schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107178",
"label": "benign",
"label_confidence": 0.579,
"severity": "high",
"timestamp": "2026-01-05T23:38:00Z",
"trace_id": "5df3b142-9f18-3aed-fc71-cb2fdc8fb2b2"
} | {
"account_age_days": 345,
"account_id": "ACCT-8B80BFF8492B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.293
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 80,
"timestamp": "2026-01-05T23:38:00Z",
"transaction_amount_usd": 14164.29
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.643,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1225.8,
"financial_exposure_usd": 1781.98,
"recoverable_pct": 0.71
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106623",
"label": "fraudulent",
"label_confidence": 0.619,
"severity": "high",
"timestamp": "2026-01-05T14:23:00Z",
"trace_id": "f0193dd7-f825-c578-611a-b571fa073115"
} | {
"account_age_days": 334,
"account_id": "ACCT-5F9E2F3C3975",
"baseline_risk_score": 0.412,
"kyc_tier": "tier_2",
"session_entropy": 0.841
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 674,
"timestamp": "2026-01-05T14:23:00Z",
"transaction_amount_usd": 2789669.26
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.748,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4190783.52,
"financial_exposure_usd": 6300088.68,
"recoverable_pct": 0.868
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100412",
"label": "fraudulent",
"label_confidence": 0.837,
"severity": "critical",
"timestamp": "2026-01-01T06:52:00Z",
"trace_id": "786b1336-4e71-0f53-baec-2ca34fdc8ac8"
} | {
"account_age_days": 439,
"account_id": "ACCT-737924444EBA",
"baseline_risk_score": 0.463,
"kyc_tier": "tier_3",
"session_entropy": 0.837
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 80,
"timestamp": "2026-01-01T06:52:00Z",
"transaction_amount_usd": 11614.62
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.853,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 810577.92,
"financial_exposure_usd": 1205733.11,
"recoverable_pct": 0.63
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108354",
"label": "benign",
"label_confidence": 0.5,
"severity": "high",
"timestamp": "2026-01-06T19:14:00Z",
"trace_id": "5b7c2103-c0aa-f65c-d503-d1a732a65a53"
} | {
"account_age_days": 204,
"account_id": "ACCT-9C8F11A40977",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.144
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 1197,
"timestamp": "2026-01-06T19:14:00Z",
"transaction_amount_usd": 9886.19
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.467,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 0, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 0,
"financial_exposure_usd": 0,
"recoverable_pct": 0.665
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106926",
"label": "benign",
"label_confidence": 0.556,
"severity": "medium",
"timestamp": "2026-01-05T19:26:00Z",
"trace_id": "6ba7e2a0-39ce-2fb5-1f90-faebf91ec1bc"
} | {
"account_age_days": 1460,
"account_id": "ACCT-6B4789308C43",
"baseline_risk_score": 0.13,
"kyc_tier": "tier_2",
"session_entropy": 0.941
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 922,
"timestamp": "2026-01-05T19:26:00Z",
"transaction_amount_usd": 2579.59
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.511,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1863.52,
"financial_exposure_usd": 2227.63,
"recoverable_pct": 0.807
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103721",
"label": "fraudulent",
"label_confidence": 0.915,
"severity": "high",
"timestamp": "2026-01-03T14:01:00Z",
"trace_id": "34245b9d-7f5c-7053-3fb4-ceefefc7ca2e"
} | {
"account_age_days": 1223,
"account_id": "ACCT-488B7B09EEE3",
"baseline_risk_score": 0.414,
"kyc_tier": "tier_2",
"session_entropy": 0.605
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 245,
"timestamp": "2026-01-03T04:04:00Z",
"transaction_amount_usd": 17.55
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.736,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 5684236.76,
"financial_exposure_usd": 6390211.98,
"recoverable_pct": 0.582
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109327",
"label": "benign",
"label_confidence": 0.716,
"severity": "high",
"timestamp": "2026-01-07T11:27:00Z",
"trace_id": "bd1fe01c-e121-5a08-359c-0307cfd6aa19"
} | {
"account_age_days": 1069,
"account_id": "ACCT-7E137B652CB8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.512
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 143,
"timestamp": "2026-01-07T11:27:00Z",
"transaction_amount_usd": 12137.64
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.759,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1259.2,
"financial_exposure_usd": 1743.25,
"recoverable_pct": 0.543
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100453",
"label": "fraudulent",
"label_confidence": 0.913,
"severity": "high",
"timestamp": "2026-01-01T07:33:00Z",
"trace_id": "8217009b-f29e-a0ce-be3c-cfac0835f5f4"
} | {
"account_age_days": 1054,
"account_id": "ACCT-E28F7B295D09",
"baseline_risk_score": 0.287,
"kyc_tier": "tier_1",
"session_entropy": 0.169
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 1127,
"timestamp": "2026-01-01T07:33:00Z",
"transaction_amount_usd": 20352.34
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.532,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 617629.64,
"financial_exposure_usd": 747732.77,
"recoverable_pct": 0.109
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103328",
"label": "fraudulent",
"label_confidence": 0.861,
"severity": "high",
"timestamp": "2026-01-03T07:28:00Z",
"trace_id": "63c0d130-9772-343b-66a5-ba477f4d3ac2"
} | {
"account_age_days": 1488,
"account_id": "ACCT-ACEE5A1E266D",
"baseline_risk_score": 0.433,
"kyc_tier": "tier_2",
"session_entropy": 0.863
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "GB",
"latency_ms": 205,
"timestamp": "2026-01-03T07:28:00Z",
"transaction_amount_usd": 72646.38
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.464,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 0, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 0,
"financial_exposure_usd": 0,
"recoverable_pct": 0.122
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105101",
"label": "fraudulent",
"label_confidence": 0.706,
"severity": "critical",
"timestamp": "2026-01-04T13:01:00Z",
"trace_id": "ed7c94a1-24cc-84a8-05ee-05b478ad29cd"
} | {
"account_age_days": 1497,
"account_id": "ACCT-9C9EE92A896C",
"baseline_risk_score": 0.147,
"kyc_tier": "tier_2",
"session_entropy": 0.823
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 945,
"timestamp": "2026-01-04T13:01:00Z",
"transaction_amount_usd": 1285872.34
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.74,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2372859.09,
"financial_exposure_usd": 3631399.08,
"recoverable_pct": 0.779
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108623",
"label": "benign",
"label_confidence": 0.469,
"severity": "critical",
"timestamp": "2026-01-06T23:43:00Z",
"trace_id": "d8fbcab6-4815-c5c7-8c63-a03e942a61c2"
} | {
"account_age_days": 1049,
"account_id": "ACCT-B35B4A302610",
"baseline_risk_score": 0.174,
"kyc_tier": "tier_1",
"session_entropy": 0.729
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 536,
"timestamp": "2026-01-06T23:43:00Z",
"transaction_amount_usd": 7594.49
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.704,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 791.22,
"financial_exposure_usd": 940.57,
"recoverable_pct": 0.742
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101836",
"label": "fraudulent",
"label_confidence": 0.823,
"severity": "medium",
"timestamp": "2026-01-02T06:36:00Z",
"trace_id": "bfe24f6a-e32a-b400-e662-1652913e555a"
} | {
"account_age_days": 1983,
"account_id": "ACCT-A481C2ACD996",
"baseline_risk_score": 0.29,
"kyc_tier": "tier_3",
"session_entropy": 0.134
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 325,
"timestamp": "2026-01-02T06:36:00Z",
"transaction_amount_usd": 57896.87
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.626,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 334616.95,
"financial_exposure_usd": 382434.98,
"recoverable_pct": 0.438
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102261",
"label": "fraudulent",
"label_confidence": 0.922,
"severity": "medium",
"timestamp": "2026-01-02T13:41:00Z",
"trace_id": "48d12a79-09cd-2271-6288-8c24910f9b5e"
} | {
"account_age_days": 1262,
"account_id": "ACCT-B2F48A7DF858",
"baseline_risk_score": 0.54,
"kyc_tier": "tier_1",
"session_entropy": 0.56
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 1172,
"timestamp": "2026-01-02T13:41:00Z",
"transaction_amount_usd": 33826.83
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.829,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 530151.7,
"financial_exposure_usd": 649697.69,
"recoverable_pct": 0.304
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103425",
"label": "fraudulent",
"label_confidence": 0.929,
"severity": "high",
"timestamp": "2026-01-03T09:05:00Z",
"trace_id": "97e7054d-2a1a-114c-4788-9f2b7f975cd3"
} | {
"account_age_days": 355,
"account_id": "ACCT-5D446605EE6B",
"baseline_risk_score": 0.165,
"kyc_tier": "tier_1",
"session_entropy": 0.791
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 252,
"timestamp": "2026-01-03T09:05:00Z",
"transaction_amount_usd": 2797065.49
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.453,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 643429.01,
"financial_exposure_usd": 704890.5,
"recoverable_pct": 0.821
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100086",
"label": "fraudulent",
"label_confidence": 0.976,
"severity": "medium",
"timestamp": "2026-01-01T01:26:00Z",
"trace_id": "dd9d2e4d-483e-dd69-dc7a-bd161c153057"
} | {
"account_age_days": 163,
"account_id": "ACCT-478817ECC764",
"baseline_risk_score": 0.543,
"kyc_tier": "tier_3",
"session_entropy": 0.495
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 302,
"timestamp": "2026-01-01T00:25:00Z",
"transaction_amount_usd": 9.57
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.403,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 132640.92,
"financial_exposure_usd": 170402.5,
"recoverable_pct": 0.564
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109884",
"label": "benign",
"label_confidence": 0.472,
"severity": "high",
"timestamp": "2026-01-07T20:44:00Z",
"trace_id": "e6d61e08-ddec-a247-d2ea-8cde453e954a"
} | {
"account_age_days": 1998,
"account_id": "ACCT-92225191C187",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.926
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 129,
"timestamp": "2026-01-07T20:44:00Z",
"transaction_amount_usd": 9490.75
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.479,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2120.21,
"financial_exposure_usd": 2376.78,
"recoverable_pct": 0.971
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104885",
"label": "fraudulent",
"label_confidence": 0.761,
"severity": "high",
"timestamp": "2026-01-04T09:25:00Z",
"trace_id": "f8dbfa77-64a9-8d1c-15b7-86202dd18e94"
} | {
"account_age_days": 1405,
"account_id": "ACCT-A5416F81A2AF",
"baseline_risk_score": 0.052,
"kyc_tier": "tier_1",
"session_entropy": 0.845
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 219,
"timestamp": "2026-01-04T09:25:00Z",
"transaction_amount_usd": 2964890.26
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.689,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4175615.39,
"financial_exposure_usd": 5120145.02,
"recoverable_pct": 0.734
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108751",
"label": "benign",
"label_confidence": 0.533,
"severity": "low",
"timestamp": "2026-01-07T01:51:00Z",
"trace_id": "c88a2c75-1170-4a13-d192-5a6e297e3075"
} | {
"account_age_days": 458,
"account_id": "ACCT-A8F20493B9CA",
"baseline_risk_score": 0.089,
"kyc_tier": "tier_2",
"session_entropy": 0.403
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 363,
"timestamp": "2026-01-07T01:51:00Z",
"transaction_amount_usd": 11073.34
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.589,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1630.3,
"financial_exposure_usd": 2020.83,
"recoverable_pct": 0.784
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107734",
"label": "benign",
"label_confidence": 0.698,
"severity": "low",
"timestamp": "2026-01-06T08:54:00Z",
"trace_id": "f240fa35-8ba0-4d8d-eb26-018ce02862cc"
} | {
"account_age_days": 1676,
"account_id": "ACCT-42D00585B670",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.764
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 228,
"timestamp": "2026-01-06T05:56:00Z",
"transaction_amount_usd": 15.32
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.567,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 5250.67,
"financial_exposure_usd": 5697.92,
"recoverable_pct": 0.52
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102214",
"label": "fraudulent",
"label_confidence": 0.776,
"severity": "high",
"timestamp": "2026-01-02T12:54:00Z",
"trace_id": "589779ce-8336-bdb3-e286-305402e26e1f"
} | {
"account_age_days": 788,
"account_id": "ACCT-D962F447EDB3",
"baseline_risk_score": 0.46,
"kyc_tier": "tier_2",
"session_entropy": 0.793
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 706,
"timestamp": "2026-01-02T12:54:00Z",
"transaction_amount_usd": 108563.5
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.929,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 659537.53,
"financial_exposure_usd": 1538403.82,
"recoverable_pct": 0.025
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105247",
"label": "fraudulent",
"label_confidence": 0.785,
"severity": "high",
"timestamp": "2026-01-04T15:27:00Z",
"trace_id": "d045a3c9-ff4b-b3b6-8ac7-5d0398671add"
} | {
"account_age_days": 1227,
"account_id": "ACCT-4FD055FD485B",
"baseline_risk_score": 0.117,
"kyc_tier": "tier_3",
"session_entropy": 0.563
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 823,
"timestamp": "2026-01-04T15:27:00Z",
"transaction_amount_usd": 2780088.68
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.551,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3696378.07,
"financial_exposure_usd": 4902875.14,
"recoverable_pct": 0.416
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102284",
"label": "fraudulent",
"label_confidence": 0.764,
"severity": "high",
"timestamp": "2026-01-02T14:04:00Z",
"trace_id": "cdf04adb-5234-70c0-2a1d-17341e322a4a"
} | {
"account_age_days": 1744,
"account_id": "ACCT-B1425A85EAAC",
"baseline_risk_score": 0.287,
"kyc_tier": "tier_3",
"session_entropy": 0.407
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 162,
"timestamp": "2026-01-02T05:38:00Z",
"transaction_amount_usd": 10.36
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.91,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 680687.62,
"financial_exposure_usd": 1384071.6,
"recoverable_pct": 0.256
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108524",
"label": "benign",
"label_confidence": 0.663,
"severity": "high",
"timestamp": "2026-01-06T22:04:00Z",
"trace_id": "0cc10a30-b588-afc8-d2fb-8b258c3ddf1a"
} | {
"account_age_days": 1668,
"account_id": "ACCT-0CF41822CD64",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.748
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 86,
"timestamp": "2026-01-06T12:14:00Z",
"transaction_amount_usd": 10.41
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.673,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 814.1,
"financial_exposure_usd": 1679.39,
"recoverable_pct": 0.655
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101158",
"label": "fraudulent",
"label_confidence": 0.969,
"severity": "high",
"timestamp": "2026-01-01T19:18:00Z",
"trace_id": "94d6c95e-b342-77aa-7db1-7129a120fe2d"
} | {
"account_age_days": 1406,
"account_id": "ACCT-DAD0F445F5E2",
"baseline_risk_score": 0.412,
"kyc_tier": "tier_2",
"session_entropy": 0.317
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 101,
"timestamp": "2026-01-01T09:01:00Z",
"transaction_amount_usd": 17.97
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.621,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 345348.5,
"financial_exposure_usd": 594686.5,
"recoverable_pct": 0.558
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100339",
"label": "fraudulent",
"label_confidence": 0.803,
"severity": "medium",
"timestamp": "2026-01-01T05:39:00Z",
"trace_id": "d0ffa971-910f-ff44-fec5-2f69ac436e12"
} | {
"account_age_days": 1613,
"account_id": "ACCT-C6991C22BE14",
"baseline_risk_score": 0.65,
"kyc_tier": "tier_1",
"session_entropy": 0.336
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 497,
"timestamp": "2026-01-01T05:39:00Z",
"transaction_amount_usd": 59119.3
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.768,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 705695.75,
"financial_exposure_usd": 1038482.66,
"recoverable_pct": 0.458
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106711",
"label": "benign",
"label_confidence": 0.498,
"severity": "critical",
"timestamp": "2026-01-05T15:51:00Z",
"trace_id": "399eb2b6-627e-4ec4-7874-f5ddf9a6f6ed"
} | {
"account_age_days": 977,
"account_id": "ACCT-62B222450667",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.106
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 687,
"timestamp": "2026-01-05T15:51:00Z",
"transaction_amount_usd": 6203.92
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.78,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 3780.03,
"financial_exposure_usd": 7441.03,
"recoverable_pct": 0.811
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107021",
"label": "benign",
"label_confidence": 0.73,
"severity": "low",
"timestamp": "2026-01-05T21:01:00Z",
"trace_id": "8a1c87fa-e908-cd11-7fc7-b5cf5c0fc966"
} | {
"account_age_days": 2000,
"account_id": "ACCT-B8816F0B6179",
"baseline_risk_score": 0.173,
"kyc_tier": "tier_3",
"session_entropy": 0.762
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 619,
"timestamp": "2026-01-05T21:01:00Z",
"transaction_amount_usd": 13940.57
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.687,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1663.4,
"financial_exposure_usd": 3381.03,
"recoverable_pct": 0.967
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104181",
"label": "fraudulent",
"label_confidence": 0.936,
"severity": "critical",
"timestamp": "2026-01-03T21:41:00Z",
"trace_id": "1d351941-35d7-0247-4172-58399eb9c6aa"
} | {
"account_age_days": 43,
"account_id": "ACCT-3C2644D79866",
"baseline_risk_score": 0.168,
"kyc_tier": "tier_2",
"session_entropy": 0.469
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 358,
"timestamp": "2026-01-03T21:41:00Z",
"transaction_amount_usd": 2680537.02
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.825,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1893217.72,
"financial_exposure_usd": 1986972.37,
"recoverable_pct": 0.649
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106655",
"label": "fraudulent",
"label_confidence": 0.653,
"severity": "high",
"timestamp": "2026-01-05T14:55:00Z",
"trace_id": "0fa52716-c858-137c-fe16-c935649f4a80"
} | {
"account_age_days": 1861,
"account_id": "ACCT-08A2BB30765C",
"baseline_risk_score": 0.263,
"kyc_tier": "tier_3",
"session_entropy": 0.317
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 229,
"timestamp": "2026-01-05T14:55:00Z",
"transaction_amount_usd": 801652.51
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.719,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 6409526.27,
"financial_exposure_usd": 7312503.54,
"recoverable_pct": 0.985
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105995",
"label": "fraudulent",
"label_confidence": 0.791,
"severity": "high",
"timestamp": "2026-01-05T03:55:00Z",
"trace_id": "33d131ec-4ad2-0d50-b6f5-ac4dfe606edb"
} | {
"account_age_days": 1997,
"account_id": "ACCT-7186A439C0DE",
"baseline_risk_score": 0.165,
"kyc_tier": "tier_3",
"session_entropy": 0.159
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 92,
"timestamp": "2026-01-05T01:03:00Z",
"transaction_amount_usd": 0.98
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.49,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 2391618.31,
"financial_exposure_usd": 3777053,
"recoverable_pct": 0.731
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102356",
"label": "fraudulent",
"label_confidence": 0.78,
"severity": "critical",
"timestamp": "2026-01-02T15:16:00Z",
"trace_id": "71051a1e-a2c9-3b24-f259-fbc79002b623"
} | {
"account_age_days": 1859,
"account_id": "ACCT-E8DB30CE07DE",
"baseline_risk_score": 0.263,
"kyc_tier": "tier_1",
"session_entropy": 0.387
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "GB",
"latency_ms": 1115,
"timestamp": "2026-01-02T15:16:00Z",
"transaction_amount_usd": 61033.93
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.884,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 259152.57,
"financial_exposure_usd": 405912.98,
"recoverable_pct": 0.011
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109305",
"label": "benign",
"label_confidence": 0.744,
"severity": "low",
"timestamp": "2026-01-07T11:05:00Z",
"trace_id": "c9e0b3ea-4b5f-f5da-89a3-2caf415431f9"
} | {
"account_age_days": 1350,
"account_id": "ACCT-651A3425C87D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.446
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 467,
"timestamp": "2026-01-07T11:05:00Z",
"transaction_amount_usd": 11212.07
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.564,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 647.6,
"financial_exposure_usd": 1010.32,
"recoverable_pct": 0.982
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108477",
"label": "benign",
"label_confidence": 0.712,
"severity": "medium",
"timestamp": "2026-01-06T21:17:00Z",
"trace_id": "a554c7b4-714b-726e-b47c-81113954dec6"
} | {
"account_age_days": 831,
"account_id": "ACCT-6522E2F0AE85",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.325
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 491,
"timestamp": "2026-01-06T21:17:00Z",
"transaction_amount_usd": 6735.71
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.557,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 4462.79,
"financial_exposure_usd": 5815.01,
"recoverable_pct": 0.488
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105948",
"label": "fraudulent",
"label_confidence": 0.707,
"severity": "high",
"timestamp": "2026-01-05T03:08:00Z",
"trace_id": "69d77109-9e12-eb4a-f2a6-3e31d078d051"
} | {
"account_age_days": 1928,
"account_id": "ACCT-684322F96638",
"baseline_risk_score": 0.139,
"kyc_tier": "tier_2",
"session_entropy": 0.404
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 957,
"timestamp": "2026-01-05T03:08:00Z",
"transaction_amount_usd": 861655.82
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.755,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3516077.95,
"financial_exposure_usd": 4900455.64,
"recoverable_pct": 0.72
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104928",
"label": "fraudulent",
"label_confidence": 0.776,
"severity": "high",
"timestamp": "2026-01-04T10:08:00Z",
"trace_id": "1a282d87-45f2-c7ae-c594-36fc4655a219"
} | {
"account_age_days": 829,
"account_id": "ACCT-2B940F161A89",
"baseline_risk_score": 0.138,
"kyc_tier": "tier_2",
"session_entropy": 0.575
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 216,
"timestamp": "2026-01-04T04:44:00Z",
"transaction_amount_usd": 24.54
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.831,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4440261.99,
"financial_exposure_usd": 6279540.1,
"recoverable_pct": 0.924
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100059",
"label": "fraudulent",
"label_confidence": 0.923,
"severity": "high",
"timestamp": "2026-01-01T00:59:00Z",
"trace_id": "99bd6240-a853-5961-632d-03021a82833c"
} | {
"account_age_days": 1722,
"account_id": "ACCT-AEF2AB2F495F",
"baseline_risk_score": 0.33,
"kyc_tier": "tier_1",
"session_entropy": 0.313
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 588,
"timestamp": "2026-01-01T00:59:00Z",
"transaction_amount_usd": 60741.16
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.472,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 479122.8,
"financial_exposure_usd": 778796.21,
"recoverable_pct": 0.385
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109182",
"label": "benign",
"label_confidence": 0.564,
"severity": "low",
"timestamp": "2026-01-07T09:02:00Z",
"trace_id": "4caa7d62-c2a4-5ad1-e0ab-7759df69751f"
} | {
"account_age_days": 764,
"account_id": "ACCT-18B063B37003",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.724
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 822,
"timestamp": "2026-01-07T09:02:00Z",
"transaction_amount_usd": 10350.1
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.545,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1154.9,
"financial_exposure_usd": 2682.46,
"recoverable_pct": 0.688
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101755",
"label": "fraudulent",
"label_confidence": 0.951,
"severity": "medium",
"timestamp": "2026-01-02T05:15:00Z",
"trace_id": "baf95060-df4b-f3fe-6d7f-acd913a237e0"
} | {
"account_age_days": 310,
"account_id": "ACCT-2AF7851D4989",
"baseline_risk_score": 0.405,
"kyc_tier": "tier_1",
"session_entropy": 0.196
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 877,
"timestamp": "2026-01-02T05:15:00Z",
"transaction_amount_usd": 16918.56
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.666,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 281379.51,
"financial_exposure_usd": 531888.49,
"recoverable_pct": 0.453
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103310",
"label": "fraudulent",
"label_confidence": 0.856,
"severity": "medium",
"timestamp": "2026-01-03T07:10:00Z",
"trace_id": "4bdb41a5-3f32-f242-393f-803859701dd4"
} | {
"account_age_days": 540,
"account_id": "ACCT-657C811FD8AE",
"baseline_risk_score": 0.328,
"kyc_tier": "tier_2",
"session_entropy": 0.446
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 387,
"timestamp": "2026-01-03T07:10:00Z",
"transaction_amount_usd": 42133.56
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.566,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 534232.02,
"financial_exposure_usd": 551539.61,
"recoverable_pct": 0.197
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108828",
"label": "benign",
"label_confidence": 0.679,
"severity": "high",
"timestamp": "2026-01-07T03:08:00Z",
"trace_id": "b59d8c0a-abf3-c86f-8174-962ccd1d7e52"
} | {
"account_age_days": 528,
"account_id": "ACCT-213737F68D04",
"baseline_risk_score": 0.185,
"kyc_tier": "tier_2",
"session_entropy": 0.219
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 733,
"timestamp": "2026-01-07T03:08:00Z",
"transaction_amount_usd": 374.37
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.699,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3052.3,
"financial_exposure_usd": 3321.46,
"recoverable_pct": 0.41
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104305",
"label": "fraudulent",
"label_confidence": 0.898,
"severity": "medium",
"timestamp": "2026-01-03T23:45:00Z",
"trace_id": "b2fc7e5f-2a22-1014-897a-84f57d28203f"
} | {
"account_age_days": 437,
"account_id": "ACCT-5348DC4D3EE0",
"baseline_risk_score": 0.388,
"kyc_tier": "tier_1",
"session_entropy": 0.236
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 498,
"timestamp": "2026-01-03T23:45:00Z",
"transaction_amount_usd": 2193645.97
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.36,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 3031973.17,
"financial_exposure_usd": 3376001.5,
"recoverable_pct": 0.469
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107545",
"label": "benign",
"label_confidence": 0.602,
"severity": "low",
"timestamp": "2026-01-06T05:45:00Z",
"trace_id": "a3f5a8af-c1b0-5f9e-f40a-a44565ab0794"
} | {
"account_age_days": 1051,
"account_id": "ACCT-D027285D1A95",
"baseline_risk_score": 0.074,
"kyc_tier": "tier_3",
"session_entropy": 0.868
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 1080,
"timestamp": "2026-01-06T05:45:00Z",
"transaction_amount_usd": 6671.16
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.651,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 547.61,
"financial_exposure_usd": 1227.85,
"recoverable_pct": 0.643
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104563",
"label": "fraudulent",
"label_confidence": 0.792,
"severity": "low",
"timestamp": "2026-01-04T04:03:00Z",
"trace_id": "214124d8-8c31-e844-323d-a48dba6e3024"
} | {
"account_age_days": 1693,
"account_id": "ACCT-1CEBC472FBBF",
"baseline_risk_score": 0.313,
"kyc_tier": "tier_1",
"session_entropy": 0.458
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 1031,
"timestamp": "2026-01-04T04:03:00Z",
"transaction_amount_usd": 1613762.33
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.742,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1990208.28,
"financial_exposure_usd": 2630781.1,
"recoverable_pct": 0.546
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101579",
"label": "fraudulent",
"label_confidence": 0.817,
"severity": "critical",
"timestamp": "2026-01-02T02:19:00Z",
"trace_id": "a6aca81e-6d7c-165a-21ff-5b3f825d0b16"
} | {
"account_age_days": 1946,
"account_id": "ACCT-DD9802AEAED9",
"baseline_risk_score": 0.359,
"kyc_tier": "tier_2",
"session_entropy": 0.669
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 135,
"timestamp": "2026-01-01T22:12:00Z",
"transaction_amount_usd": 22.41
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.931,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 948303.99,
"financial_exposure_usd": 1386188.42,
"recoverable_pct": 0.036
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104663",
"label": "fraudulent",
"label_confidence": 0.633,
"severity": "low",
"timestamp": "2026-01-04T05:43:00Z",
"trace_id": "24ebd8cf-fdbe-9933-4666-65711a398488"
} | {
"account_age_days": 1458,
"account_id": "ACCT-048587E935F7",
"baseline_risk_score": 0.209,
"kyc_tier": "tier_1",
"session_entropy": 0.305
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 809,
"timestamp": "2026-01-04T05:43:00Z",
"transaction_amount_usd": 216933.25
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.353,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1156801.22,
"financial_exposure_usd": 2392956.93,
"recoverable_pct": 0.745
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109164",
"label": "benign",
"label_confidence": 0.593,
"severity": "medium",
"timestamp": "2026-01-07T08:44:00Z",
"trace_id": "74e64ef0-0b03-c2cf-c3f7-0f275c7103fb"
} | {
"account_age_days": 331,
"account_id": "ACCT-463D87045799",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.418
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 206,
"timestamp": "2026-01-06T20:31:00Z",
"transaction_amount_usd": 22.17
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.654,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 833.73,
"financial_exposure_usd": 903.12,
"recoverable_pct": 0.912
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109868",
"label": "benign",
"label_confidence": 0.514,
"severity": "medium",
"timestamp": "2026-01-07T20:28:00Z",
"trace_id": "c08d08dd-2b8b-32dd-6213-07e98e3f8427"
} | {
"account_age_days": 373,
"account_id": "ACCT-8CB326B23B17",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.533
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 846,
"timestamp": "2026-01-07T20:28:00Z",
"transaction_amount_usd": 1020.14
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.62,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 2126.25,
"financial_exposure_usd": 2922.69,
"recoverable_pct": 0.821
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100334",
"label": "fraudulent",
"label_confidence": 0.974,
"severity": "critical",
"timestamp": "2026-01-01T05:34:00Z",
"trace_id": "9b0108d2-0371-1d3f-c9be-5dce02ee09bf"
} | {
"account_age_days": 1079,
"account_id": "ACCT-4808884B6413",
"baseline_risk_score": 0.272,
"kyc_tier": "tier_3",
"session_entropy": 0.286
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CA",
"latency_ms": 896,
"timestamp": "2026-01-01T05:34:00Z",
"transaction_amount_usd": 20843.79
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.356,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 13300.5,
"financial_exposure_usd": 24769.94,
"recoverable_pct": 0.147
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106788",
"label": "benign",
"label_confidence": 0.564,
"severity": "medium",
"timestamp": "2026-01-05T17:08:00Z",
"trace_id": "56d7bd4a-0efc-095c-9c85-1bc80233df49"
} | {
"account_age_days": 23,
"account_id": "ACCT-489BC7D7802C",
"baseline_risk_score": 0.155,
"kyc_tier": "tier_2",
"session_entropy": 0.699
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 881,
"timestamp": "2026-01-05T17:08:00Z",
"transaction_amount_usd": 1952.26
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.793,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 596.23,
"financial_exposure_usd": 742.71,
"recoverable_pct": 0.857
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104960",
"label": "fraudulent",
"label_confidence": 0.914,
"severity": "critical",
"timestamp": "2026-01-04T10:40:00Z",
"trace_id": "58aba8a9-3dcf-43b3-27b3-b7bb4fff4816"
} | {
"account_age_days": 995,
"account_id": "ACCT-DF4AFE770464",
"baseline_risk_score": 0.44,
"kyc_tier": "tier_2",
"session_entropy": 0.866
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 1147,
"timestamp": "2026-01-04T10:40:00Z",
"transaction_amount_usd": 537848.75
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.507,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2347875.35,
"financial_exposure_usd": 5308523.42,
"recoverable_pct": 0.666
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107215",
"label": "benign",
"label_confidence": 0.637,
"severity": "medium",
"timestamp": "2026-01-06T00:15:00Z",
"trace_id": "6b3894cc-ee5b-1c91-e0f2-4b29573d1c43"
} | {
"account_age_days": 1638,
"account_id": "ACCT-F28E3DAA30FD",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.264
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 321,
"timestamp": "2026-01-05T13:15:00Z",
"transaction_amount_usd": 19.75
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.783,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 5679.69,
"financial_exposure_usd": 6296.65,
"recoverable_pct": 0.986
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100871",
"label": "fraudulent",
"label_confidence": 0.859,
"severity": "critical",
"timestamp": "2026-01-01T14:31:00Z",
"trace_id": "f875f563-ffc9-08de-dbae-dddd9d5d0f9d"
} | {
"account_age_days": 1170,
"account_id": "ACCT-4912E293E158",
"baseline_risk_score": 0.324,
"kyc_tier": "tier_2",
"session_entropy": 0.676
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 636,
"timestamp": "2026-01-01T14:31:00Z",
"transaction_amount_usd": 97671.73
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.725,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 846190.49,
"financial_exposure_usd": 1046526.2,
"recoverable_pct": 0.385
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104294",
"label": "fraudulent",
"label_confidence": 0.613,
"severity": "medium",
"timestamp": "2026-01-03T23:34:00Z",
"trace_id": "17321928-847c-3a1f-7816-e4fb18911694"
} | {
"account_age_days": 240,
"account_id": "ACCT-BFEC93F46145",
"baseline_risk_score": 0.16,
"kyc_tier": "tier_2",
"session_entropy": 0.287
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 102,
"timestamp": "2026-01-03T15:49:00Z",
"transaction_amount_usd": 0.35
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.595,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1903879.6,
"financial_exposure_usd": 3737703.95,
"recoverable_pct": 0.931
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100612",
"label": "fraudulent",
"label_confidence": 0.876,
"severity": "high",
"timestamp": "2026-01-01T10:12:00Z",
"trace_id": "c88ebb9f-df39-4722-a2d4-4592a59b7d72"
} | {
"account_age_days": 537,
"account_id": "ACCT-618AAB8219E4",
"baseline_risk_score": 0.522,
"kyc_tier": "tier_2",
"session_entropy": 0.315
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 152,
"timestamp": "2026-01-01T10:12:00Z",
"transaction_amount_usd": 85368.13
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.947,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 165371.2,
"financial_exposure_usd": 249234.9,
"recoverable_pct": 0.095
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108106",
"label": "benign",
"label_confidence": 0.484,
"severity": "medium",
"timestamp": "2026-01-06T15:06:00Z",
"trace_id": "0562ab81-55ca-a646-5c93-d89ff403a275"
} | {
"account_age_days": 563,
"account_id": "ACCT-40D372603BBC",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.255
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 413,
"timestamp": "2026-01-06T15:06:00Z",
"transaction_amount_usd": 11331.62
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.693,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 978.26,
"financial_exposure_usd": 1451,
"recoverable_pct": 0.43
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102601",
"label": "fraudulent",
"label_confidence": 0.884,
"severity": "high",
"timestamp": "2026-01-02T19:21:00Z",
"trace_id": "0223f6f9-40ea-f9e2-0726-6481d3d11000"
} | {
"account_age_days": 1699,
"account_id": "ACCT-9A5DE8EAC2FF",
"baseline_risk_score": 0.423,
"kyc_tier": "tier_1",
"session_entropy": 0.606
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 247,
"timestamp": "2026-01-02T15:43:00Z",
"transaction_amount_usd": 5.07
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.941,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 429885.37,
"financial_exposure_usd": 748649.95,
"recoverable_pct": 0.427
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109072",
"label": "benign",
"label_confidence": 0.625,
"severity": "low",
"timestamp": "2026-01-07T07:12:00Z",
"trace_id": "37cb70b5-7975-d6b0-6cfb-357e2b44d8c1"
} | {
"account_age_days": 965,
"account_id": "ACCT-624704D9F8F4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.583
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 89,
"timestamp": "2026-01-06T22:07:00Z",
"transaction_amount_usd": 3.37
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.695,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3484.82,
"financial_exposure_usd": 3955.87,
"recoverable_pct": 0.56
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102175",
"label": "fraudulent",
"label_confidence": 0.959,
"severity": "critical",
"timestamp": "2026-01-02T12:15:00Z",
"trace_id": "157f12a7-7e75-54b7-59e5-f59d135d3cf8"
} | {
"account_age_days": 50,
"account_id": "ACCT-FCB7A6E4FCD1",
"baseline_risk_score": 0.553,
"kyc_tier": "tier_2",
"session_entropy": 0.555
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 590,
"timestamp": "2026-01-02T12:15:00Z",
"transaction_amount_usd": 21610.33
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.858,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 464190.99,
"financial_exposure_usd": 501244.27,
"recoverable_pct": 0.055
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103613",
"label": "fraudulent",
"label_confidence": 0.866,
"severity": "low",
"timestamp": "2026-01-03T12:13:00Z",
"trace_id": "d8aa5733-6f5f-f715-a1fd-1c94693a9740"
} | {
"account_age_days": 1880,
"account_id": "ACCT-EAB460D9CEAD",
"baseline_risk_score": 0.431,
"kyc_tier": "tier_1",
"session_entropy": 0.288
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 1047,
"timestamp": "2026-01-03T12:13:00Z",
"transaction_amount_usd": 406386.36
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.663,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 5988387.58,
"financial_exposure_usd": 6264079.69,
"recoverable_pct": 0.474
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106289",
"label": "fraudulent",
"label_confidence": 0.828,
"severity": "high",
"timestamp": "2026-01-05T08:49:00Z",
"trace_id": "7c5878e0-abd8-b0ea-9099-e6dfc3b6b031"
} | {
"account_age_days": 1005,
"account_id": "ACCT-DF6983C5E792",
"baseline_risk_score": 0.314,
"kyc_tier": "tier_1",
"session_entropy": 0.2
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 1086,
"timestamp": "2026-01-05T08:49:00Z",
"transaction_amount_usd": 302002.67
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.613,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3016939.89,
"financial_exposure_usd": 4447109.3,
"recoverable_pct": 0.74
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103299",
"label": "fraudulent",
"label_confidence": 0.946,
"severity": "high",
"timestamp": "2026-01-03T06:59:00Z",
"trace_id": "10fb8709-0308-3cfe-ffc5-01b7e5137215"
} | {
"account_age_days": 1180,
"account_id": "ACCT-EA6DA733CFDE",
"baseline_risk_score": 0.615,
"kyc_tier": "tier_1",
"session_entropy": 0.912
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 730,
"timestamp": "2026-01-03T06:59:00Z",
"transaction_amount_usd": 88474.1
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.81,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 561874.18,
"financial_exposure_usd": 617539.54,
"recoverable_pct": 0.077
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107480",
"label": "benign",
"label_confidence": 0.701,
"severity": "low",
"timestamp": "2026-01-06T04:40:00Z",
"trace_id": "2fe9e7ac-e86d-a686-f66f-21b93d62ae62"
} | {
"account_age_days": 853,
"account_id": "ACCT-6448285C526F",
"baseline_risk_score": 0.095,
"kyc_tier": "tier_2",
"session_entropy": 0.563
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 582,
"timestamp": "2026-01-06T04:40:00Z",
"transaction_amount_usd": 7321.2
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.462,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 31.18,
"financial_exposure_usd": 77.45,
"recoverable_pct": 0.502
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104890",
"label": "fraudulent",
"label_confidence": 0.641,
"severity": "low",
"timestamp": "2026-01-04T09:30:00Z",
"trace_id": "431ded04-c73e-59b5-063a-9e6d8057795d"
} | {
"account_age_days": 1373,
"account_id": "ACCT-26DCC5D3E537",
"baseline_risk_score": 0.378,
"kyc_tier": "tier_1",
"session_entropy": 0.338
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 311,
"timestamp": "2026-01-04T00:11:00Z",
"transaction_amount_usd": 8.62
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.86,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 3971811.89,
"financial_exposure_usd": 4008775.59,
"recoverable_pct": 0.961
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103856",
"label": "fraudulent",
"label_confidence": 0.638,
"severity": "critical",
"timestamp": "2026-01-03T16:16:00Z",
"trace_id": "4b6d8db0-cfdb-d01e-f517-0a003a52df7a"
} | {
"account_age_days": 790,
"account_id": "ACCT-2C48AEBB9240",
"baseline_risk_score": 0.378,
"kyc_tier": "tier_2",
"session_entropy": 0.566
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 689,
"timestamp": "2026-01-03T16:16:00Z",
"transaction_amount_usd": 93543.8
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK_IM... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.823,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2886212.16,
"financial_exposure_usd": 6718439.08,
"recoverable_pct": 0.552
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103779",
"label": "fraudulent",
"label_confidence": 0.94,
"severity": "low",
"timestamp": "2026-01-03T14:59:00Z",
"trace_id": "92e4af47-b8f9-a510-12dd-a23f8584d7f9"
} | {
"account_age_days": 518,
"account_id": "ACCT-1756C4FB3E8D",
"baseline_risk_score": 0.423,
"kyc_tier": "tier_2",
"session_entropy": 0.15
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 141,
"timestamp": "2026-01-03T14:59:00Z",
"transaction_amount_usd": 1483649.68
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.508,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 5050530.84,
"financial_exposure_usd": 5293077.64,
"recoverable_pct": 0.47
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107587",
"label": "benign",
"label_confidence": 0.626,
"severity": "low",
"timestamp": "2026-01-06T06:27:00Z",
"trace_id": "b2ea6447-cb5d-a824-11d1-76411dd4a14a"
} | {
"account_age_days": 770,
"account_id": "ACCT-1E3D944C6712",
"baseline_risk_score": 0.198,
"kyc_tier": "tier_2",
"session_entropy": 0.311
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 704,
"timestamp": "2026-01-06T06:27:00Z",
"transaction_amount_usd": 11110.35
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.728,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1473.31,
"financial_exposure_usd": 1665.66,
"recoverable_pct": 0.975
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107418",
"label": "benign",
"label_confidence": 0.618,
"severity": "low",
"timestamp": "2026-01-06T03:38:00Z",
"trace_id": "43286a91-2a60-734c-97c2-4390d3de0526"
} | {
"account_age_days": 121,
"account_id": "ACCT-FAB4D04862B6",
"baseline_risk_score": 0.134,
"kyc_tier": "tier_2",
"session_entropy": 0.65
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 230,
"timestamp": "2026-01-05T20:52:00Z",
"transaction_amount_usd": 24.62
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.481,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1541.33,
"financial_exposure_usd": 1596.45,
"recoverable_pct": 0.974
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103909",
"label": "fraudulent",
"label_confidence": 0.948,
"severity": "high",
"timestamp": "2026-01-03T17:09:00Z",
"trace_id": "05df312b-d81c-e861-8776-d8df01b3dbae"
} | {
"account_age_days": 1226,
"account_id": "ACCT-C079449D89A1",
"baseline_risk_score": 0.259,
"kyc_tier": "tier_2",
"session_entropy": 0.865
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 1057,
"timestamp": "2026-01-03T17:09:00Z",
"transaction_amount_usd": 2265294.43
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.802,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4208771.32,
"financial_exposure_usd": 6264208.64,
"recoverable_pct": 0.868
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104030",
"label": "fraudulent",
"label_confidence": 0.707,
"severity": "medium",
"timestamp": "2026-01-03T19:10:00Z",
"trace_id": "b7eda9d6-37e1-28a0-888d-cfc63e8f4a52"
} | {
"account_age_days": 434,
"account_id": "ACCT-877BDBA6E42E",
"baseline_risk_score": 0.178,
"kyc_tier": "tier_2",
"session_entropy": 0.67
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 197,
"timestamp": "2026-01-03T18:31:00Z",
"transaction_amount_usd": 20.13
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.483,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2523098.57,
"financial_exposure_usd": 3002970.75,
"recoverable_pct": 0.59
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108291",
"label": "benign",
"label_confidence": 0.466,
"severity": "critical",
"timestamp": "2026-01-06T18:11:00Z",
"trace_id": "f8bdf058-d364-f282-f744-f8f2f7539f1b"
} | {
"account_age_days": 1711,
"account_id": "ACCT-04136AACF4DE",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.945
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 125,
"timestamp": "2026-01-06T18:11:00Z",
"transaction_amount_usd": 14698.81
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.627,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 4802.54,
"financial_exposure_usd": 7874.09,
"recoverable_pct": 0.983
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107200",
"label": "benign",
"label_confidence": 0.748,
"severity": "high",
"timestamp": "2026-01-06T00:00:00Z",
"trace_id": "a4638785-b3b9-ad45-f514-7ef8b78c5c11"
} | {
"account_age_days": 1545,
"account_id": "ACCT-FE004BA90BBC",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.856
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 147,
"timestamp": "2026-01-06T00:00:00Z",
"transaction_amount_usd": 9376.84
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.467,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 5465.71,
"financial_exposure_usd": 6628.97,
"recoverable_pct": 0.786
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106707",
"label": "benign",
"label_confidence": 0.534,
"severity": "low",
"timestamp": "2026-01-05T15:47:00Z",
"trace_id": "7c846bde-be66-ae92-cf99-0e2135343b50"
} | {
"account_age_days": 1720,
"account_id": "ACCT-0FDB6F4464AD",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.14
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 164,
"timestamp": "2026-01-05T15:47:00Z",
"transaction_amount_usd": 4982.73
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.564,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 634.7,
"financial_exposure_usd": 1074.44,
"recoverable_pct": 0.502
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106072",
"label": "fraudulent",
"label_confidence": 0.82,
"severity": "low",
"timestamp": "2026-01-05T05:12:00Z",
"trace_id": "3dbd949f-97d2-b65e-e37f-31015031528a"
} | {
"account_age_days": 1507,
"account_id": "ACCT-0E0EB9D2D327",
"baseline_risk_score": 0.212,
"kyc_tier": "tier_2",
"session_entropy": 0.269
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 442,
"timestamp": "2026-01-05T05:12:00Z",
"transaction_amount_usd": 1398441.05
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.54,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 2208510.58,
"financial_exposure_usd": 3658853.57,
"recoverable_pct": 0.54
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100369",
"label": "fraudulent",
"label_confidence": 0.792,
"severity": "critical",
"timestamp": "2026-01-01T06:09:00Z",
"trace_id": "800dd8dd-541a-1fab-8c6c-6191692bc7c4"
} | {
"account_age_days": 1705,
"account_id": "ACCT-24E700EFD69C",
"baseline_risk_score": 0.427,
"kyc_tier": "tier_3",
"session_entropy": 0.736
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 155,
"timestamp": "2025-12-31T22:06:00Z",
"transaction_amount_usd": 9.83
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.583,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 532713.91,
"financial_exposure_usd": 878075.33,
"recoverable_pct": 0.345
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103870",
"label": "fraudulent",
"label_confidence": 0.772,
"severity": "critical",
"timestamp": "2026-01-03T16:30:00Z",
"trace_id": "aca0dfbd-3bac-4c0f-19fb-dbf4e3d51fd1"
} | {
"account_age_days": 1413,
"account_id": "ACCT-CDE1591E28BC",
"baseline_risk_score": 0.449,
"kyc_tier": "tier_1",
"session_entropy": 0.682
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 1028,
"timestamp": "2026-01-03T16:30:00Z",
"transaction_amount_usd": 2560252.38
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.768,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2311900.42,
"financial_exposure_usd": 4431192.54,
"recoverable_pct": 0.788
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107306",
"label": "benign",
"label_confidence": 0.517,
"severity": "high",
"timestamp": "2026-01-06T01:46:00Z",
"trace_id": "c17e4c9d-26ce-661f-dd34-40937c3536b6"
} | {
"account_age_days": 112,
"account_id": "ACCT-C6C99257CC24",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.803
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 159,
"timestamp": "2026-01-05T22:42:00Z",
"transaction_amount_usd": 7.98
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.758,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1976.44,
"financial_exposure_usd": 2004.41,
"recoverable_pct": 0.602
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100816",
"label": "fraudulent",
"label_confidence": 0.808,
"severity": "critical",
"timestamp": "2026-01-01T13:36:00Z",
"trace_id": "63a4d7cd-88d8-7e79-1b08-4704830b230d"
} | {
"account_age_days": 1649,
"account_id": "ACCT-A7BC0A1CC02C",
"baseline_risk_score": 0.455,
"kyc_tier": "tier_2",
"session_entropy": 0.143
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "HK",
"latency_ms": 194,
"timestamp": "2026-01-01T13:36:00Z",
"transaction_amount_usd": 17192.59
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.374,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 563283.97,
"financial_exposure_usd": 690043.54,
"recoverable_pct": 0.075
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103244",
"label": "fraudulent",
"label_confidence": 0.906,
"severity": "high",
"timestamp": "2026-01-03T06:04:00Z",
"trace_id": "2b8a0923-866f-fd06-7a3f-ae940090e22d"
} | {
"account_age_days": 1967,
"account_id": "ACCT-5327FAD63440",
"baseline_risk_score": 0.429,
"kyc_tier": "tier_3",
"session_entropy": 0.773
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 288,
"timestamp": "2026-01-02T23:02:00Z",
"transaction_amount_usd": 12.84
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.448,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 250135.11,
"financial_exposure_usd": 408116.45,
"recoverable_pct": 0.208
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109314",
"label": "benign",
"label_confidence": 0.537,
"severity": "low",
"timestamp": "2026-01-07T11:14:00Z",
"trace_id": "2f82c1d2-8065-8dc1-c991-2935493ad529"
} | {
"account_age_days": 1075,
"account_id": "ACCT-5CC576CC4C31",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.175
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 581,
"timestamp": "2026-01-07T11:14:00Z",
"transaction_amount_usd": 6571.66
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.729,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2449.61,
"financial_exposure_usd": 3361.02,
"recoverable_pct": 0.769
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108107",
"label": "benign",
"label_confidence": 0.728,
"severity": "low",
"timestamp": "2026-01-06T15:07:00Z",
"trace_id": "7f924ed8-e4b4-fcb9-5f96-757603e30c24"
} | {
"account_age_days": 694,
"account_id": "ACCT-ACB803FCBD27",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.724
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 431,
"timestamp": "2026-01-06T15:07:00Z",
"transaction_amount_usd": 13804.92
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.665,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 4926.15,
"financial_exposure_usd": 5156.78,
"recoverable_pct": 0.54
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107372",
"label": "benign",
"label_confidence": 0.678,
"severity": "low",
"timestamp": "2026-01-06T02:52:00Z",
"trace_id": "8fe2cb34-61c2-e66d-a21b-421c08ea52f0"
} | {
"account_age_days": 1541,
"account_id": "ACCT-F36491EB9F51",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.148
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 360,
"timestamp": "2026-01-05T14:58:00Z",
"transaction_amount_usd": 8.49
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.677,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3135.8,
"financial_exposure_usd": 4558.23,
"recoverable_pct": 0.661
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104273",
"label": "fraudulent",
"label_confidence": 0.729,
"severity": "low",
"timestamp": "2026-01-03T23:13:00Z",
"trace_id": "72f2958e-220f-0399-c48c-50ccd5edbfab"
} | {
"account_age_days": 1834,
"account_id": "ACCT-E882FCB6FBF3",
"baseline_risk_score": 0.195,
"kyc_tier": "tier_3",
"session_entropy": 0.564
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 1064,
"timestamp": "2026-01-03T23:13:00Z",
"transaction_amount_usd": 2569224.01
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.885,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4063948.6,
"financial_exposure_usd": 6226037.01,
"recoverable_pct": 0.671
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103285",
"label": "fraudulent",
"label_confidence": 0.891,
"severity": "low",
"timestamp": "2026-01-03T06:45:00Z",
"trace_id": "271234ff-9a31-cb0b-da03-878d215e90ff"
} | {
"account_age_days": 155,
"account_id": "ACCT-34569EF02AC5",
"baseline_risk_score": 0.273,
"kyc_tier": "tier_1",
"session_entropy": 0.733
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 302,
"timestamp": "2026-01-02T21:25:00Z",
"transaction_amount_usd": 21.1
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.441,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 689764.87,
"financial_exposure_usd": 842708.36,
"recoverable_pct": 0.755
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109516",
"label": "benign",
"label_confidence": 0.691,
"severity": "low",
"timestamp": "2026-01-07T14:36:00Z",
"trace_id": "a53790f1-88a0-66f8-4313-12b53f8f8a3b"
} | {
"account_age_days": 146,
"account_id": "ACCT-EAAE3A0FA0F9",
"baseline_risk_score": 0.09,
"kyc_tier": "tier_1",
"session_entropy": 0.34
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 440,
"timestamp": "2026-01-07T14:36:00Z",
"transaction_amount_usd": 10582.66
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.454,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 828.31,
"financial_exposure_usd": 909.72,
"recoverable_pct": 0.63
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108021",
"label": "benign",
"label_confidence": 0.456,
"severity": "medium",
"timestamp": "2026-01-06T13:41:00Z",
"trace_id": "524079ba-bee6-d1bb-62aa-f8cd6bb913dd"
} | {
"account_age_days": 820,
"account_id": "ACCT-9551E43C7292",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.56
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 237,
"timestamp": "2026-01-06T09:25:00Z",
"transaction_amount_usd": 18.2
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.76,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 831.6,
"financial_exposure_usd": 1363.73,
"recoverable_pct": 0.434
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108911",
"label": "benign",
"label_confidence": 0.483,
"severity": "critical",
"timestamp": "2026-01-07T04:31:00Z",
"trace_id": "e9e94fee-70f4-5acc-cb58-3ea11cb0893f"
} | {
"account_age_days": 1984,
"account_id": "ACCT-7E08A0A65180",
"baseline_risk_score": 0.123,
"kyc_tier": "tier_3",
"session_entropy": 0.589
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 536,
"timestamp": "2026-01-07T04:31:00Z",
"transaction_amount_usd": 11096.06
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.645,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 583.17,
"financial_exposure_usd": 688.78,
"recoverable_pct": 0.54
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100760",
"label": "fraudulent",
"label_confidence": 0.916,
"severity": "high",
"timestamp": "2026-01-01T12:40:00Z",
"trace_id": "58f0c728-ebf6-c7d4-3ef5-33ce3914342b"
} | {
"account_age_days": 606,
"account_id": "ACCT-706DF6449803",
"baseline_risk_score": 0.517,
"kyc_tier": "tier_2",
"session_entropy": 0.22
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 251,
"timestamp": "2026-01-01T03:09:00Z",
"transaction_amount_usd": 4.06
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.745,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 731391.33,
"financial_exposure_usd": 1275741.87,
"recoverable_pct": 0.213
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108219",
"label": "benign",
"label_confidence": 0.63,
"severity": "high",
"timestamp": "2026-01-06T16:59:00Z",
"trace_id": "c0bb2f83-8dea-d602-dcc9-a7a6fc3190bc"
} | {
"account_age_days": 1883,
"account_id": "ACCT-F0CEB674AB63",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.313
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 193,
"timestamp": "2026-01-06T16:59:00Z",
"transaction_amount_usd": 379.24
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.765,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3035.15,
"financial_exposure_usd": 3401.82,
"recoverable_pct": 0.613
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107530",
"label": "benign",
"label_confidence": 0.586,
"severity": "low",
"timestamp": "2026-01-06T05:30:00Z",
"trace_id": "57325924-214a-54ad-cd1a-6dc36f4b9498"
} | {
"account_age_days": 380,
"account_id": "ACCT-FD32A2FDFF18",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.519
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 382,
"timestamp": "2026-01-05T22:44:00Z",
"transaction_amount_usd": 7.18
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.794,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 4121.25,
"financial_exposure_usd": 4565.9,
"recoverable_pct": 0.461
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107140",
"label": "benign",
"label_confidence": 0.542,
"severity": "medium",
"timestamp": "2026-01-05T23:00:00Z",
"trace_id": "b6c6c014-a489-b723-c8c6-d228b6360870"
} | {
"account_age_days": 827,
"account_id": "ACCT-6ECF58A2DF75",
"baseline_risk_score": 0.156,
"kyc_tier": "tier_1",
"session_entropy": 0.724
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 144,
"timestamp": "2026-01-05T21:22:00Z",
"transaction_amount_usd": 18.29
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.511,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1792.86,
"financial_exposure_usd": 3098.48,
"recoverable_pct": 0.834
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106491",
"label": "fraudulent",
"label_confidence": 0.827,
"severity": "high",
"timestamp": "2026-01-05T12:11:00Z",
"trace_id": "6dbf19e2-d477-c218-1605-8aa8650099cc"
} | {
"account_age_days": 1530,
"account_id": "ACCT-5173DB1A9222",
"baseline_risk_score": 0.284,
"kyc_tier": "tier_2",
"session_entropy": 0.906
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 205,
"timestamp": "2026-01-05T12:11:00Z",
"transaction_amount_usd": 1177102.84
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.586,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3862168.68,
"financial_exposure_usd": 4382413.92,
"recoverable_pct": 0.866
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101560",
"label": "fraudulent",
"label_confidence": 0.941,
"severity": "critical",
"timestamp": "2026-01-02T02:00:00Z",
"trace_id": "e77daf53-58cb-0ce2-a922-e5d03d0d119f"
} | {
"account_age_days": 1613,
"account_id": "ACCT-991D2F2E3955",
"baseline_risk_score": 0.573,
"kyc_tier": "tier_3",
"session_entropy": 0.833
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 124,
"timestamp": "2026-01-01T17:11:00Z",
"transaction_amount_usd": 3.57
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.742,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 1063045.99,
"financial_exposure_usd": 1355776.81,
"recoverable_pct": 0.1
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104046",
"label": "fraudulent",
"label_confidence": 0.613,
"severity": "high",
"timestamp": "2026-01-03T19:26:00Z",
"trace_id": "239d5c69-ef25-fa81-286e-bd7e36f09d20"
} | {
"account_age_days": 1991,
"account_id": "ACCT-12295CB23EA1",
"baseline_risk_score": 0.238,
"kyc_tier": "tier_3",
"session_entropy": 0.633
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 250,
"timestamp": "2026-01-03T19:26:00Z",
"transaction_amount_usd": 852650.52
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.713,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4535123.66,
"financial_exposure_usd": 6455598.42,
"recoverable_pct": 0.586
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102207",
"label": "fraudulent",
"label_confidence": 0.93,
"severity": "critical",
"timestamp": "2026-01-02T12:47:00Z",
"trace_id": "70e12b89-290b-2010-579f-a8091f59f00b"
} | {
"account_age_days": 1407,
"account_id": "ACCT-459CC2327F3E",
"baseline_risk_score": 0.308,
"kyc_tier": "tier_1",
"session_entropy": 0.753
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 238,
"timestamp": "2026-01-02T08:56:00Z",
"transaction_amount_usd": 20.82
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.947,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 137715.66,
"financial_exposure_usd": 204065,
"recoverable_pct": 0.302
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104782",
"label": "fraudulent",
"label_confidence": 0.604,
"severity": "low",
"timestamp": "2026-01-04T07:42:00Z",
"trace_id": "4aba398a-82ce-0a50-7dac-cb676031c2df"
} | {
"account_age_days": 215,
"account_id": "ACCT-BB4A43618E43",
"baseline_risk_score": 0.227,
"kyc_tier": "tier_1",
"session_entropy": 0.605
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 226,
"timestamp": "2026-01-04T07:42:00Z",
"transaction_amount_usd": 1920090.25
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.55,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 910139.44,
"financial_exposure_usd": 1830722.27,
"recoverable_pct": 0.719
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102054",
"label": "fraudulent",
"label_confidence": 0.979,
"severity": "medium",
"timestamp": "2026-01-02T10:14:00Z",
"trace_id": "1cb8d52e-b378-68bd-e0e8-821d430dd383"
} | {
"account_age_days": 865,
"account_id": "ACCT-9781D8BBF6FA",
"baseline_risk_score": 0.589,
"kyc_tier": "tier_1",
"session_entropy": 0.816
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "GB",
"latency_ms": 806,
"timestamp": "2026-01-02T10:14:00Z",
"transaction_amount_usd": 8505.9
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.423,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 709173.58,
"financial_exposure_usd": 801077.12,
"recoverable_pct": 0.066
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101371",
"label": "fraudulent",
"label_confidence": 0.888,
"severity": "high",
"timestamp": "2026-01-01T22:51:00Z",
"trace_id": "9148a55c-8505-7e33-2394-4e5625c67669"
} | {
"account_age_days": 991,
"account_id": "ACCT-4F8C0B194847",
"baseline_risk_score": 0.301,
"kyc_tier": "tier_3",
"session_entropy": 0.854
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 907,
"timestamp": "2026-01-01T22:51:00Z",
"transaction_amount_usd": 108971.46
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.669,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 196932.92,
"financial_exposure_usd": 487665.6,
"recoverable_pct": 0.143
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107887",
"label": "benign",
"label_confidence": 0.669,
"severity": "medium",
"timestamp": "2026-01-06T11:27:00Z",
"trace_id": "4d0b82e0-1556-3e51-27ab-b7d7f095d40c"
} | {
"account_age_days": 244,
"account_id": "ACCT-33679B7F09AB",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.261
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 175,
"timestamp": "2026-01-06T05:55:00Z",
"transaction_amount_usd": 3.8
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.662,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 450.1,
"financial_exposure_usd": 1069.91,
"recoverable_pct": 0.544
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106028",
"label": "fraudulent",
"label_confidence": 0.834,
"severity": "low",
"timestamp": "2026-01-05T04:28:00Z",
"trace_id": "736df753-f0cc-389a-ae25-be85f196e0cd"
} | {
"account_age_days": 1819,
"account_id": "ACCT-99690A757C3F",
"baseline_risk_score": 0.179,
"kyc_tier": "tier_3",
"session_entropy": 0.336
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 421,
"timestamp": "2026-01-05T04:28:00Z",
"transaction_amount_usd": 2759234.28
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.821,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5373432.83,
"financial_exposure_usd": 6863766.76,
"recoverable_pct": 0.675
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109551",
"label": "benign",
"label_confidence": 0.64,
"severity": "high",
"timestamp": "2026-01-07T15:11:00Z",
"trace_id": "5ba466ed-7185-706e-870c-dfddc3f93535"
} | {
"account_age_days": 1473,
"account_id": "ACCT-5A49E5507916",
"baseline_risk_score": 0.087,
"kyc_tier": "tier_3",
"session_entropy": 0.517
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 649,
"timestamp": "2026-01-07T15:11:00Z",
"transaction_amount_usd": 10967.23
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.681,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1773.2,
"financial_exposure_usd": 2172.68,
"recoverable_pct": 0.41
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.