-a3c6-d14c0a5ab809"
} | {
"account_age_days": 1298,
"account_id": "ACCT-6440434CF718",
"baseline_risk_score": 0.099,
"kyc_tier": "tier_2",
"session_entropy": 0.43
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 297,
"timestamp": "2026-01-03T12:54:00Z",
"transaction_amount_usd": 22.72
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.571,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2778470.6,
"financial_exposure_usd": 6287881.49,
"recoverable_pct": 0.538
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100185",
"label": "fraudulent",
"label_confidence": 0.94,
"severity": "medium",
"timestamp": "2026-01-01T03:05:00Z",
"trace_id": "78e00f78-2cda-a0b2-3d43-c4fedfe91357"
} | {
"account_age_days": 848,
"account_id": "ACCT-B8D49CF21C9D",
"baseline_risk_score": 0.355,
"kyc_tier": "tier_3",
"session_entropy": 0.244
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "SG",
"latency_ms": 1020,
"timestamp": "2026-01-01T03:05:00Z",
"transaction_amount_usd": 35511.34
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.435,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 862523.25,
"financial_exposure_usd": 983120.86,
"recoverable_pct": 0.179
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101352",
"label": "fraudulent",
"label_confidence": 0.777,
"severity": "critical",
"timestamp": "2026-01-01T22:32:00Z",
"trace_id": "e50f887b-4ca1-5d1e-8f4d-e8d151d8acb1"
} | {
"account_age_days": 404,
"account_id": "ACCT-FAE7ECFDDCDA",
"baseline_risk_score": 0.511,
"kyc_tier": "tier_3",
"session_entropy": 0.913
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "SG",
"latency_ms": 980,
"timestamp": "2026-01-01T22:32:00Z",
"transaction_amount_usd": 2600.29
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.471,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 408474.35,
"financial_exposure_usd": 746454.33,
"recoverable_pct": 0.633
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105724",
"label": "fraudulent",
"label_confidence": 0.882,
"severity": "high",
"timestamp": "2026-01-04T23:24:00Z",
"trace_id": "406a6854-036b-7fc8-e43c-81a442c09360"
} | {
"account_age_days": 1904,
"account_id": "ACCT-C452DE959306",
"baseline_risk_score": 0.225,
"kyc_tier": "tier_3",
"session_entropy": 0.321
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 199,
"timestamp": "2026-01-04T23:24:00Z",
"transaction_amount_usd": 2145227.79
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.538,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3089107.04,
"financial_exposure_usd": 6800928.66,
"recoverable_pct": 0.865
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103415",
"label": "fraudulent",
"label_confidence": 0.904,
"severity": "high",
"timestamp": "2026-01-03T08:55:00Z",
"trace_id": "1d3bb774-a141-6cb6-7ea5-b14b57fb1799"
} | {
"account_age_days": 1454,
"account_id": "ACCT-1F4B670B22CC",
"baseline_risk_score": 0.273,
"kyc_tier": "tier_3",
"session_entropy": 0.537
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 242,
"timestamp": "2026-01-03T08:55:00Z",
"transaction_amount_usd": 2983256.35
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.738,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3116398.43,
"financial_exposure_usd": 3121446.21,
"recoverable_pct": 0.406
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109580",
"label": "benign",
"label_confidence": 0.653,
"severity": "medium",
"timestamp": "2026-01-07T15:40:00Z",
"trace_id": "590a613c-d5ec-6f55-e09d-e7fc086d3387"
} | {
"account_age_days": 940,
"account_id": "ACCT-BE3B8AD150D4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.8
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 477,
"timestamp": "2026-01-07T15:40:00Z",
"transaction_amount_usd": 6799.81
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.764,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3323.03,
"financial_exposure_usd": 4811.41,
"recoverable_pct": 0.9
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104244",
"label": "fraudulent",
"label_confidence": 0.83,
"severity": "medium",
"timestamp": "2026-01-03T22:44:00Z",
"trace_id": "d05b2036-33e5-7036-95a4-8d9d1ddad4aa"
} | {
"account_age_days": 602,
"account_id": "ACCT-80A321C1CB06",
"baseline_risk_score": 0.367,
"kyc_tier": "tier_2",
"session_entropy": 0.776
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 798,
"timestamp": "2026-01-03T22:44:00Z",
"transaction_amount_usd": 2624768.81
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.486,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 5297616.01,
"financial_exposure_usd": 8284011.6,
"recoverable_pct": 0.849
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109324",
"label": "benign",
"label_confidence": 0.506,
"severity": "medium",
"timestamp": "2026-01-07T11:24:00Z",
"trace_id": "77f32c39-aa75-f508-8eed-e2c56ab1277b"
} | {
"account_age_days": 1892,
"account_id": "ACCT-73BD717CEADA",
"baseline_risk_score": 0.136,
"kyc_tier": "tier_2",
"session_entropy": 0.548
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 100,
"timestamp": "2026-01-07T05:28:00Z",
"transaction_amount_usd": 5.73
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.751,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 686.81,
"financial_exposure_usd": 733.95,
"recoverable_pct": 0.693
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105824",
"label": "fraudulent",
"label_confidence": 0.626,
"severity": "high",
"timestamp": "2026-01-05T01:04:00Z",
"trace_id": "dc8bc088-e3bb-94a3-b4b9-09d4609d2b39"
} | {
"account_age_days": 57,
"account_id": "ACCT-9C66E7FB2B43",
"baseline_risk_score": 0.262,
"kyc_tier": "tier_3",
"session_entropy": 0.66
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 782,
"timestamp": "2026-01-05T01:04:00Z",
"transaction_amount_usd": 2046670.77
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.641,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1745164.24,
"financial_exposure_usd": 1835058.31,
"recoverable_pct": 0.507
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102901",
"label": "fraudulent",
"label_confidence": 0.859,
"severity": "high",
"timestamp": "2026-01-03T00:21:00Z",
"trace_id": "eb014b6b-e21f-b94f-4f68-254f0ecb19f4"
} | {
"account_age_days": 1364,
"account_id": "ACCT-6491920C90BA",
"baseline_risk_score": 0.395,
"kyc_tier": "tier_2",
"session_entropy": 0.702
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "MY",
"latency_ms": 411,
"timestamp": "2026-01-03T00:21:00Z",
"transaction_amount_usd": 95717.01
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.629,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 646474.76,
"financial_exposure_usd": 753315.17,
"recoverable_pct": 0.056
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107998",
"label": "benign",
"label_confidence": 0.73,
"severity": "medium",
"timestamp": "2026-01-06T13:18:00Z",
"trace_id": "97f02719-f5e1-24af-0270-79711fe584b5"
} | {
"account_age_days": 487,
"account_id": "ACCT-8BE484C338E9",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.668
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 399,
"timestamp": "2026-01-06T01:05:00Z",
"transaction_amount_usd": 6.81
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.588,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2225.04,
"financial_exposure_usd": 2802.38,
"recoverable_pct": 0.522
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104687",
"label": "fraudulent",
"label_confidence": 0.947,
"severity": "medium",
"timestamp": "2026-01-04T06:07:00Z",
"trace_id": "bc25f31b-ba75-acc5-5e5d-ae2658f42716"
} | {
"account_age_days": 1341,
"account_id": "ACCT-62E0C1F8517F",
"baseline_risk_score": 0.174,
"kyc_tier": "tier_1",
"session_entropy": 0.753
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 1171,
"timestamp": "2026-01-04T06:07:00Z",
"transaction_amount_usd": 2389204.1
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.867,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 724779.83,
"financial_exposure_usd": 1336339.69,
"recoverable_pct": 0.668
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100351",
"label": "fraudulent",
"label_confidence": 0.956,
"severity": "critical",
"timestamp": "2026-01-01T05:51:00Z",
"trace_id": "6dffd943-36fd-a98d-94ab-24e96794e589"
} | {
"account_age_days": 385,
"account_id": "ACCT-DC05FA819E08",
"baseline_risk_score": 0.624,
"kyc_tier": "tier_2",
"session_entropy": 0.605
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 1093,
"timestamp": "2026-01-01T05:51:00Z",
"transaction_amount_usd": 15205.11
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.614,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 802524.99,
"financial_exposure_usd": 1037967.49,
"recoverable_pct": 0.603
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109909",
"label": "benign",
"label_confidence": 0.608,
"severity": "medium",
"timestamp": "2026-01-07T21:09:00Z",
"trace_id": "656adb61-7784-a062-6a33-baaa1ca2043e"
} | {
"account_age_days": 428,
"account_id": "ACCT-DD34B5BFFB32",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.893
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 265,
"timestamp": "2026-01-07T15:21:00Z",
"transaction_amount_usd": 18.01
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.634,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2746.44,
"financial_exposure_usd": 5787.57,
"recoverable_pct": 0.649
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109865",
"label": "benign",
"label_confidence": 0.611,
"severity": "low",
"timestamp": "2026-01-07T20:25:00Z",
"trace_id": "2cfb8af3-fa4a-5d38-c218-4a9a08857297"
} | {
"account_age_days": 1148,
"account_id": "ACCT-F1BA8904DD57",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.348
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 175,
"timestamp": "2026-01-07T20:25:00Z",
"transaction_amount_usd": 7903.84
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.634,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3275.93,
"financial_exposure_usd": 3829.51,
"recoverable_pct": 0.823
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101832",
"label": "fraudulent",
"label_confidence": 0.817,
"severity": "critical",
"timestamp": "2026-01-02T06:32:00Z",
"trace_id": "044cc11c-ebac-ed15-6f81-92efc80c20bf"
} | {
"account_age_days": 170,
"account_id": "ACCT-4E882EBB7042",
"baseline_risk_score": 0.524,
"kyc_tier": "tier_1",
"session_entropy": 0.125
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "BR",
"latency_ms": 964,
"timestamp": "2026-01-02T06:32:00Z",
"transaction_amount_usd": 48290.6
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.453,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 913551.84,
"financial_exposure_usd": 1001788.77,
"recoverable_pct": 0.84
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103329",
"label": "fraudulent",
"label_confidence": 0.857,
"severity": "low",
"timestamp": "2026-01-03T07:29:00Z",
"trace_id": "6f926a40-cb93-919d-fc32-24acfadfdfd3"
} | {
"account_age_days": 1573,
"account_id": "ACCT-FC8FDB35FCDE",
"baseline_risk_score": 0.354,
"kyc_tier": "tier_3",
"session_entropy": 0.364
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 597,
"timestamp": "2026-01-03T07:29:00Z",
"transaction_amount_usd": 109318.96
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.451,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 656117.23,
"financial_exposure_usd": 663295.85,
"recoverable_pct": 0.702
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109190",
"label": "benign",
"label_confidence": 0.699,
"severity": "low",
"timestamp": "2026-01-07T09:10:00Z",
"trace_id": "2f698e2c-2538-adb3-64c4-43c462b16f67"
} | {
"account_age_days": 1976,
"account_id": "ACCT-222C2DE91D6A",
"baseline_risk_score": 0.144,
"kyc_tier": "tier_3",
"session_entropy": 0.186
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 245,
"timestamp": "2026-01-07T09:10:00Z",
"transaction_amount_usd": 14728.92
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.514,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1858.35,
"financial_exposure_usd": 2464.74,
"recoverable_pct": 0.72
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105014",
"label": "fraudulent",
"label_confidence": 0.772,
"severity": "medium",
"timestamp": "2026-01-04T11:34:00Z",
"trace_id": "bb9029a4-8cb6-9aed-cdab-41dcd7b873af"
} | {
"account_age_days": 566,
"account_id": "ACCT-B9D3F39746ED",
"baseline_risk_score": 0.343,
"kyc_tier": "tier_3",
"session_entropy": 0.675
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 301,
"timestamp": "2026-01-04T11:34:00Z",
"transaction_amount_usd": 1959131.43
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.652,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2375995.11,
"financial_exposure_usd": 4487521.85,
"recoverable_pct": 0.519
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101145",
"label": "fraudulent",
"label_confidence": 0.894,
"severity": "critical",
"timestamp": "2026-01-01T19:05:00Z",
"trace_id": "d114b4d3-8995-c753-f267-feecb0ab4e69"
} | {
"account_age_days": 436,
"account_id": "ACCT-CB4935F174E8",
"baseline_risk_score": 0.299,
"kyc_tier": "tier_3",
"session_entropy": 0.601
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 381,
"timestamp": "2026-01-01T14:13:00Z",
"transaction_amount_usd": 17.98
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.511,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 1102627.82,
"financial_exposure_usd": 1356518.98,
"recoverable_pct": 0.514
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101694",
"label": "fraudulent",
"label_confidence": 0.882,
"severity": "high",
"timestamp": "2026-01-02T04:14:00Z",
"trace_id": "d250b242-68f8-e6bc-3464-c034e5e8408e"
} | {
"account_age_days": 1111,
"account_id": "ACCT-13F7FEC64D04",
"baseline_risk_score": 0.551,
"kyc_tier": "tier_2",
"session_entropy": 0.537
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 363,
"timestamp": "2026-01-02T04:14:00Z",
"transaction_amount_usd": 30819.3
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.513,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 491620.64,
"financial_exposure_usd": 887923.28,
"recoverable_pct": 0.493
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103125",
"label": "fraudulent",
"label_confidence": 0.946,
"severity": "critical",
"timestamp": "2026-01-03T04:05:00Z",
"trace_id": "90bb054b-b89e-6652-8aed-bcb769878fd2"
} | {
"account_age_days": 755,
"account_id": "ACCT-3D7BAFC55AED",
"baseline_risk_score": 0.575,
"kyc_tier": "tier_2",
"session_entropy": 0.238
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "US",
"latency_ms": 778,
"timestamp": "2026-01-03T04:05:00Z",
"transaction_amount_usd": 36535.77
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.87,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 493856.08,
"financial_exposure_usd": 501642.51,
"recoverable_pct": 0.028
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105099",
"label": "fraudulent",
"label_confidence": 0.757,
"severity": "high",
"timestamp": "2026-01-04T12:59:00Z",
"trace_id": "ccdbf70b-90b7-74ee-5fee-bb874580bb2c"
} | {
"account_age_days": 365,
"account_id": "ACCT-F49F41D19CA7",
"baseline_risk_score": 0.298,
"kyc_tier": "tier_1",
"session_entropy": 0.307
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 698,
"timestamp": "2026-01-04T12:59:00Z",
"transaction_amount_usd": 2434833.37
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.78,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 1647930,
"financial_exposure_usd": 1928343.13,
"recoverable_pct": 0.947
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106424",
"label": "fraudulent",
"label_confidence": 0.947,
"severity": "medium",
"timestamp": "2026-01-05T11:04:00Z",
"trace_id": "56981ddd-3f8e-08f4-ca41-db3a52ad1abf"
} | {
"account_age_days": 1199,
"account_id": "ACCT-C6EFA7B18DC5",
"baseline_risk_score": 0.238,
"kyc_tier": "tier_2",
"session_entropy": 0.693
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 329,
"timestamp": "2026-01-05T11:04:00Z",
"transaction_amount_usd": 1089710.96
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.474,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3200276.57,
"financial_exposure_usd": 4770960.53,
"recoverable_pct": 0.769
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103740",
"label": "fraudulent",
"label_confidence": 0.873,
"severity": "high",
"timestamp": "2026-01-03T14:20:00Z",
"trace_id": "6da15cf5-36fd-5401-f836-04fa4b79b1ef"
} | {
"account_age_days": 1779,
"account_id": "ACCT-445CE98D6C64",
"baseline_risk_score": 0.136,
"kyc_tier": "tier_2",
"session_entropy": 0.179
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 309,
"timestamp": "2026-01-03T14:20:00Z",
"transaction_amount_usd": 2398005.04
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.373,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 5164772.69,
"financial_exposure_usd": 10584238.55,
"recoverable_pct": 0.881
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101263",
"label": "fraudulent",
"label_confidence": 0.947,
"severity": "low",
"timestamp": "2026-01-01T21:03:00Z",
"trace_id": "9d0b89e4-0b35-36df-968c-5e884ebc2a01"
} | {
"account_age_days": 693,
"account_id": "ACCT-5EA10A60B95C",
"baseline_risk_score": 0.548,
"kyc_tier": "tier_2",
"session_entropy": 0.398
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "DE",
"latency_ms": 308,
"timestamp": "2026-01-01T21:03:00Z",
"transaction_amount_usd": 58373
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.498,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 481225.69,
"financial_exposure_usd": 658677,
"recoverable_pct": 0.127
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101801",
"label": "fraudulent",
"label_confidence": 0.958,
"severity": "critical",
"timestamp": "2026-01-02T06:01:00Z",
"trace_id": "0e97cda3-dd48-35b7-1508-cd35704ab922"
} | {
"account_age_days": 860,
"account_id": "ACCT-42BC1C826D2C",
"baseline_risk_score": 0.319,
"kyc_tier": "tier_1",
"session_entropy": 0.179
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 150,
"timestamp": "2026-01-02T00:40:00Z",
"transaction_amount_usd": 8.37
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.62,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 304417.8,
"financial_exposure_usd": 459222.2,
"recoverable_pct": 0.752
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104247",
"label": "fraudulent",
"label_confidence": 0.874,
"severity": "low",
"timestamp": "2026-01-03T22:47:00Z",
"trace_id": "fb94a687-695f-5220-e3b4-5a38c13e7653"
} | {
"account_age_days": 619,
"account_id": "ACCT-5DDCEA94286C",
"baseline_risk_score": 0.344,
"kyc_tier": "tier_2",
"session_entropy": 0.752
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 949,
"timestamp": "2026-01-03T22:47:00Z",
"transaction_amount_usd": 1975676.81
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.377,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3332878.91,
"financial_exposure_usd": 5809057.83,
"recoverable_pct": 0.696
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107414",
"label": "benign",
"label_confidence": 0.496,
"severity": "low",
"timestamp": "2026-01-06T03:34:00Z",
"trace_id": "4fcc3de1-a79b-b102-53f7-306fd1c1a037"
} | {
"account_age_days": 219,
"account_id": "ACCT-BDB3F0613B99",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.465
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 93,
"timestamp": "2026-01-05T22:58:00Z",
"transaction_amount_usd": 11.38
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.711,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 686.91,
"financial_exposure_usd": 930.89,
"recoverable_pct": 0.6
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103804",
"label": "fraudulent",
"label_confidence": 0.68,
"severity": "medium",
"timestamp": "2026-01-03T15:24:00Z",
"trace_id": "068e0941-0e13-c3f0-e423-43b9c41849ea"
} | {
"account_age_days": 93,
"account_id": "ACCT-A700101F537D",
"baseline_risk_score": 0.232,
"kyc_tier": "tier_2",
"session_entropy": 0.597
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 543,
"timestamp": "2026-01-03T15:24:00Z",
"transaction_amount_usd": 1899701.42
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.695,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 6015585.01,
"financial_exposure_usd": 6581204.24,
"recoverable_pct": 0.833
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109321",
"label": "benign",
"label_confidence": 0.742,
"severity": "high",
"timestamp": "2026-01-07T11:21:00Z",
"trace_id": "55481e3f-06d2-c1a8-b146-6766e2fdcf7e"
} | {
"account_age_days": 1914,
"account_id": "ACCT-D52E06BAABEB",
"baseline_risk_score": 0.151,
"kyc_tier": "tier_1",
"session_entropy": 0.741
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 138,
"timestamp": "2026-01-07T02:40:00Z",
"transaction_amount_usd": 9.47
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.513,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 875.48,
"financial_exposure_usd": 1449.58,
"recoverable_pct": 0.698
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104989",
"label": "fraudulent",
"label_confidence": 0.814,
"severity": "critical",
"timestamp": "2026-01-04T11:09:00Z",
"trace_id": "47242b97-3324-8be6-e570-417377b1aa9b"
} | {
"account_age_days": 1372,
"account_id": "ACCT-941CF4528995",
"baseline_risk_score": 0.231,
"kyc_tier": "tier_1",
"session_entropy": 0.393
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 645,
"timestamp": "2026-01-04T11:09:00Z",
"transaction_amount_usd": 503597.05
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.838,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4027930.25,
"financial_exposure_usd": 6091590.04,
"recoverable_pct": 0.925
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107624",
"label": "benign",
"label_confidence": 0.729,
"severity": "high",
"timestamp": "2026-01-06T07:04:00Z",
"trace_id": "ca686c60-426f-434b-e0cc-53e3e59446f7"
} | {
"account_age_days": 60,
"account_id": "ACCT-88E1F7213D3A",
"baseline_risk_score": 0.137,
"kyc_tier": "tier_3",
"session_entropy": 0.554
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 789,
"timestamp": "2026-01-06T07:04:00Z",
"transaction_amount_usd": 4227.54
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.541,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2074.31,
"financial_exposure_usd": 3242.88,
"recoverable_pct": 0.921
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101490",
"label": "fraudulent",
"label_confidence": 0.807,
"severity": "high",
"timestamp": "2026-01-02T00:50:00Z",
"trace_id": "6f7a6224-e822-d898-de9f-86618ce1109c"
} | {
"account_age_days": 1194,
"account_id": "ACCT-C68C3B381B37",
"baseline_risk_score": 0.472,
"kyc_tier": "tier_3",
"session_entropy": 0.772
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 365,
"timestamp": "2026-01-01T20:30:00Z",
"transaction_amount_usd": 15.63
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.456,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 614725.79,
"financial_exposure_usd": 617754.25,
"recoverable_pct": 0.008
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104742",
"label": "fraudulent",
"label_confidence": 0.899,
"severity": "medium",
"timestamp": "2026-01-04T07:02:00Z",
"trace_id": "668a7bcc-f1ab-5047-46d6-ca8f25e3020b"
} | {
"account_age_days": 300,
"account_id": "ACCT-70002595A5D2",
"baseline_risk_score": 0.236,
"kyc_tier": "tier_3",
"session_entropy": 0.625
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 991,
"timestamp": "2026-01-04T07:02:00Z",
"transaction_amount_usd": 1384614.44
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.485,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4326500.02,
"financial_exposure_usd": 4466972.42,
"recoverable_pct": 0.496
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106849",
"label": "benign",
"label_confidence": 0.463,
"severity": "low",
"timestamp": "2026-01-05T18:09:00Z",
"trace_id": "c1827104-d787-9e6d-a30a-38f562c18daa"
} | {
"account_age_days": 1152,
"account_id": "ACCT-2D4EF299785C",
"baseline_risk_score": 0.133,
"kyc_tier": "tier_1",
"session_entropy": 0.315
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 411,
"timestamp": "2026-01-05T18:09:00Z",
"transaction_amount_usd": 14095.08
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.504,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 4082.79,
"financial_exposure_usd": 5518.18,
"recoverable_pct": 0.404
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102045",
"label": "fraudulent",
"label_confidence": 0.902,
"severity": "critical",
"timestamp": "2026-01-02T10:05:00Z",
"trace_id": "f21909f3-255d-fb72-1081-bd5020fcb76c"
} | {
"account_age_days": 1750,
"account_id": "ACCT-7B0AC73EADC9",
"baseline_risk_score": 0.634,
"kyc_tier": "tier_3",
"session_entropy": 0.626
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 377,
"timestamp": "2026-01-02T03:09:00Z",
"transaction_amount_usd": 17.58
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.824,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 419632.21,
"financial_exposure_usd": 452253.06,
"recoverable_pct": 0.815
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102705",
"label": "fraudulent",
"label_confidence": 0.798,
"severity": "medium",
"timestamp": "2026-01-02T21:05:00Z",
"trace_id": "93333e26-a063-d121-ac58-5cc6465dc1c8"
} | {
"account_age_days": 204,
"account_id": "ACCT-D03AA9C10A55",
"baseline_risk_score": 0.646,
"kyc_tier": "tier_2",
"session_entropy": 0.771
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 666,
"timestamp": "2026-01-02T21:05:00Z",
"transaction_amount_usd": 25476.19
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.513,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 936371.66,
"financial_exposure_usd": 1017230.24,
"recoverable_pct": 0.79
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108761",
"label": "benign",
"label_confidence": 0.605,
"severity": "medium",
"timestamp": "2026-01-07T02:01:00Z",
"trace_id": "6bd1672f-2855-f9d3-c064-228ca70db1d7"
} | {
"account_age_days": 754,
"account_id": "ACCT-26ADF49C4985",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.415
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 755,
"timestamp": "2026-01-07T02:01:00Z",
"transaction_amount_usd": 7071.01
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.471,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3173.13,
"financial_exposure_usd": 4009.33,
"recoverable_pct": 0.822
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100207",
"label": "fraudulent",
"label_confidence": 0.979,
"severity": "medium",
"timestamp": "2026-01-01T03:27:00Z",
"trace_id": "e8c0563d-258a-9c6b-f205-da82a9f3531b"
} | {
"account_age_days": 67,
"account_id": "ACCT-148AE202A8CF",
"baseline_risk_score": 0.359,
"kyc_tier": "tier_1",
"session_entropy": 0.383
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 167,
"timestamp": "2025-12-31T18:50:00Z",
"transaction_amount_usd": 11.82
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.356,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 221053.98,
"financial_exposure_usd": 380061.88,
"recoverable_pct": 0.17
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104413",
"label": "fraudulent",
"label_confidence": 0.889,
"severity": "medium",
"timestamp": "2026-01-04T01:33:00Z",
"trace_id": "074dea33-2371-33d9-8e7e-19fb553e30a3"
} | {
"account_age_days": 857,
"account_id": "ACCT-CF3CBFB01411",
"baseline_risk_score": 0.278,
"kyc_tier": "tier_2",
"session_entropy": 0.14
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 357,
"timestamp": "2026-01-04T01:33:00Z",
"transaction_amount_usd": 1072336.54
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.634,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 196043.56,
"financial_exposure_usd": 212320.48,
"recoverable_pct": 0.753
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107148",
"label": "benign",
"label_confidence": 0.504,
"severity": "medium",
"timestamp": "2026-01-05T23:08:00Z",
"trace_id": "1d96e5e3-a2f0-9971-c75c-76a8e65a5304"
} | {
"account_age_days": 659,
"account_id": "ACCT-61F3653AA449",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.254
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 496,
"timestamp": "2026-01-05T23:08:00Z",
"transaction_amount_usd": 6640.31
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.787,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2162.35,
"financial_exposure_usd": 5155.46,
"recoverable_pct": 0.433
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106588",
"label": "fraudulent",
"label_confidence": 0.628,
"severity": "high",
"timestamp": "2026-01-05T13:48:00Z",
"trace_id": "e7ed9025-3fbb-9640-3e84-3fab5fe3dff4"
} | {
"account_age_days": 1053,
"account_id": "ACCT-AA064A293923",
"baseline_risk_score": 0.389,
"kyc_tier": "tier_1",
"session_entropy": 0.366
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 983,
"timestamp": "2026-01-05T13:48:00Z",
"transaction_amount_usd": 2993727.3
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.442,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1433512.92,
"financial_exposure_usd": 3193843.51,
"recoverable_pct": 0.753
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107496",
"label": "benign",
"label_confidence": 0.539,
"severity": "medium",
"timestamp": "2026-01-06T04:56:00Z",
"trace_id": "385d0229-a088-7530-1e8e-269e3daf3a8f"
} | {
"account_age_days": 1263,
"account_id": "ACCT-0C6EAEBFCE3A",
"baseline_risk_score": 0.127,
"kyc_tier": "tier_3",
"session_entropy": 0.393
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 387,
"timestamp": "2026-01-05T17:19:00Z",
"transaction_amount_usd": 2.96
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.463,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1052.55,
"financial_exposure_usd": 1618.92,
"recoverable_pct": 0.98
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107252",
"label": "benign",
"label_confidence": 0.539,
"severity": "medium",
"timestamp": "2026-01-06T00:52:00Z",
"trace_id": "90d4f069-2964-7599-0b06-7a061ef6a4eb"
} | {
"account_age_days": 1021,
"account_id": "ACCT-572184EB3E9D",
"baseline_risk_score": 0.088,
"kyc_tier": "tier_1",
"session_entropy": 0.112
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 459,
"timestamp": "2026-01-06T00:52:00Z",
"transaction_amount_usd": 1528.64
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.719,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1005.67,
"financial_exposure_usd": 1921.06,
"recoverable_pct": 0.634
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102454",
"label": "fraudulent",
"label_confidence": 0.805,
"severity": "medium",
"timestamp": "2026-01-02T16:54:00Z",
"trace_id": "9bc1cada-9323-beda-4cd3-6149c17bef92"
} | {
"account_age_days": 986,
"account_id": "ACCT-6D56032C914A",
"baseline_risk_score": 0.479,
"kyc_tier": "tier_2",
"session_entropy": 0.482
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 340,
"timestamp": "2026-01-02T11:42:00Z",
"transaction_amount_usd": 4.13
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.877,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 491649.01,
"financial_exposure_usd": 823180.04,
"recoverable_pct": 0.258
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106997",
"label": "benign",
"label_confidence": 0.469,
"severity": "low",
"timestamp": "2026-01-05T20:37:00Z",
"trace_id": "e395893b-2ba9-5283-a656-9069414261f4"
} | {
"account_age_days": 397,
"account_id": "ACCT-CBC929BCF334",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.531
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 912,
"timestamp": "2026-01-05T20:37:00Z",
"transaction_amount_usd": 10315.8
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.769,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1336.13,
"financial_exposure_usd": 1631.72,
"recoverable_pct": 0.488
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103845",
"label": "fraudulent",
"label_confidence": 0.905,
"severity": "high",
"timestamp": "2026-01-03T16:05:00Z",
"trace_id": "938076f0-4bd7-02f4-e1ac-44b44c875b5f"
} | {
"account_age_days": 1009,
"account_id": "ACCT-161949CDDA5E",
"baseline_risk_score": 0.215,
"kyc_tier": "tier_1",
"session_entropy": 0.154
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 176,
"timestamp": "2026-01-03T09:52:00Z",
"transaction_amount_usd": 22.49
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.893,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1071052.96,
"financial_exposure_usd": 2075154.28,
"recoverable_pct": 0.787
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103546",
"label": "fraudulent",
"label_confidence": 0.811,
"severity": "low",
"timestamp": "2026-01-03T11:06:00Z",
"trace_id": "23fa774f-336d-03d9-a38e-57e4e4da281b"
} | {
"account_age_days": 1212,
"account_id": "ACCT-BEE6E9F9B5E8",
"baseline_risk_score": 0.292,
"kyc_tier": "tier_3",
"session_entropy": 0.697
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 861,
"timestamp": "2026-01-03T11:06:00Z",
"transaction_amount_usd": 2547695.93
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.483,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4253897.08,
"financial_exposure_usd": 5499418.97,
"recoverable_pct": 0.587
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100709",
"label": "fraudulent",
"label_confidence": 0.883,
"severity": "medium",
"timestamp": "2026-01-01T11:49:00Z",
"trace_id": "4a908e05-b493-e7ce-dc9e-c2b394b609c1"
} | {
"account_age_days": 1171,
"account_id": "ACCT-8FB770B3571C",
"baseline_risk_score": 0.555,
"kyc_tier": "tier_2",
"session_entropy": 0.51
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 717,
"timestamp": "2026-01-01T11:49:00Z",
"transaction_amount_usd": 82648.97
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.655,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 455580.19,
"financial_exposure_usd": 750274.29,
"recoverable_pct": 0.773
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105082",
"label": "fraudulent",
"label_confidence": 0.617,
"severity": "critical",
"timestamp": "2026-01-04T12:42:00Z",
"trace_id": "a310147b-c305-5d60-b232-bddca7ed5420"
} | {
"account_age_days": 1287,
"account_id": "ACCT-8EA9D1453F3D",
"baseline_risk_score": 0.231,
"kyc_tier": "tier_2",
"session_entropy": 0.482
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 747,
"timestamp": "2026-01-04T12:42:00Z",
"transaction_amount_usd": 1286333.16
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.724,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4619114.4,
"financial_exposure_usd": 5344668,
"recoverable_pct": 0.707
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107462",
"label": "benign",
"label_confidence": 0.566,
"severity": "critical",
"timestamp": "2026-01-06T04:22:00Z",
"trace_id": "4c14ad29-4791-1071-0184-fd7cfd670a13"
} | {
"account_age_days": 1554,
"account_id": "ACCT-E346B70BB74C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.723
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 731,
"timestamp": "2026-01-06T04:22:00Z",
"transaction_amount_usd": 13841.93
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.783,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 84.8,
"financial_exposure_usd": 192.84,
"recoverable_pct": 0.806
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108942",
"label": "benign",
"label_confidence": 0.595,
"severity": "high",
"timestamp": "2026-01-07T05:02:00Z",
"trace_id": "2db8585f-0e6a-0c45-d973-ab0420234dd9"
} | {
"account_age_days": 1834,
"account_id": "ACCT-0A20AD491C20",
"baseline_risk_score": 0.193,
"kyc_tier": "tier_3",
"session_entropy": 0.349
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 276,
"timestamp": "2026-01-06T19:55:00Z",
"transaction_amount_usd": 13.87
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.652,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 4535.89,
"financial_exposure_usd": 6166.91,
"recoverable_pct": 0.907
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108870",
"label": "benign",
"label_confidence": 0.5,
"severity": "medium",
"timestamp": "2026-01-07T03:50:00Z",
"trace_id": "152e4258-f1c0-3ac6-8488-9e1cc7d560be"
} | {
"account_age_days": 30,
"account_id": "ACCT-85FA7C5FB40B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.272
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 664,
"timestamp": "2026-01-07T03:50:00Z",
"transaction_amount_usd": 7571.75
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.593,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 3",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 556.13,
"financial_exposure_usd": 859.45,
"recoverable_pct": 0.987
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106162",
"label": "fraudulent",
"label_confidence": 0.619,
"severity": "high",
"timestamp": "2026-01-05T06:42:00Z",
"trace_id": "dcb371b2-0a02-f9e5-13e9-ed3b4c2bf1f9"
} | {
"account_age_days": 956,
"account_id": "ACCT-9DB2613E217B",
"baseline_risk_score": 0.386,
"kyc_tier": "tier_2",
"session_entropy": 0.847
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 167,
"timestamp": "2026-01-05T00:57:00Z",
"transaction_amount_usd": 4.56
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.562,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 574428,
"financial_exposure_usd": 861456.07,
"recoverable_pct": 0.531
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101892",
"label": "fraudulent",
"label_confidence": 0.837,
"severity": "medium",
"timestamp": "2026-01-02T07:32:00Z",
"trace_id": "d1a7279a-2e50-d815-4cd2-b34ad3254b22"
} | {
"account_age_days": 1600,
"account_id": "ACCT-B6BD0B48D987",
"baseline_risk_score": 0.29,
"kyc_tier": "tier_1",
"session_entropy": 0.678
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 373,
"timestamp": "2026-01-02T07:32:00Z",
"transaction_amount_usd": 34856.63
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.454,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 922410.11,
"financial_exposure_usd": 1099172.92,
"recoverable_pct": 0.28
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100172",
"label": "fraudulent",
"label_confidence": 0.935,
"severity": "low",
"timestamp": "2026-01-01T02:52:00Z",
"trace_id": "498a9d9d-c391-59b8-c145-217fe595e3fa"
} | {
"account_age_days": 1573,
"account_id": "ACCT-55525E11B469",
"baseline_risk_score": 0.539,
"kyc_tier": "tier_3",
"session_entropy": 0.875
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "DE",
"latency_ms": 733,
"timestamp": "2026-01-01T02:52:00Z",
"transaction_amount_usd": 39384.95
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.743,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 741368.39,
"financial_exposure_usd": 1201066.02,
"recoverable_pct": 0.169
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106925",
"label": "benign",
"label_confidence": 0.744,
"severity": "high",
"timestamp": "2026-01-05T19:25:00Z",
"trace_id": "303baaae-d210-f5fe-4c95-962727094757"
} | {
"account_age_days": 1512,
"account_id": "ACCT-40B092F0FCDC",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.184
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 166,
"timestamp": "2026-01-05T16:12:00Z",
"transaction_amount_usd": 19.41
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.616,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3399.91,
"financial_exposure_usd": 3532.57,
"recoverable_pct": 0.962
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109593",
"label": "benign",
"label_confidence": 0.574,
"severity": "medium",
"timestamp": "2026-01-07T15:53:00Z",
"trace_id": "b73c5a34-5f5e-0e86-d4ae-27c4dffd68ba"
} | {
"account_age_days": 911,
"account_id": "ACCT-42E27B100778",
"baseline_risk_score": 0.091,
"kyc_tier": "tier_3",
"session_entropy": 0.817
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 1120,
"timestamp": "2026-01-07T15:53:00Z",
"transaction_amount_usd": 4243.82
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.664,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 4852.36,
"financial_exposure_usd": 5472.85,
"recoverable_pct": 0.716
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103430",
"label": "fraudulent",
"label_confidence": 0.811,
"severity": "low",
"timestamp": "2026-01-03T09:10:00Z",
"trace_id": "1efb47ad-afe2-0b52-0a02-6fcf0f959f60"
} | {
"account_age_days": 1078,
"account_id": "ACCT-EFB4367BBA07",
"baseline_risk_score": 0.294,
"kyc_tier": "tier_2",
"session_entropy": 0.932
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 828,
"timestamp": "2026-01-03T09:10:00Z",
"transaction_amount_usd": 1823394.77
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.799,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2958508.84,
"financial_exposure_usd": 5675742.88,
"recoverable_pct": 0.601
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109079",
"label": "benign",
"label_confidence": 0.723,
"severity": "low",
"timestamp": "2026-01-07T07:19:00Z",
"trace_id": "c5ca67ca-4373-f846-7c5c-f874e2127925"
} | {
"account_age_days": 762,
"account_id": "ACCT-C863B6913F30",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.359
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 258,
"timestamp": "2026-01-07T07:19:00Z",
"transaction_amount_usd": 1651.39
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.487,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 859.37,
"financial_exposure_usd": 1389.71,
"recoverable_pct": 0.626
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.