schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108630",
"label": "benign",
"label_confidence": 0.741,
"severity": "low",
"timestamp": "2026-01-06T23:50:00Z",
"trace_id": "faba5491-6651-2f17-5867-24a94b57c2ea"
} | {
"account_age_days": 1146,
"account_id": "ACCT-D92DDA802B12",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.373
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 369,
"timestamp": "2026-01-06T23:50:00Z",
"transaction_amount_usd": 11548.23
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.497,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2894.77,
"financial_exposure_usd": 3278.85,
"recoverable_pct": 0.751
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102245",
"label": "fraudulent",
"label_confidence": 0.777,
"severity": "low",
"timestamp": "2026-01-02T13:25:00Z",
"trace_id": "a01c96cc-5db5-7e17-1d29-bdb9c7d014c0"
} | {
"account_age_days": 171,
"account_id": "ACCT-1730088B3C8B",
"baseline_risk_score": 0.583,
"kyc_tier": "tier_2",
"session_entropy": 0.448
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 144,
"timestamp": "2026-01-02T08:52:00Z",
"transaction_amount_usd": 2.29
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.364,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 518793.38,
"financial_exposure_usd": 1245584.88,
"recoverable_pct": 0.16
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107699",
"label": "benign",
"label_confidence": 0.663,
"severity": "medium",
"timestamp": "2026-01-06T08:19:00Z",
"trace_id": "c71a16ef-d825-cfcd-d7b7-82b0d300fe59"
} | {
"account_age_days": 1991,
"account_id": "ACCT-B18B087FABD7",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.74
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 983,
"timestamp": "2026-01-06T08:19:00Z",
"transaction_amount_usd": 7125.6
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.644,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2635.05,
"financial_exposure_usd": 4308.14,
"recoverable_pct": 0.615
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102440",
"label": "fraudulent",
"label_confidence": 0.785,
"severity": "critical",
"timestamp": "2026-01-02T16:40:00Z",
"trace_id": "635fb094-1254-fe6f-700b-e7276f64f30d"
} | {
"account_age_days": 947,
"account_id": "ACCT-3EF6CEF8A2F1",
"baseline_risk_score": 0.474,
"kyc_tier": "tier_2",
"session_entropy": 0.255
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 527,
"timestamp": "2026-01-02T16:40:00Z",
"transaction_amount_usd": 116847.1
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.537,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 383771.6,
"financial_exposure_usd": 507900.53,
"recoverable_pct": 0.366
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100941",
"label": "fraudulent",
"label_confidence": 0.776,
"severity": "high",
"timestamp": "2026-01-01T15:41:00Z",
"trace_id": "7a002a99-96ca-79b2-a808-500352558378"
} | {
"account_age_days": 360,
"account_id": "ACCT-4F862DE080C0",
"baseline_risk_score": 0.368,
"kyc_tier": "tier_1",
"session_entropy": 0.526
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 841,
"timestamp": "2026-01-01T15:41:00Z",
"transaction_amount_usd": 119685.16
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.934,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 1022565.18,
"financial_exposure_usd": 1025138.72,
"recoverable_pct": 0.413
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101237",
"label": "fraudulent",
"label_confidence": 0.779,
"severity": "high",
"timestamp": "2026-01-01T20:37:00Z",
"trace_id": "1ac9a408-816c-f2cb-cf10-fd704720fe78"
} | {
"account_age_days": 1754,
"account_id": "ACCT-5362F686AC81",
"baseline_risk_score": 0.419,
"kyc_tier": "tier_2",
"session_entropy": 0.824
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "FR",
"latency_ms": 1188,
"timestamp": "2026-01-01T20:37:00Z",
"transaction_amount_usd": 27481.97
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.44,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 380270.9,
"financial_exposure_usd": 404186.94,
"recoverable_pct": 0.133
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106123",
"label": "fraudulent",
"label_confidence": 0.877,
"severity": "high",
"timestamp": "2026-01-05T06:03:00Z",
"trace_id": "2c34e297-02b1-4474-d53b-b6843357604f"
} | {
"account_age_days": 1616,
"account_id": "ACCT-D7ECF33048F3",
"baseline_risk_score": 0.364,
"kyc_tier": "tier_3",
"session_entropy": 0.293
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 873,
"timestamp": "2026-01-05T06:03:00Z",
"transaction_amount_usd": 633136.05
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.526,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2534629.55,
"financial_exposure_usd": 3401084.21,
"recoverable_pct": 0.794
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104436",
"label": "fraudulent",
"label_confidence": 0.645,
"severity": "low",
"timestamp": "2026-01-04T01:56:00Z",
"trace_id": "9af17b58-3fb2-641c-a80c-80e6e9273c13"
} | {
"account_age_days": 524,
"account_id": "ACCT-CE951BC0F13E",
"baseline_risk_score": 0.234,
"kyc_tier": "tier_3",
"session_entropy": 0.515
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 746,
"timestamp": "2026-01-04T01:56:00Z",
"transaction_amount_usd": 539831.22
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.707,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1049953.55,
"financial_exposure_usd": 2265549.96,
"recoverable_pct": 0.794
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102248",
"label": "fraudulent",
"label_confidence": 0.782,
"severity": "critical",
"timestamp": "2026-01-02T13:28:00Z",
"trace_id": "8d372a48-b932-ab42-ea55-587c6635c22e"
} | {
"account_age_days": 402,
"account_id": "ACCT-F89D5BBC4730",
"baseline_risk_score": 0.532,
"kyc_tier": "tier_1",
"session_entropy": 0.942
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 212,
"timestamp": "2026-01-02T13:28:00Z",
"transaction_amount_usd": 81108.98
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.597,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 806820.84,
"financial_exposure_usd": 1404217.74,
"recoverable_pct": 0.501
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104139",
"label": "fraudulent",
"label_confidence": 0.907,
"severity": "high",
"timestamp": "2026-01-03T20:59:00Z",
"trace_id": "38e25fa0-eaa4-d289-b89b-953214919671"
} | {
"account_age_days": 96,
"account_id": "ACCT-1576C846DB1C",
"baseline_risk_score": 0.104,
"kyc_tier": "tier_3",
"session_entropy": 0.845
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 330,
"timestamp": "2026-01-03T17:50:00Z",
"transaction_amount_usd": 10.75
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.909,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 9",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3432249.93,
"financial_exposure_usd": 6407911.6,
"recoverable_pct": 0.594
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101104",
"label": "fraudulent",
"label_confidence": 0.95,
"severity": "high",
"timestamp": "2026-01-01T18:24:00Z",
"trace_id": "beb9ec49-4d6b-d4df-9ab0-4c342f3726d7"
} | {
"account_age_days": 1579,
"account_id": "ACCT-06C17D842EC0",
"baseline_risk_score": 0.483,
"kyc_tier": "tier_2",
"session_entropy": 0.244
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 175,
"timestamp": "2026-01-01T17:21:00Z",
"transaction_amount_usd": 22.39
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.442,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 627805.2,
"financial_exposure_usd": 695186.4,
"recoverable_pct": 0.146
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109439",
"label": "benign",
"label_confidence": 0.74,
"severity": "high",
"timestamp": "2026-01-07T13:19:00Z",
"trace_id": "66bb9109-8d93-5af9-c78e-aea10b20c7be"
} | {
"account_age_days": 1250,
"account_id": "ACCT-E0E2B08F84EA",
"baseline_risk_score": 0.088,
"kyc_tier": "tier_1",
"session_entropy": 0.771
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 358,
"timestamp": "2026-01-07T13:19:00Z",
"transaction_amount_usd": 8637.33
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.587,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 0, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 0,
"financial_exposure_usd": 0,
"recoverable_pct": 0.436
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100145",
"label": "fraudulent",
"label_confidence": 0.753,
"severity": "high",
"timestamp": "2026-01-01T02:25:00Z",
"trace_id": "bf8f81ea-cfb0-d68d-b189-25a6c6cec51b"
} | {
"account_age_days": 1240,
"account_id": "ACCT-E19383A90F5C",
"baseline_risk_score": 0.508,
"kyc_tier": "tier_1",
"session_entropy": 0.646
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 1050,
"timestamp": "2026-01-01T02:25:00Z",
"transaction_amount_usd": 28605.57
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.446,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 1015181.3,
"financial_exposure_usd": 1128470.66,
"recoverable_pct": 0.578
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100970",
"label": "fraudulent",
"label_confidence": 0.784,
"severity": "critical",
"timestamp": "2026-01-01T16:10:00Z",
"trace_id": "96e1de8d-8170-b553-cc97-d77dee525fc1"
} | {
"account_age_days": 225,
"account_id": "ACCT-C631BBC68725",
"baseline_risk_score": 0.545,
"kyc_tier": "tier_1",
"session_entropy": 0.466
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 1025,
"timestamp": "2026-01-01T16:10:00Z",
"transaction_amount_usd": 115733.71
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.791,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 241466.85,
"financial_exposure_usd": 594052.08,
"recoverable_pct": 0.363
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107332",
"label": "benign",
"label_confidence": 0.747,
"severity": "low",
"timestamp": "2026-01-06T02:12:00Z",
"trace_id": "980e59be-55e4-3bdc-ce33-a2003d0faa52"
} | {
"account_age_days": 1696,
"account_id": "ACCT-D4CA7C09D17F",
"baseline_risk_score": 0.058,
"kyc_tier": "tier_2",
"session_entropy": 0.314
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 205,
"timestamp": "2026-01-06T02:12:00Z",
"transaction_amount_usd": 195.13
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.458,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1680.93,
"financial_exposure_usd": 1786.33,
"recoverable_pct": 0.424
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103182",
"label": "fraudulent",
"label_confidence": 0.97,
"severity": "critical",
"timestamp": "2026-01-03T05:02:00Z",
"trace_id": "89ddb3bd-0960-8f44-975b-9187664fb32a"
} | {
"account_age_days": 860,
"account_id": "ACCT-9FB3F4149026",
"baseline_risk_score": 0.577,
"kyc_tier": "tier_2",
"session_entropy": 0.507
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 234,
"timestamp": "2026-01-02T19:38:00Z",
"transaction_amount_usd": 4.99
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.396,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 445435.74,
"financial_exposure_usd": 626055.34,
"recoverable_pct": 0.671
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101137",
"label": "fraudulent",
"label_confidence": 0.955,
"severity": "critical",
"timestamp": "2026-01-01T18:57:00Z",
"trace_id": "e4e12460-c417-ed91-9da8-f224394e4a92"
} | {
"account_age_days": 16,
"account_id": "ACCT-01A459B9DFC8",
"baseline_risk_score": 0.585,
"kyc_tier": "tier_1",
"session_entropy": 0.312
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 754,
"timestamp": "2026-01-01T18:57:00Z",
"transaction_amount_usd": 26810.51
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.515,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 925094.98,
"financial_exposure_usd": 1096852.26,
"recoverable_pct": 0.022
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105771",
"label": "fraudulent",
"label_confidence": 0.792,
"severity": "high",
"timestamp": "2026-01-05T00:11:00Z",
"trace_id": "0d5b8973-082f-07a2-f379-cc46fd25886b"
} | {
"account_age_days": 266,
"account_id": "ACCT-85A5D3F38D63",
"baseline_risk_score": 0.3,
"kyc_tier": "tier_1",
"session_entropy": 0.411
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 109,
"timestamp": "2026-01-04T19:16:00Z",
"transaction_amount_usd": 9.57
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.545,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 283833.7,
"financial_exposure_usd": 440212.79,
"recoverable_pct": 0.473
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108658",
"label": "benign",
"label_confidence": 0.463,
"severity": "medium",
"timestamp": "2026-01-07T00:18:00Z",
"trace_id": "ec7b0f5b-4c7f-fafc-ca33-9a91d64fcf0a"
} | {
"account_age_days": 1698,
"account_id": "ACCT-D011A49D225D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.684
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 578,
"timestamp": "2026-01-07T00:18:00Z",
"transaction_amount_usd": 13750.95
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.698,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3244.69,
"financial_exposure_usd": 5034.3,
"recoverable_pct": 0.783
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101222",
"label": "fraudulent",
"label_confidence": 0.793,
"severity": "medium",
"timestamp": "2026-01-01T20:22:00Z",
"trace_id": "5eaee3d0-c754-d0df-b848-80f202b043c9"
} | {
"account_age_days": 1240,
"account_id": "ACCT-B9A69FA4F65F",
"baseline_risk_score": 0.575,
"kyc_tier": "tier_1",
"session_entropy": 0.868
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 425,
"timestamp": "2026-01-01T20:22:00Z",
"transaction_amount_usd": 79571.81
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.393,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 316894.45,
"financial_exposure_usd": 458949.16,
"recoverable_pct": 0.235
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104251",
"label": "fraudulent",
"label_confidence": 0.843,
"severity": "critical",
"timestamp": "2026-01-03T22:51:00Z",
"trace_id": "3b845f74-9f94-fe29-fd08-78bbe486d776"
} | {
"account_age_days": 1533,
"account_id": "ACCT-C38A5D8B5091",
"baseline_risk_score": 0.32,
"kyc_tier": "tier_3",
"session_entropy": 0.376
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 1072,
"timestamp": "2026-01-03T22:51:00Z",
"transaction_amount_usd": 176298.29
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.665,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5633173.71,
"financial_exposure_usd": 9159443.84,
"recoverable_pct": 0.638
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108327",
"label": "benign",
"label_confidence": 0.457,
"severity": "low",
"timestamp": "2026-01-06T18:47:00Z",
"trace_id": "5e31c44b-6802-d31c-35d0-98ce76986cde"
} | {
"account_age_days": 89,
"account_id": "ACCT-B128E00BCFF4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.296
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 1036,
"timestamp": "2026-01-06T18:47:00Z",
"transaction_amount_usd": 2921.14
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.742,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1011.45,
"financial_exposure_usd": 1338.27,
"recoverable_pct": 0.863
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107261",
"label": "benign",
"label_confidence": 0.509,
"severity": "high",
"timestamp": "2026-01-06T01:01:00Z",
"trace_id": "104c410e-55e4-756b-0723-0f0f498db87a"
} | {
"account_age_days": 898,
"account_id": "ACCT-DDA082057CA8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.85
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 1083,
"timestamp": "2026-01-06T01:01:00Z",
"transaction_amount_usd": 13064.62
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.796,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 760.4,
"financial_exposure_usd": 923.09,
"recoverable_pct": 0.582
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103556",
"label": "fraudulent",
"label_confidence": 0.639,
"severity": "medium",
"timestamp": "2026-01-03T11:16:00Z",
"trace_id": "f1917f20-38ba-a6b9-c567-4d452d4aa64a"
} | {
"account_age_days": 1921,
"account_id": "ACCT-CF759FC85E91",
"baseline_risk_score": 0.189,
"kyc_tier": "tier_3",
"session_entropy": 0.623
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 349,
"timestamp": "2026-01-03T09:51:00Z",
"transaction_amount_usd": 20.97
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.447,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3602706.15,
"financial_exposure_usd": 4403568.46,
"recoverable_pct": 0.479
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102359",
"label": "fraudulent",
"label_confidence": 0.829,
"severity": "medium",
"timestamp": "2026-01-02T15:19:00Z",
"trace_id": "bc0d9f4c-4f60-378b-c225-178a49f8ed0e"
} | {
"account_age_days": 795,
"account_id": "ACCT-597E17B43185",
"baseline_risk_score": 0.561,
"kyc_tier": "tier_1",
"session_entropy": 0.879
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 508,
"timestamp": "2026-01-02T15:19:00Z",
"transaction_amount_usd": 103554.87
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.5,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING ... | {
"customer_funds_at_risk_usd": 338537.25,
"financial_exposure_usd": 340359.44,
"recoverable_pct": 0.049
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102907",
"label": "fraudulent",
"label_confidence": 0.915,
"severity": "high",
"timestamp": "2026-01-03T00:27:00Z",
"trace_id": "9ec57edb-ac03-1a78-d62f-fc763dce8376"
} | {
"account_age_days": 1337,
"account_id": "ACCT-A2B1119A9482",
"baseline_risk_score": 0.442,
"kyc_tier": "tier_3",
"session_entropy": 0.351
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 163,
"timestamp": "2026-01-02T17:59:00Z",
"transaction_amount_usd": 16.1
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.816,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 1032317.32,
"financial_exposure_usd": 1165623.98,
"recoverable_pct": 0.074
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104762",
"label": "fraudulent",
"label_confidence": 0.942,
"severity": "high",
"timestamp": "2026-01-04T07:22:00Z",
"trace_id": "e189d858-3f1c-efa8-3355-b01685cba8b5"
} | {
"account_age_days": 623,
"account_id": "ACCT-571870011783",
"baseline_risk_score": 0.174,
"kyc_tier": "tier_2",
"session_entropy": 0.871
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 290,
"timestamp": "2026-01-04T07:22:00Z",
"transaction_amount_usd": 213539.12
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.537,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3300549.17,
"financial_exposure_usd": 4679431.04,
"recoverable_pct": 0.554
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102902",
"label": "fraudulent",
"label_confidence": 0.812,
"severity": "medium",
"timestamp": "2026-01-03T00:22:00Z",
"trace_id": "9d00c569-e6c2-db3d-2d55-5517be2ba283"
} | {
"account_age_days": 1332,
"account_id": "ACCT-A756CBACD2B3",
"baseline_risk_score": 0.412,
"kyc_tier": "tier_1",
"session_entropy": 0.268
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "US",
"latency_ms": 138,
"timestamp": "2026-01-03T00:22:00Z",
"transaction_amount_usd": 76412.22
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.677,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 475133.63,
"financial_exposure_usd": 1095226.23,
"recoverable_pct": 0.712
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101513",
"label": "fraudulent",
"label_confidence": 0.915,
"severity": "high",
"timestamp": "2026-01-02T01:13:00Z",
"trace_id": "53e82345-a60d-d74a-1124-bd27dce06904"
} | {
"account_age_days": 359,
"account_id": "ACCT-3336911D5B5C",
"baseline_risk_score": 0.311,
"kyc_tier": "tier_1",
"session_entropy": 0.315
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 530,
"timestamp": "2026-01-02T01:13:00Z",
"transaction_amount_usd": 13712.43
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.933,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 220417.29,
"financial_exposure_usd": 387150.93,
"recoverable_pct": 0.524
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102581",
"label": "fraudulent",
"label_confidence": 0.877,
"severity": "critical",
"timestamp": "2026-01-02T19:01:00Z",
"trace_id": "b4463eca-70ca-ecea-bf7e-8785b3caf8ef"
} | {
"account_age_days": 1120,
"account_id": "ACCT-1B98CC6FCAB3",
"baseline_risk_score": 0.291,
"kyc_tier": "tier_3",
"session_entropy": 0.444
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 117,
"timestamp": "2026-01-02T19:01:00Z",
"transaction_amount_usd": 20439.54
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.478,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 3",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 770980.31,
"financial_exposure_usd": 952764.73,
"recoverable_pct": 0.704
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108468",
"label": "benign",
"label_confidence": 0.498,
"severity": "low",
"timestamp": "2026-01-06T21:08:00Z",
"trace_id": "2a100e7c-3518-1aea-e5c3-84dfc843eb9e"
} | {
"account_age_days": 656,
"account_id": "ACCT-62C098D7A621",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.916
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 191,
"timestamp": "2026-01-06T19:43:00Z",
"transaction_amount_usd": 0.69
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.454,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 7087.53,
"financial_exposure_usd": 8117.17,
"recoverable_pct": 0.653
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100148",
"label": "fraudulent",
"label_confidence": 0.927,
"severity": "critical",
"timestamp": "2026-01-01T02:28:00Z",
"trace_id": "7927a136-fc73-e358-4208-9fc875f321cb"
} | {
"account_age_days": 1240,
"account_id": "ACCT-108134DC5427",
"baseline_risk_score": 0.619,
"kyc_tier": "tier_2",
"session_entropy": 0.37
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "DE",
"latency_ms": 1079,
"timestamp": "2026-01-01T02:28:00Z",
"transaction_amount_usd": 53324.42
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.771,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 419703.91,
"financial_exposure_usd": 895662.87,
"recoverable_pct": 0.386
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107660",
"label": "benign",
"label_confidence": 0.466,
"severity": "low",
"timestamp": "2026-01-06T07:40:00Z",
"trace_id": "75a2e63b-3cd9-1494-ad5a-c88b941f7d9a"
} | {
"account_age_days": 698,
"account_id": "ACCT-E8F0463A5501",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.917
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 345,
"timestamp": "2026-01-06T04:12:00Z",
"transaction_amount_usd": 13.71
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.653,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1198.59,
"financial_exposure_usd": 1894.34,
"recoverable_pct": 0.473
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107598",
"label": "benign",
"label_confidence": 0.705,
"severity": "high",
"timestamp": "2026-01-06T06:38:00Z",
"trace_id": "da828f39-b21c-8366-f021-86e775bf417d"
} | {
"account_age_days": 408,
"account_id": "ACCT-2212A4035A54",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.378
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 493,
"timestamp": "2026-01-06T06:38:00Z",
"transaction_amount_usd": 5065.44
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.682,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2401.84,
"financial_exposure_usd": 3257.12,
"recoverable_pct": 0.936
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104195",
"label": "fraudulent",
"label_confidence": 0.682,
"severity": "medium",
"timestamp": "2026-01-03T21:55:00Z",
"trace_id": "b7171e79-9e0e-23d9-d04e-ad7bb054908b"
} | {
"account_age_days": 370,
"account_id": "ACCT-9D27AB8E4A2B",
"baseline_risk_score": 0.299,
"kyc_tier": "tier_3",
"session_entropy": 0.65
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 549,
"timestamp": "2026-01-03T21:55:00Z",
"transaction_amount_usd": 1052743.35
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.68,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 4038611.9,
"financial_exposure_usd": 5288472.74,
"recoverable_pct": 0.886
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101380",
"label": "fraudulent",
"label_confidence": 0.919,
"severity": "critical",
"timestamp": "2026-01-01T23:00:00Z",
"trace_id": "bec4294f-1079-f38a-e540-e56afa1c7b4a"
} | {
"account_age_days": 1606,
"account_id": "ACCT-9629B11D51C2",
"baseline_risk_score": 0.59,
"kyc_tier": "tier_2",
"session_entropy": 0.422
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 268,
"timestamp": "2026-01-01T18:35:00Z",
"transaction_amount_usd": 9.56
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.866,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 593575.2,
"financial_exposure_usd": 918155.24,
"recoverable_pct": 0.105
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106968",
"label": "benign",
"label_confidence": 0.735,
"severity": "high",
"timestamp": "2026-01-05T20:08:00Z",
"trace_id": "94d41c61-b540-c3d0-bf21-ddd8c01464e1"
} | {
"account_age_days": 1361,
"account_id": "ACCT-C11A04F87FA7",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.868
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 981,
"timestamp": "2026-01-05T20:08:00Z",
"transaction_amount_usd": 14455.52
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.694,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1534.96,
"financial_exposure_usd": 2121.02,
"recoverable_pct": 0.527
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100343",
"label": "fraudulent",
"label_confidence": 0.946,
"severity": "critical",
"timestamp": "2026-01-01T05:43:00Z",
"trace_id": "d234fb9d-a845-17ee-99cf-3419f2af0414"
} | {
"account_age_days": 448,
"account_id": "ACCT-EF8F8421BB28",
"baseline_risk_score": 0.515,
"kyc_tier": "tier_2",
"session_entropy": 0.579
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CH",
"latency_ms": 736,
"timestamp": "2026-01-01T05:43:00Z",
"transaction_amount_usd": 88599.82
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.36,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 175796.6,
"financial_exposure_usd": 296533.81,
"recoverable_pct": 0.766
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109832",
"label": "benign",
"label_confidence": 0.488,
"severity": "medium",
"timestamp": "2026-01-07T19:52:00Z",
"trace_id": "a2301b9a-237b-6916-f61e-c9c40b2fa7ca"
} | {
"account_age_days": 649,
"account_id": "ACCT-C12A74FF866A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.291
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 273,
"timestamp": "2026-01-07T07:36:00Z",
"transaction_amount_usd": 4.75
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.737,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2147.76,
"financial_exposure_usd": 4567.7,
"recoverable_pct": 0.773
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100278",
"label": "fraudulent",
"label_confidence": 0.777,
"severity": "medium",
"timestamp": "2026-01-01T04:38:00Z",
"trace_id": "2b0e817c-2d59-8b9d-b3e3-f68fafce0949"
} | {
"account_age_days": 442,
"account_id": "ACCT-F00C4CC52045",
"baseline_risk_score": 0.609,
"kyc_tier": "tier_2",
"session_entropy": 0.127
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 122,
"timestamp": "2025-12-31T16:53:00Z",
"transaction_amount_usd": 23
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.654,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 252315.12,
"financial_exposure_usd": 575213.97,
"recoverable_pct": 0.461
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107503",
"label": "benign",
"label_confidence": 0.606,
"severity": "medium",
"timestamp": "2026-01-06T05:03:00Z",
"trace_id": "64d60204-41fc-188a-a701-e120ffb64077"
} | {
"account_age_days": 1082,
"account_id": "ACCT-179D203B647A",
"baseline_risk_score": 0.105,
"kyc_tier": "tier_3",
"session_entropy": 0.145
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 969,
"timestamp": "2026-01-06T05:03:00Z",
"transaction_amount_usd": 661.38
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.591,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3349.58,
"financial_exposure_usd": 4235.24,
"recoverable_pct": 0.866
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108245",
"label": "benign",
"label_confidence": 0.59,
"severity": "low",
"timestamp": "2026-01-06T17:25:00Z",
"trace_id": "ea48019b-fe3e-57f6-0134-8716707aa847"
} | {
"account_age_days": 597,
"account_id": "ACCT-8F5EFAF3D257",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.626
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 309,
"timestamp": "2026-01-06T17:25:00Z",
"transaction_amount_usd": 12994.44
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.486,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 4848.77,
"financial_exposure_usd": 5377.92,
"recoverable_pct": 0.705
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108222",
"label": "benign",
"label_confidence": 0.609,
"severity": "low",
"timestamp": "2026-01-06T17:02:00Z",
"trace_id": "5404feb5-e16e-6796-91f3-f3e32b945766"
} | {
"account_age_days": 1383,
"account_id": "ACCT-711863A0586E",
"baseline_risk_score": 0.121,
"kyc_tier": "tier_2",
"session_entropy": 0.461
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 1167,
"timestamp": "2026-01-06T17:02:00Z",
"transaction_amount_usd": 11303.01
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.644,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2777.45,
"financial_exposure_usd": 4068.71,
"recoverable_pct": 0.75
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108287",
"label": "benign",
"label_confidence": 0.723,
"severity": "high",
"timestamp": "2026-01-06T18:07:00Z",
"trace_id": "e8f929b4-4803-8ca3-c5a7-20ae9b1abad6"
} | {
"account_age_days": 1950,
"account_id": "ACCT-9A7EC4191ED0",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.224
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 266,
"timestamp": "2026-01-06T18:07:00Z",
"transaction_amount_usd": 712.25
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.798,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 3",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 734,
"financial_exposure_usd": 794.69,
"recoverable_pct": 0.411
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104004",
"label": "fraudulent",
"label_confidence": 0.677,
"severity": "high",
"timestamp": "2026-01-03T18:44:00Z",
"trace_id": "b00f7f06-ba21-0247-7b68-a201bbb33e11"
} | {
"account_age_days": 890,
"account_id": "ACCT-648BA1E090E6",
"baseline_risk_score": 0.188,
"kyc_tier": "tier_1",
"session_entropy": 0.386
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 359,
"timestamp": "2026-01-03T06:17:00Z",
"transaction_amount_usd": 12.66
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.658,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2367724.36,
"financial_exposure_usd": 5398137.76,
"recoverable_pct": 0.766
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100386",
"label": "fraudulent",
"label_confidence": 0.89,
"severity": "high",
"timestamp": "2026-01-01T06:26:00Z",
"trace_id": "2abb1647-d838-6f30-b70b-da21dd728d56"
} | {
"account_age_days": 591,
"account_id": "ACCT-DACD40BA8625",
"baseline_risk_score": 0.266,
"kyc_tier": "tier_2",
"session_entropy": 0.299
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "DE",
"latency_ms": 1106,
"timestamp": "2026-01-01T06:26:00Z",
"transaction_amount_usd": 56562.55
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.36,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 515772.1,
"financial_exposure_usd": 1049589.83,
"recoverable_pct": 0.796
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108610",
"label": "benign",
"label_confidence": 0.699,
"severity": "medium",
"timestamp": "2026-01-06T23:30:00Z",
"trace_id": "a4c0daa4-109d-d4a7-53ca-667ea0649497"
} | {
"account_age_days": 1753,
"account_id": "ACCT-A0B2772B5CAD",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.585
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 1100,
"timestamp": "2026-01-06T23:30:00Z",
"transaction_amount_usd": 6456.62
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.575,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2333.35,
"financial_exposure_usd": 2711.38,
"recoverable_pct": 0.46
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100127",
"label": "fraudulent",
"label_confidence": 0.962,
"severity": "critical",
"timestamp": "2026-01-01T02:07:00Z",
"trace_id": "edc72f12-33a5-1ac6-c461-994d609cfe40"
} | {
"account_age_days": 667,
"account_id": "ACCT-F5834C69407F",
"baseline_risk_score": 0.567,
"kyc_tier": "tier_3",
"session_entropy": 0.181
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 109,
"timestamp": "2026-01-01T02:07:00Z",
"transaction_amount_usd": 29005.57
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.757,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 339921.97,
"financial_exposure_usd": 567266.57,
"recoverable_pct": 0.54
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101127",
"label": "fraudulent",
"label_confidence": 0.868,
"severity": "high",
"timestamp": "2026-01-01T18:47:00Z",
"trace_id": "7145d996-9f7e-5e4b-075f-70e5e35de789"
} | {
"account_age_days": 71,
"account_id": "ACCT-F213B4641B29",
"baseline_risk_score": 0.267,
"kyc_tier": "tier_2",
"session_entropy": 0.186
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 711,
"timestamp": "2026-01-01T18:47:00Z",
"transaction_amount_usd": 103536.79
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.524,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 487686.62,
"financial_exposure_usd": 671293.08,
"recoverable_pct": 0.559
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101114",
"label": "fraudulent",
"label_confidence": 0.851,
"severity": "critical",
"timestamp": "2026-01-01T18:34:00Z",
"trace_id": "f649f930-e755-4d26-f7ee-8e8692ef5914"
} | {
"account_age_days": 955,
"account_id": "ACCT-BA4781DAF14C",
"baseline_risk_score": 0.581,
"kyc_tier": "tier_3",
"session_entropy": 0.755
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 530,
"timestamp": "2026-01-01T18:34:00Z",
"transaction_amount_usd": 33893.51
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.633,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 543232.03,
"financial_exposure_usd": 595539.62,
"recoverable_pct": 0.436
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109260",
"label": "benign",
"label_confidence": 0.699,
"severity": "high",
"timestamp": "2026-01-07T10:20:00Z",
"trace_id": "03033813-63eb-c2ee-923c-76af1be6b321"
} | {
"account_age_days": 1802,
"account_id": "ACCT-2A7D5286C73E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.461
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 281,
"timestamp": "2026-01-07T10:20:00Z",
"transaction_amount_usd": 12334.69
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.613,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1753.94,
"financial_exposure_usd": 1784.93,
"recoverable_pct": 0.664
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109731",
"label": "benign",
"label_confidence": 0.57,
"severity": "medium",
"timestamp": "2026-01-07T18:11:00Z",
"trace_id": "e9059682-7b2e-95a7-e020-2e036c32fdfc"
} | {
"account_age_days": 514,
"account_id": "ACCT-D8F3715D0543",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.157
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 363,
"timestamp": "2026-01-07T18:11:00Z",
"transaction_amount_usd": 9762.27
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.709,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 6153.72,
"financial_exposure_usd": 6938.41,
"recoverable_pct": 0.491
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107930",
"label": "benign",
"label_confidence": 0.74,
"severity": "low",
"timestamp": "2026-01-06T12:10:00Z",
"trace_id": "d96779b0-961d-bbb2-24c4-897aec5e5764"
} | {
"account_age_days": 1820,
"account_id": "ACCT-72FC92586749",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.947
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 247,
"timestamp": "2026-01-06T12:10:00Z",
"transaction_amount_usd": 14274.3
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.476,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 541.06,
"financial_exposure_usd": 706.53,
"recoverable_pct": 0.687
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105685",
"label": "fraudulent",
"label_confidence": 0.745,
"severity": "medium",
"timestamp": "2026-01-04T22:45:00Z",
"trace_id": "3475dce5-1258-1370-a211-58199e4a8f63"
} | {
"account_age_days": 1852,
"account_id": "ACCT-1A3BE12E5E47",
"baseline_risk_score": 0.401,
"kyc_tier": "tier_2",
"session_entropy": 0.44
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 519,
"timestamp": "2026-01-04T22:45:00Z",
"transaction_amount_usd": 93951.41
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.695,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3477847.64,
"financial_exposure_usd": 7166418.04,
"recoverable_pct": 0.811
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104694",
"label": "fraudulent",
"label_confidence": 0.924,
"severity": "medium",
"timestamp": "2026-01-04T06:14:00Z",
"trace_id": "a91240b1-895d-2f96-e0dc-aa0a41cd222a"
} | {
"account_age_days": 10,
"account_id": "ACCT-1052730EA595",
"baseline_risk_score": 0.126,
"kyc_tier": "tier_2",
"session_entropy": 0.239
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 827,
"timestamp": "2026-01-04T06:14:00Z",
"transaction_amount_usd": 2254409.85
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.853,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3111475.41,
"financial_exposure_usd": 7121497.48,
"recoverable_pct": 0.432
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106732",
"label": "benign",
"label_confidence": 0.718,
"severity": "low",
"timestamp": "2026-01-05T16:12:00Z",
"trace_id": "dc5eceec-8fef-431b-93e9-d4f422980bac"
} | {
"account_age_days": 1354,
"account_id": "ACCT-F4602C7BD28B",
"baseline_risk_score": 0.175,
"kyc_tier": "tier_1",
"session_entropy": 0.941
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 264,
"timestamp": "2026-01-05T07:02:00Z",
"transaction_amount_usd": 20.78
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.577,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1332.45,
"financial_exposure_usd": 3198.13,
"recoverable_pct": 0.884
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101298",
"label": "fraudulent",
"label_confidence": 0.808,
"severity": "low",
"timestamp": "2026-01-01T21:38:00Z",
"trace_id": "0754a6e8-5dc8-dffa-7cbe-0afcf661414d"
} | {
"account_age_days": 392,
"account_id": "ACCT-DF31E13CD32F",
"baseline_risk_score": 0.355,
"kyc_tier": "tier_3",
"session_entropy": 0.802
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 1088,
"timestamp": "2026-01-01T21:38:00Z",
"transaction_amount_usd": 9046.11
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.872,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 589580.62,
"financial_exposure_usd": 785672.8,
"recoverable_pct": 0.683
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109744",
"label": "benign",
"label_confidence": 0.498,
"severity": "low",
"timestamp": "2026-01-07T18:24:00Z",
"trace_id": "8aee6351-c5cb-ba5d-6e85-b7aa87751ec0"
} | {
"account_age_days": 164,
"account_id": "ACCT-A510D1D2F75E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.658
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 1041,
"timestamp": "2026-01-07T18:24:00Z",
"transaction_amount_usd": 1937.17
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.747,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3832.37,
"financial_exposure_usd": 7121.68,
"recoverable_pct": 0.411
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102026",
"label": "fraudulent",
"label_confidence": 0.752,
"severity": "critical",
"timestamp": "2026-01-02T09:46:00Z",
"trace_id": "013ab86e-ea93-7cf4-c16d-da84b03aba20"
} | {
"account_age_days": 1672,
"account_id": "ACCT-9F47D06C4726",
"baseline_risk_score": 0.581,
"kyc_tier": "tier_1",
"session_entropy": 0.193
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 914,
"timestamp": "2026-01-02T09:46:00Z",
"transaction_amount_usd": 112305.83
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.719,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 1013736.07,
"financial_exposure_usd": 1427810.52,
"recoverable_pct": 0.235
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103358",
"label": "fraudulent",
"label_confidence": 0.936,
"severity": "high",
"timestamp": "2026-01-03T07:58:00Z",
"trace_id": "6c2d90d6-ea21-b0a8-b67b-f862e9192e96"
} | {
"account_age_days": 1299,
"account_id": "ACCT-4B66F4ABAE58",
"baseline_risk_score": 0.273,
"kyc_tier": "tier_1",
"session_entropy": 0.608
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 512,
"timestamp": "2026-01-03T07:58:00Z",
"transaction_amount_usd": 410146.87
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.603,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 883649.99,
"financial_exposure_usd": 1767606.47,
"recoverable_pct": 0.435
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108555",
"label": "benign",
"label_confidence": 0.491,
"severity": "low",
"timestamp": "2026-01-06T22:35:00Z",
"trace_id": "0e727e23-a264-e30a-0139-2383a4bd8644"
} | {
"account_age_days": 1857,
"account_id": "ACCT-4CBAC1032D5D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.666
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 258,
"timestamp": "2026-01-06T11:57:00Z",
"transaction_amount_usd": 19.77
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.736,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2067.96,
"financial_exposure_usd": 2170.28,
"recoverable_pct": 0.586
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105525",
"label": "fraudulent",
"label_confidence": 0.93,
"severity": "medium",
"timestamp": "2026-01-04T20:05:00Z",
"trace_id": "bb8d0355-5f78-faf3-de21-89521557946f"
} | {
"account_age_days": 1188,
"account_id": "ACCT-746914F3F792",
"baseline_risk_score": 0.144,
"kyc_tier": "tier_3",
"session_entropy": 0.181
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 493,
"timestamp": "2026-01-04T20:05:00Z",
"transaction_amount_usd": 2300740.72
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.727,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2057947.71,
"financial_exposure_usd": 2775246.71,
"recoverable_pct": 0.765
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102529",
"label": "fraudulent",
"label_confidence": 0.84,
"severity": "low",
"timestamp": "2026-01-02T18:09:00Z",
"trace_id": "e6cd8f32-6732-3600-7376-01c984ba73d1"
} | {
"account_age_days": 941,
"account_id": "ACCT-A59AA0BA050E",
"baseline_risk_score": 0.358,
"kyc_tier": "tier_2",
"session_entropy": 0.383
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 299,
"timestamp": "2026-01-02T13:23:00Z",
"transaction_amount_usd": 0.94
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.651,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 320493.86,
"financial_exposure_usd": 647493.42,
"recoverable_pct": 0.486
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100700",
"label": "fraudulent",
"label_confidence": 0.812,
"severity": "critical",
"timestamp": "2026-01-01T11:40:00Z",
"trace_id": "05c2d34d-a979-0968-a342-93218eb4e2b4"
} | {
"account_age_days": 1972,
"account_id": "ACCT-F05212B99F1A",
"baseline_risk_score": 0.373,
"kyc_tier": "tier_2",
"session_entropy": 0.406
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 510,
"timestamp": "2026-01-01T11:40:00Z",
"transaction_amount_usd": 2969.24
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.889,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 590267.14,
"financial_exposure_usd": 820277.01,
"recoverable_pct": 0.412
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108389",
"label": "benign",
"label_confidence": 0.654,
"severity": "high",
"timestamp": "2026-01-06T19:49:00Z",
"trace_id": "8d6f73a3-3445-a92f-bfbf-06f67aa66c09"
} | {
"account_age_days": 957,
"account_id": "ACCT-560CBA0E8E7F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.789
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 1119,
"timestamp": "2026-01-06T19:49:00Z",
"transaction_amount_usd": 4667.78
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.497,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 854.85,
"financial_exposure_usd": 1443.06,
"recoverable_pct": 0.602
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108804",
"label": "benign",
"label_confidence": 0.661,
"severity": "medium",
"timestamp": "2026-01-07T02:44:00Z",
"trace_id": "2e289d43-bc25-bfe3-d055-dabcfedbd6e9"
} | {
"account_age_days": 1134,
"account_id": "ACCT-F9DD9AD6ED23",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.856
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 83,
"timestamp": "2026-01-06T17:21:00Z",
"transaction_amount_usd": 9.17
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.712,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 653.76,
"financial_exposure_usd": 988.69,
"recoverable_pct": 0.785
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103322",
"label": "fraudulent",
"label_confidence": 0.783,
"severity": "high",
"timestamp": "2026-01-03T07:22:00Z",
"trace_id": "0d6dbb5e-b35b-0015-f376-8ac74324c26d"
} | {
"account_age_days": 679,
"account_id": "ACCT-B4CE90FF5107",
"baseline_risk_score": 0.649,
"kyc_tier": "tier_1",
"session_entropy": 0.775
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "FR",
"latency_ms": 476,
"timestamp": "2026-01-03T07:22:00Z",
"transaction_amount_usd": 13517.44
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.815,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 132231.82,
"financial_exposure_usd": 140493.13,
"recoverable_pct": 0.294
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109965",
"label": "benign",
"label_confidence": 0.54,
"severity": "low",
"timestamp": "2026-01-07T22:05:00Z",
"trace_id": "48322271-0b71-5d34-fbfb-db3a0a017a51"
} | {
"account_age_days": 442,
"account_id": "ACCT-C1EE577FF009",
"baseline_risk_score": 0.06,
"kyc_tier": "tier_3",
"session_entropy": 0.31
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 516,
"timestamp": "2026-01-07T22:05:00Z",
"transaction_amount_usd": 9152.88
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.764,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 920.13,
"financial_exposure_usd": 1944.37,
"recoverable_pct": 0.865
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101738",
"label": "fraudulent",
"label_confidence": 0.814,
"severity": "medium",
"timestamp": "2026-01-02T04:58:00Z",
"trace_id": "364db478-2f4e-3cda-c25d-b9e6cee1b69f"
} | {
"account_age_days": 1230,
"account_id": "ACCT-2CB78B733159",
"baseline_risk_score": 0.335,
"kyc_tier": "tier_1",
"session_entropy": 0.702
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "GB",
"latency_ms": 1165,
"timestamp": "2026-01-02T04:58:00Z",
"transaction_amount_usd": 59373.83
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.87,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 254635.3,
"financial_exposure_usd": 482691.65,
"recoverable_pct": 0.147
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106725",
"label": "benign",
"label_confidence": 0.499,
"severity": "low",
"timestamp": "2026-01-05T16:05:00Z",
"trace_id": "6e950d6c-d05b-eb1b-30f2-f0f872d9987c"
} | {
"account_age_days": 1436,
"account_id": "ACCT-02A8AF68263E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.567
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 1056,
"timestamp": "2026-01-05T16:05:00Z",
"transaction_amount_usd": 3229.12
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.579,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 4278.53,
"financial_exposure_usd": 5433.1,
"recoverable_pct": 0.441
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101992",
"label": "fraudulent",
"label_confidence": 0.875,
"severity": "low",
"timestamp": "2026-01-02T09:12:00Z",
"trace_id": "164d53e1-f38b-fa03-75bb-b4e2284a0e01"
} | {
"account_age_days": 245,
"account_id": "ACCT-C25831DBCD1B",
"baseline_risk_score": 0.315,
"kyc_tier": "tier_3",
"session_entropy": 0.923
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 254,
"timestamp": "2026-01-02T09:12:00Z",
"transaction_amount_usd": 98602.75
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.843,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 620430.77,
"financial_exposure_usd": 919099.02,
"recoverable_pct": 0.139
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104350",
"label": "fraudulent",
"label_confidence": 0.812,
"severity": "low",
"timestamp": "2026-01-04T00:30:00Z",
"trace_id": "2a7d811c-f497-6bb5-1495-7dd863a85d0a"
} | {
"account_age_days": 1971,
"account_id": "ACCT-DC02097A2E6B",
"baseline_risk_score": 0.202,
"kyc_tier": "tier_3",
"session_entropy": 0.443
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 370,
"timestamp": "2026-01-03T12:12:00Z",
"transaction_amount_usd": 19.82
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.814,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3190879.18,
"financial_exposure_usd": 5982974.25,
"recoverable_pct": 0.83
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100025",
"label": "fraudulent",
"label_confidence": 0.767,
"severity": "medium",
"timestamp": "2026-01-01T00:25:00Z",
"trace_id": "2fa0d842-bc55-300b-06a2-41af1d0af7f7"
} | {
"account_age_days": 1700,
"account_id": "ACCT-58321EE48471",
"baseline_risk_score": 0.377,
"kyc_tier": "tier_3",
"session_entropy": 0.209
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 993,
"timestamp": "2026-01-01T00:25:00Z",
"transaction_amount_usd": 109668.33
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.459,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 411617.8,
"financial_exposure_usd": 624069,
"recoverable_pct": 0.774
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104607",
"label": "fraudulent",
"label_confidence": 0.726,
"severity": "critical",
"timestamp": "2026-01-04T04:47:00Z",
"trace_id": "b21f2a01-e53e-099f-aeba-025bdf55529a"
} | {
"account_age_days": 1118,
"account_id": "ACCT-7F6E07982E34",
"baseline_risk_score": 0.071,
"kyc_tier": "tier_3",
"session_entropy": 0.219
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 240,
"timestamp": "2026-01-04T04:47:00Z",
"transaction_amount_usd": 301000.64
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.465,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 5687391.91,
"financial_exposure_usd": 6144921.29,
"recoverable_pct": 0.642
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109768",
"label": "benign",
"label_confidence": 0.663,
"severity": "medium",
"timestamp": "2026-01-07T18:48:00Z",
"trace_id": "f8882baa-270b-2688-db38-c12dfe6bd4fb"
} | {
"account_age_days": 723,
"account_id": "ACCT-BA4F675294FC",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.677
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 1012,
"timestamp": "2026-01-07T18:48:00Z",
"transaction_amount_usd": 11611.09
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.462,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1203.42,
"financial_exposure_usd": 1909.86,
"recoverable_pct": 0.87
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109650",
"label": "benign",
"label_confidence": 0.5,
"severity": "low",
"timestamp": "2026-01-07T16:50:00Z",
"trace_id": "3a5f539b-5d8d-309e-3a10-697d1dbbc476"
} | {
"account_age_days": 1014,
"account_id": "ACCT-16ABBB7EF7BF",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.21
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 983,
"timestamp": "2026-01-07T16:50:00Z",
"transaction_amount_usd": 11124.97
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.635,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 203.31,
"financial_exposure_usd": 216.01,
"recoverable_pct": 0.758
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104335",
"label": "fraudulent",
"label_confidence": 0.625,
"severity": "medium",
"timestamp": "2026-01-04T00:15:00Z",
"trace_id": "1ed75bfa-f869-b52d-9580-dced2ca4fdbe"
} | {
"account_age_days": 1549,
"account_id": "ACCT-48E2C2472825",
"baseline_risk_score": 0.287,
"kyc_tier": "tier_3",
"session_entropy": 0.38
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 274,
"timestamp": "2026-01-03T12:36:00Z",
"transaction_amount_usd": 1.8
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.797,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1920204.76,
"financial_exposure_usd": 2568109.47,
"recoverable_pct": 0.582
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100696",
"label": "fraudulent",
"label_confidence": 0.752,
"severity": "high",
"timestamp": "2026-01-01T11:36:00Z",
"trace_id": "1e731124-3fed-fd47-aa9f-17348bae04ed"
} | {
"account_age_days": 1818,
"account_id": "ACCT-798E304B756C",
"baseline_risk_score": 0.608,
"kyc_tier": "tier_2",
"session_entropy": 0.162
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 666,
"timestamp": "2026-01-01T11:36:00Z",
"transaction_amount_usd": 6052.29
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.768,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 527860.84,
"financial_exposure_usd": 836406.45,
"recoverable_pct": 0.427
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100147",
"label": "fraudulent",
"label_confidence": 0.956,
"severity": "critical",
"timestamp": "2026-01-01T02:27:00Z",
"trace_id": "54d144d5-18ed-e297-acb8-3fceb3e1511b"
} | {
"account_age_days": 608,
"account_id": "ACCT-504FDE7C746E",
"baseline_risk_score": 0.569,
"kyc_tier": "tier_1",
"session_entropy": 0.244
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 862,
"timestamp": "2026-01-01T02:27:00Z",
"transaction_amount_usd": 60677.62
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.518,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 254895.41,
"financial_exposure_usd": 416481.42,
"recoverable_pct": 0.06
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105046",
"label": "fraudulent",
"label_confidence": 0.708,
"severity": "low",
"timestamp": "2026-01-04T12:06:00Z",
"trace_id": "9fcbb103-e27b-9bab-21a0-30aa92806a5a"
} | {
"account_age_days": 1230,
"account_id": "ACCT-05492E3064B8",
"baseline_risk_score": 0.341,
"kyc_tier": "tier_2",
"session_entropy": 0.638
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 657,
"timestamp": "2026-01-04T12:06:00Z",
"transaction_amount_usd": 692153.64
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.439,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1436576.92,
"financial_exposure_usd": 2249086.46,
"recoverable_pct": 0.728
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103156",
"label": "fraudulent",
"label_confidence": 0.884,
"severity": "medium",
"timestamp": "2026-01-03T04:36:00Z",
"trace_id": "0154eaab-348b-d904-1562-d22ba76e2c0b"
} | {
"account_age_days": 1975,
"account_id": "ACCT-4B37217E45AE",
"baseline_risk_score": 0.558,
"kyc_tier": "tier_3",
"session_entropy": 0.39
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 924,
"timestamp": "2026-01-03T04:36:00Z",
"transaction_amount_usd": 25323.46
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.636,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 567455.51,
"financial_exposure_usd": 963808.84,
"recoverable_pct": 0.327
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101888",
"label": "fraudulent",
"label_confidence": 0.805,
"severity": "high",
"timestamp": "2026-01-02T07:28:00Z",
"trace_id": "7e3e71a3-0876-b510-db24-287879f68e80"
} | {
"account_age_days": 1930,
"account_id": "ACCT-318035DB7911",
"baseline_risk_score": 0.455,
"kyc_tier": "tier_1",
"session_entropy": 0.89
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 490,
"timestamp": "2026-01-02T07:28:00Z",
"transaction_amount_usd": 71745.46
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.924,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 497198.05,
"financial_exposure_usd": 722843.02,
"recoverable_pct": 0.458
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104522",
"label": "fraudulent",
"label_confidence": 0.685,
"severity": "critical",
"timestamp": "2026-01-04T03:22:00Z",
"trace_id": "b51b8992-8fbf-a987-6027-b854c489ed5b"
} | {
"account_age_days": 435,
"account_id": "ACCT-AEE39DE13940",
"baseline_risk_score": 0.314,
"kyc_tier": "tier_1",
"session_entropy": 0.167
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 147,
"timestamp": "2026-01-04T03:22:00Z",
"transaction_amount_usd": 2725641.88
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.889,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4678762.38,
"financial_exposure_usd": 6004341.42,
"recoverable_pct": 0.753
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107218",
"label": "benign",
"label_confidence": 0.676,
"severity": "low",
"timestamp": "2026-01-06T00:18:00Z",
"trace_id": "9be38817-0f80-6034-77de-1add6863426e"
} | {
"account_age_days": 781,
"account_id": "ACCT-EA691F07EB8B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.162
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 296,
"timestamp": "2026-01-05T14:03:00Z",
"transaction_amount_usd": 13.65
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.574,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 4596.68,
"financial_exposure_usd": 6061.96,
"recoverable_pct": 0.96
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102976",
"label": "fraudulent",
"label_confidence": 0.883,
"severity": "high",
"timestamp": "2026-01-03T01:36:00Z",
"trace_id": "0237474f-b531-dce7-ed6f-b796fbca00c8"
} | {
"account_age_days": 719,
"account_id": "ACCT-8952E610B851",
"baseline_risk_score": 0.459,
"kyc_tier": "tier_1",
"session_entropy": 0.895
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 98,
"timestamp": "2026-01-02T15:38:00Z",
"transaction_amount_usd": 11.19
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.718,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 364109.17,
"financial_exposure_usd": 640372.67,
"recoverable_pct": 0.2
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102778",
"label": "fraudulent",
"label_confidence": 0.869,
"severity": "critical",
"timestamp": "2026-01-02T22:18:00Z",
"trace_id": "1faa3aa3-a4b9-c85e-043c-07770e1ee35a"
} | {
"account_age_days": 715,
"account_id": "ACCT-5AF68D87487B",
"baseline_risk_score": 0.37,
"kyc_tier": "tier_3",
"session_entropy": 0.255
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 112,
"timestamp": "2026-01-02T22:18:00Z",
"transaction_amount_usd": 26586.43
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.634,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 297353.18,
"financial_exposure_usd": 603415.72,
"recoverable_pct": 0.728
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107457",
"label": "benign",
"label_confidence": 0.529,
"severity": "low",
"timestamp": "2026-01-06T04:17:00Z",
"trace_id": "073063f4-5a7f-10d4-b07f-f14e85a623c3"
} | {
"account_age_days": 1388,
"account_id": "ACCT-AA8187878B1B",
"baseline_risk_score": 0.097,
"kyc_tier": "tier_3",
"session_entropy": 0.138
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 202,
"timestamp": "2026-01-06T01:24:00Z",
"transaction_amount_usd": 8.56
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.451,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2182.09,
"financial_exposure_usd": 4343.78,
"recoverable_pct": 0.49
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101282",
"label": "fraudulent",
"label_confidence": 0.9,
"severity": "medium",
"timestamp": "2026-01-01T21:22:00Z",
"trace_id": "80eb1072-1a36-a87c-09da-2264f785ccdd"
} | {
"account_age_days": 1009,
"account_id": "ACCT-91CC2CE182F7",
"baseline_risk_score": 0.405,
"kyc_tier": "tier_2",
"session_entropy": 0.183
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 799,
"timestamp": "2026-01-01T21:22:00Z",
"transaction_amount_usd": 101788.9
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.383,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 297917.37,
"financial_exposure_usd": 682856.17,
"recoverable_pct": 0.413
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104506",
"label": "fraudulent",
"label_confidence": 0.658,
"severity": "high",
"timestamp": "2026-01-04T03:06:00Z",
"trace_id": "4e9e0b43-aeae-75b4-3829-d3e8b8c15089"
} | {
"account_age_days": 1859,
"account_id": "ACCT-4B236CD64ACE",
"baseline_risk_score": 0.129,
"kyc_tier": "tier_3",
"session_entropy": 0.346
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 339,
"timestamp": "2026-01-04T03:06:00Z",
"transaction_amount_usd": 1061890.37
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.47,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 7340411.1,
"financial_exposure_usd": 8093664.87,
"recoverable_pct": 0.644
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108199",
"label": "benign",
"label_confidence": 0.746,
"severity": "medium",
"timestamp": "2026-01-06T16:39:00Z",
"trace_id": "b777a12f-742d-d882-e2fe-3709744c54a8"
} | {
"account_age_days": 914,
"account_id": "ACCT-DCE63EF373C2",
"baseline_risk_score": 0.106,
"kyc_tier": "tier_3",
"session_entropy": 0.936
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 222,
"timestamp": "2026-01-06T14:18:00Z",
"transaction_amount_usd": 9.8
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.692,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3573.37,
"financial_exposure_usd": 4835.83,
"recoverable_pct": 0.986
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106813",
"label": "benign",
"label_confidence": 0.715,
"severity": "low",
"timestamp": "2026-01-05T17:33:00Z",
"trace_id": "3a853663-f959-3b91-3639-a9720bfa4a16"
} | {
"account_age_days": 244,
"account_id": "ACCT-8B9C91749004",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.898
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 261,
"timestamp": "2026-01-05T06:15:00Z",
"transaction_amount_usd": 24.75
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.478,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1618.09,
"financial_exposure_usd": 3334.49,
"recoverable_pct": 0.546
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108139",
"label": "benign",
"label_confidence": 0.677,
"severity": "medium",
"timestamp": "2026-01-06T15:39:00Z",
"trace_id": "74f32718-33fd-f6c3-741b-5d3698b458e2"
} | {
"account_age_days": 27,
"account_id": "ACCT-0239D71218CD",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.401
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 266,
"timestamp": "2026-01-06T15:39:00Z",
"transaction_amount_usd": 7289.31
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.577,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2599.16,
"financial_exposure_usd": 5820.87,
"recoverable_pct": 0.567
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109202",
"label": "benign",
"label_confidence": 0.456,
"severity": "low",
"timestamp": "2026-01-07T09:22:00Z",
"trace_id": "cb33386e-37d8-8749-c752-fc1b947d7ff9"
} | {
"account_age_days": 1303,
"account_id": "ACCT-F7A93859B15A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.589
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 232,
"timestamp": "2026-01-07T09:22:00Z",
"transaction_amount_usd": 4750.56
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.762,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1730.26,
"financial_exposure_usd": 1842.66,
"recoverable_pct": 0.825
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109420",
"label": "benign",
"label_confidence": 0.683,
"severity": "low",
"timestamp": "2026-01-07T13:00:00Z",
"trace_id": "673aa698-60f3-6fd5-d692-d8aef2932c59"
} | {
"account_age_days": 822,
"account_id": "ACCT-538EC2859432",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.223
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 110,
"timestamp": "2026-01-07T09:59:00Z",
"transaction_amount_usd": 14.21
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.576,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1750.2,
"financial_exposure_usd": 4370.23,
"recoverable_pct": 0.888
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102821",
"label": "fraudulent",
"label_confidence": 0.849,
"severity": "medium",
"timestamp": "2026-01-02T23:01:00Z",
"trace_id": "836a26ca-f099-fb0e-baca-712d05d9aa8b"
} | {
"account_age_days": 1142,
"account_id": "ACCT-53EBA1831F87",
"baseline_risk_score": 0.575,
"kyc_tier": "tier_3",
"session_entropy": 0.413
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 209,
"timestamp": "2026-01-02T13:43:00Z",
"transaction_amount_usd": 13.91
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.937,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 686256.74,
"financial_exposure_usd": 790671.47,
"recoverable_pct": 0.553
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102085",
"label": "fraudulent",
"label_confidence": 0.917,
"severity": "medium",
"timestamp": "2026-01-02T10:45:00Z",
"trace_id": "05ad85fb-6fb9-a9a4-a5f5-58b6fbefd518"
} | {
"account_age_days": 1599,
"account_id": "ACCT-DC8EDB94AD2B",
"baseline_risk_score": 0.379,
"kyc_tier": "tier_3",
"session_entropy": 0.932
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 327,
"timestamp": "2026-01-02T10:45:00Z",
"transaction_amount_usd": 76256.8
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.529,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 492633.17,
"financial_exposure_usd": 1190996.47,
"recoverable_pct": 0.585
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107795",
"label": "benign",
"label_confidence": 0.493,
"severity": "high",
"timestamp": "2026-01-06T09:55:00Z",
"trace_id": "124cc67c-2fdd-10f5-61c5-03b014a843a8"
} | {
"account_age_days": 1954,
"account_id": "ACCT-ACD10D57F254",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.859
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 311,
"timestamp": "2026-01-05T23:30:00Z",
"transaction_amount_usd": 21.75
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.682,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 346.92,
"financial_exposure_usd": 394.54,
"recoverable_pct": 0.868
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102187",
"label": "fraudulent",
"label_confidence": 0.892,
"severity": "medium",
"timestamp": "2026-01-02T12:27:00Z",
"trace_id": "1fe9033e-fd4c-c60e-671a-82ed5a8e24ba"
} | {
"account_age_days": 53,
"account_id": "ACCT-6404DE0AD763",
"baseline_risk_score": 0.307,
"kyc_tier": "tier_1",
"session_entropy": 0.276
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 452,
"timestamp": "2026-01-02T12:27:00Z",
"transaction_amount_usd": 39935.44
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.672,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 213919.15,
"financial_exposure_usd": 459949.29,
"recoverable_pct": 0.006
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103751",
"label": "fraudulent",
"label_confidence": 0.92,
"severity": "medium",
"timestamp": "2026-01-03T14:31:00Z",
"trace_id": "b40a2e5e-f2c4-6c8c-1b6c-2b7b98360f20"
} | {
"account_age_days": 1742,
"account_id": "ACCT-9F04D1CE8644",
"baseline_risk_score": 0.44,
"kyc_tier": "tier_2",
"session_entropy": 0.947
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 1046,
"timestamp": "2026-01-03T14:31:00Z",
"transaction_amount_usd": 2271743.37
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.428,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4500292.12,
"financial_exposure_usd": 5910486.97,
"recoverable_pct": 0.884
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102828",
"label": "fraudulent",
"label_confidence": 0.936,
"severity": "high",
"timestamp": "2026-01-02T23:08:00Z",
"trace_id": "fec82813-ca6c-c928-1597-80d0ae7135f7"
} | {
"account_age_days": 1684,
"account_id": "ACCT-188F52147859",
"baseline_risk_score": 0.587,
"kyc_tier": "tier_2",
"session_entropy": 0.294
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 343,
"timestamp": "2026-01-02T16:33:00Z",
"transaction_amount_usd": 23.92
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.815,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 369977.03,
"financial_exposure_usd": 737394.98,
"recoverable_pct": 0.161
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.