schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104095",
"label": "fraudulent",
"label_confidence": 0.675,
"severity": "medium",
"timestamp": "2026-01-03T20:15:00Z",
"trace_id": "85e07f2e-1559-0b18-a56b-8fb3fb423421"
} | {
"account_age_days": 680,
"account_id": "ACCT-EB946DFB0237",
"baseline_risk_score": 0.271,
"kyc_tier": "tier_1",
"session_entropy": 0.444
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 477,
"timestamp": "2026-01-03T20:15:00Z",
"transaction_amount_usd": 119532.76
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.488,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4642117.88,
"financial_exposure_usd": 7292420.09,
"recoverable_pct": 0.428
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109588",
"label": "benign",
"label_confidence": 0.672,
"severity": "low",
"timestamp": "2026-01-07T15:48:00Z",
"trace_id": "bf499b29-88a3-e867-5020-19ff4ac4ef23"
} | {
"account_age_days": 522,
"account_id": "ACCT-0828BF250DBF",
"baseline_risk_score": 0.126,
"kyc_tier": "tier_2",
"session_entropy": 0.737
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 1063,
"timestamp": "2026-01-07T15:48:00Z",
"transaction_amount_usd": 4286.85
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.707,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1535.24,
"financial_exposure_usd": 1883.04,
"recoverable_pct": 0.502
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108388",
"label": "benign",
"label_confidence": 0.555,
"severity": "medium",
"timestamp": "2026-01-06T19:48:00Z",
"trace_id": "7991cfa1-a8e8-a1cb-59e7-c2b348ffff5f"
} | {
"account_age_days": 1277,
"account_id": "ACCT-A0DE9687603F",
"baseline_risk_score": 0.093,
"kyc_tier": "tier_1",
"session_entropy": 0.388
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 521,
"timestamp": "2026-01-06T19:48:00Z",
"transaction_amount_usd": 10988.93
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.61,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 3014.74,
"financial_exposure_usd": 3389.13,
"recoverable_pct": 0.873
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106127",
"label": "fraudulent",
"label_confidence": 0.752,
"severity": "high",
"timestamp": "2026-01-05T06:07:00Z",
"trace_id": "1d5d2fa4-9d02-9800-1e67-5e8d3421819e"
} | {
"account_age_days": 1893,
"account_id": "ACCT-D229900EA475",
"baseline_risk_score": 0.253,
"kyc_tier": "tier_3",
"session_entropy": 0.583
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 1169,
"timestamp": "2026-01-05T06:07:00Z",
"transaction_amount_usd": 1411969.94
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.893,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2290888.55,
"financial_exposure_usd": 3439137.99,
"recoverable_pct": 0.908
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109152",
"label": "benign",
"label_confidence": 0.456,
"severity": "low",
"timestamp": "2026-01-07T08:32:00Z",
"trace_id": "85279f09-c9da-1c02-c9ac-e4b80fb83331"
} | {
"account_age_days": 495,
"account_id": "ACCT-C0C40CEBBDFD",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.376
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 647,
"timestamp": "2026-01-07T08:32:00Z",
"transaction_amount_usd": 2243.52
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.621,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 3",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 454.7,
"financial_exposure_usd": 956.01,
"recoverable_pct": 0.956
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108770",
"label": "benign",
"label_confidence": 0.699,
"severity": "critical",
"timestamp": "2026-01-07T02:10:00Z",
"trace_id": "84355598-64eb-62f6-e0fd-c839a508e2eb"
} | {
"account_age_days": 813,
"account_id": "ACCT-2CD11709C957",
"baseline_risk_score": 0.052,
"kyc_tier": "tier_2",
"session_entropy": 0.154
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 564,
"timestamp": "2026-01-07T02:10:00Z",
"transaction_amount_usd": 14737.34
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.54,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 3183.93,
"financial_exposure_usd": 5346.03,
"recoverable_pct": 0.408
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105627",
"label": "fraudulent",
"label_confidence": 0.802,
"severity": "high",
"timestamp": "2026-01-04T21:47:00Z",
"trace_id": "f07456e0-5a65-b74d-0ad9-1e4e9ff21570"
} | {
"account_age_days": 110,
"account_id": "ACCT-77413C7BEFB2",
"baseline_risk_score": 0.394,
"kyc_tier": "tier_1",
"session_entropy": 0.751
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 587,
"timestamp": "2026-01-04T21:47:00Z",
"transaction_amount_usd": 2269985.8
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.454,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2669489.37,
"financial_exposure_usd": 4322900,
"recoverable_pct": 0.493
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103090",
"label": "fraudulent",
"label_confidence": 0.838,
"severity": "high",
"timestamp": "2026-01-03T03:30:00Z",
"trace_id": "e2c53e62-2e83-6a0e-2cf8-a37e34610429"
} | {
"account_age_days": 1191,
"account_id": "ACCT-E017F94ACE5E",
"baseline_risk_score": 0.265,
"kyc_tier": "tier_1",
"session_entropy": 0.3
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 718,
"timestamp": "2026-01-03T03:30:00Z",
"transaction_amount_usd": 13880.12
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.717,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 477695.31,
"financial_exposure_usd": 896318.36,
"recoverable_pct": 0.362
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102629",
"label": "fraudulent",
"label_confidence": 0.952,
"severity": "critical",
"timestamp": "2026-01-02T19:49:00Z",
"trace_id": "c9a94a61-2db8-716c-5336-b88d41223729"
} | {
"account_age_days": 572,
"account_id": "ACCT-B591021C666B",
"baseline_risk_score": 0.385,
"kyc_tier": "tier_3",
"session_entropy": 0.493
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 931,
"timestamp": "2026-01-02T19:49:00Z",
"transaction_amount_usd": 18886.48
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.743,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 229235.11,
"financial_exposure_usd": 519034.64,
"recoverable_pct": 0.615
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101038",
"label": "fraudulent",
"label_confidence": 0.834,
"severity": "medium",
"timestamp": "2026-01-01T17:18:00Z",
"trace_id": "773d2de7-039a-3a5a-b3c9-38295250871b"
} | {
"account_age_days": 333,
"account_id": "ACCT-71F7BA330DE8",
"baseline_risk_score": 0.516,
"kyc_tier": "tier_1",
"session_entropy": 0.283
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "GB",
"latency_ms": 569,
"timestamp": "2026-01-01T17:18:00Z",
"transaction_amount_usd": 24932.44
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.621,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 165287.74,
"financial_exposure_usd": 366396.31,
"recoverable_pct": 0.301
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109541",
"label": "benign",
"label_confidence": 0.473,
"severity": "medium",
"timestamp": "2026-01-07T15:01:00Z",
"trace_id": "ea9f3791-271f-5bea-365c-4ce40d02e06b"
} | {
"account_age_days": 1270,
"account_id": "ACCT-2EA078A873AE",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.712
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 91,
"timestamp": "2026-01-07T15:01:00Z",
"transaction_amount_usd": 13961.25
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.756,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1828.41,
"financial_exposure_usd": 3973.65,
"recoverable_pct": 0.614
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105832",
"label": "fraudulent",
"label_confidence": 0.731,
"severity": "medium",
"timestamp": "2026-01-05T01:12:00Z",
"trace_id": "347c233a-b9f8-e905-b24c-da0fdd9290c0"
} | {
"account_age_days": 754,
"account_id": "ACCT-AFA8F47A6E4C",
"baseline_risk_score": 0.427,
"kyc_tier": "tier_3",
"session_entropy": 0.587
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 693,
"timestamp": "2026-01-05T01:12:00Z",
"transaction_amount_usd": 246819.14
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.911,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 6045621.92,
"financial_exposure_usd": 6438187.16,
"recoverable_pct": 0.46
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105363",
"label": "fraudulent",
"label_confidence": 0.627,
"severity": "high",
"timestamp": "2026-01-04T17:23:00Z",
"trace_id": "d16510b1-13d4-9d83-a0c9-42da25fb9187"
} | {
"account_age_days": 1879,
"account_id": "ACCT-1EC944EBEAA7",
"baseline_risk_score": 0.315,
"kyc_tier": "tier_3",
"session_entropy": 0.777
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 275,
"timestamp": "2026-01-04T16:07:00Z",
"transaction_amount_usd": 11.43
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.51,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3267747.61,
"financial_exposure_usd": 6288241.91,
"recoverable_pct": 0.584
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101796",
"label": "fraudulent",
"label_confidence": 0.902,
"severity": "high",
"timestamp": "2026-01-02T05:56:00Z",
"trace_id": "79824b93-05ea-7c28-e671-403a9e271d3a"
} | {
"account_age_days": 833,
"account_id": "ACCT-EC7F986427B9",
"baseline_risk_score": 0.519,
"kyc_tier": "tier_2",
"session_entropy": 0.251
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 1116,
"timestamp": "2026-01-02T05:56:00Z",
"transaction_amount_usd": 44232.89
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.49,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 474713.93,
"financial_exposure_usd": 1106211.43,
"recoverable_pct": 0.284
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107391",
"label": "benign",
"label_confidence": 0.654,
"severity": "medium",
"timestamp": "2026-01-06T03:11:00Z",
"trace_id": "7b8e74bf-04d8-5b2f-c100-1df899c593fa"
} | {
"account_age_days": 722,
"account_id": "ACCT-DDB2069AED80",
"baseline_risk_score": 0.097,
"kyc_tier": "tier_3",
"session_entropy": 0.804
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 1159,
"timestamp": "2026-01-06T03:11:00Z",
"transaction_amount_usd": 10398.31
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.714,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 5199.28,
"financial_exposure_usd": 5480.34,
"recoverable_pct": 0.423
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102896",
"label": "fraudulent",
"label_confidence": 0.754,
"severity": "medium",
"timestamp": "2026-01-03T00:16:00Z",
"trace_id": "ec578a65-a828-caf9-fb49-fd7c8b36c565"
} | {
"account_age_days": 1436,
"account_id": "ACCT-44D094B2DA86",
"baseline_risk_score": 0.402,
"kyc_tier": "tier_3",
"session_entropy": 0.803
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 366,
"timestamp": "2026-01-02T19:06:00Z",
"transaction_amount_usd": 16.22
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.896,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 301382.75,
"financial_exposure_usd": 724994.84,
"recoverable_pct": 0.024
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106894",
"label": "benign",
"label_confidence": 0.711,
"severity": "low",
"timestamp": "2026-01-05T18:54:00Z",
"trace_id": "8d908c33-b4f9-c803-b709-a5ae541be2c1"
} | {
"account_age_days": 205,
"account_id": "ACCT-6FC811AF718E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.513
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 238,
"timestamp": "2026-01-05T18:54:00Z",
"transaction_amount_usd": 9655.12
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.499,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3925.6,
"financial_exposure_usd": 3944.84,
"recoverable_pct": 0.761
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106016",
"label": "fraudulent",
"label_confidence": 0.604,
"severity": "medium",
"timestamp": "2026-01-05T04:16:00Z",
"trace_id": "e8a7d62d-2fb2-c104-5c9a-a82d7de83c60"
} | {
"account_age_days": 455,
"account_id": "ACCT-DA107CE3F554",
"baseline_risk_score": 0.401,
"kyc_tier": "tier_3",
"session_entropy": 0.879
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 190,
"timestamp": "2026-01-05T04:16:00Z",
"transaction_amount_usd": 1860334.68
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.63,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 3882310.43,
"financial_exposure_usd": 5008473.48,
"recoverable_pct": 0.715
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101728",
"label": "fraudulent",
"label_confidence": 0.827,
"severity": "critical",
"timestamp": "2026-01-02T04:48:00Z",
"trace_id": "361986b0-6d95-2553-76b5-89e572084229"
} | {
"account_age_days": 475,
"account_id": "ACCT-946F4889F426",
"baseline_risk_score": 0.647,
"kyc_tier": "tier_3",
"session_entropy": 0.193
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 176,
"timestamp": "2026-01-02T04:48:00Z",
"transaction_amount_usd": 56943.8
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.391,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 732761.41,
"financial_exposure_usd": 789278.12,
"recoverable_pct": 0.607
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104592",
"label": "fraudulent",
"label_confidence": 0.671,
"severity": "high",
"timestamp": "2026-01-04T04:32:00Z",
"trace_id": "b68caaf0-ef89-efac-c230-dffc8afae860"
} | {
"account_age_days": 1165,
"account_id": "ACCT-23A0995D37E0",
"baseline_risk_score": 0.308,
"kyc_tier": "tier_1",
"session_entropy": 0.143
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 1102,
"timestamp": "2026-01-04T04:32:00Z",
"transaction_amount_usd": 2809392.18
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.608,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1576337.48,
"financial_exposure_usd": 2615475.45,
"recoverable_pct": 0.573
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101928",
"label": "fraudulent",
"label_confidence": 0.933,
"severity": "high",
"timestamp": "2026-01-02T08:08:00Z",
"trace_id": "ca959db3-19b3-026f-dbaf-4b4ff9140b67"
} | {
"account_age_days": 1824,
"account_id": "ACCT-E22B69192698",
"baseline_risk_score": 0.486,
"kyc_tier": "tier_3",
"session_entropy": 0.411
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 314,
"timestamp": "2026-01-02T08:08:00Z",
"transaction_amount_usd": 79319
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.809,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 462867.5,
"financial_exposure_usd": 490666.46,
"recoverable_pct": 0.02
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106104",
"label": "fraudulent",
"label_confidence": 0.783,
"severity": "high",
"timestamp": "2026-01-05T05:44:00Z",
"trace_id": "beac7e96-d779-4e68-5f92-a5d406aa8e63"
} | {
"account_age_days": 425,
"account_id": "ACCT-93316CED9E4D",
"baseline_risk_score": 0.264,
"kyc_tier": "tier_1",
"session_entropy": 0.343
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 639,
"timestamp": "2026-01-05T05:44:00Z",
"transaction_amount_usd": 1957806.65
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.686,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1994794.21,
"financial_exposure_usd": 3614013.58,
"recoverable_pct": 0.688
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104007",
"label": "fraudulent",
"label_confidence": 0.913,
"severity": "high",
"timestamp": "2026-01-03T18:47:00Z",
"trace_id": "d23de3ea-245b-7041-1dbe-e887f5442a86"
} | {
"account_age_days": 499,
"account_id": "ACCT-8631E62F0BD1",
"baseline_risk_score": 0.102,
"kyc_tier": "tier_1",
"session_entropy": 0.8
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 327,
"timestamp": "2026-01-03T12:17:00Z",
"transaction_amount_usd": 19.87
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.561,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4237630.73,
"financial_exposure_usd": 5136866.17,
"recoverable_pct": 0.966
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102978",
"label": "fraudulent",
"label_confidence": 0.802,
"severity": "medium",
"timestamp": "2026-01-03T01:38:00Z",
"trace_id": "7b21c907-00a9-a495-2c0e-fe4b573782d2"
} | {
"account_age_days": 591,
"account_id": "ACCT-7D72D9C0EBC6",
"baseline_risk_score": 0.649,
"kyc_tier": "tier_1",
"session_entropy": 0.384
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 129,
"timestamp": "2026-01-03T01:38:00Z",
"transaction_amount_usd": 29242.11
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.939,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 345693.2,
"financial_exposure_usd": 639533.67,
"recoverable_pct": 0.676
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103048",
"label": "fraudulent",
"label_confidence": 0.858,
"severity": "critical",
"timestamp": "2026-01-03T02:48:00Z",
"trace_id": "2b029a33-8958-e8ec-aa01-aaf716683f02"
} | {
"account_age_days": 909,
"account_id": "ACCT-8BCB8A75402C",
"baseline_risk_score": 0.276,
"kyc_tier": "tier_2",
"session_entropy": 0.62
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 133,
"timestamp": "2026-01-02T21:07:00Z",
"transaction_amount_usd": 3.88
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.549,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 612734.19,
"financial_exposure_usd": 752921.68,
"recoverable_pct": 0.497
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103530",
"label": "fraudulent",
"label_confidence": 0.927,
"severity": "medium",
"timestamp": "2026-01-03T10:50:00Z",
"trace_id": "914b1c93-5c31-cbbe-3f04-96f7d54b8168"
} | {
"account_age_days": 1442,
"account_id": "ACCT-44786D9C1B9B",
"baseline_risk_score": 0.222,
"kyc_tier": "tier_1",
"session_entropy": 0.376
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 825,
"timestamp": "2026-01-03T10:50:00Z",
"transaction_amount_usd": 2068109.75
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.632,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4072469.96,
"financial_exposure_usd": 4458289.08,
"recoverable_pct": 0.935
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105852",
"label": "fraudulent",
"label_confidence": 0.681,
"severity": "medium",
"timestamp": "2026-01-05T01:32:00Z",
"trace_id": "88f2a92e-6de2-6185-e508-4ba2585dee12"
} | {
"account_age_days": 64,
"account_id": "ACCT-AC0C7E67E2CE",
"baseline_risk_score": 0.215,
"kyc_tier": "tier_2",
"session_entropy": 0.262
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 134,
"timestamp": "2026-01-04T22:16:00Z",
"transaction_amount_usd": 24.22
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.789,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3661164.31,
"financial_exposure_usd": 4610595.64,
"recoverable_pct": 0.432
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100115",
"label": "fraudulent",
"label_confidence": 0.853,
"severity": "high",
"timestamp": "2026-01-01T01:55:00Z",
"trace_id": "d2e55512-6abb-6c41-f928-62a9bb51cd74"
} | {
"account_age_days": 1641,
"account_id": "ACCT-BA554E35DDC8",
"baseline_risk_score": 0.434,
"kyc_tier": "tier_3",
"session_entropy": 0.376
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 350,
"timestamp": "2025-12-31T22:30:00Z",
"transaction_amount_usd": 3.23
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.596,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 793757.46,
"financial_exposure_usd": 844291.11,
"recoverable_pct": 0.288
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105166",
"label": "fraudulent",
"label_confidence": 0.881,
"severity": "critical",
"timestamp": "2026-01-04T14:06:00Z",
"trace_id": "32cc9649-84a5-d30c-549a-a02e7365b772"
} | {
"account_age_days": 348,
"account_id": "ACCT-22BA441BF81C",
"baseline_risk_score": 0.261,
"kyc_tier": "tier_1",
"session_entropy": 0.303
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 178,
"timestamp": "2026-01-04T11:59:00Z",
"transaction_amount_usd": 22.79
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.645,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 5100545.62,
"financial_exposure_usd": 5810028.82,
"recoverable_pct": 0.7
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100049",
"label": "fraudulent",
"label_confidence": 0.785,
"severity": "high",
"timestamp": "2026-01-01T00:49:00Z",
"trace_id": "c97a24ad-41b4-55b8-59b9-222c115affac"
} | {
"account_age_days": 1358,
"account_id": "ACCT-166ECFE36D77",
"baseline_risk_score": 0.586,
"kyc_tier": "tier_3",
"session_entropy": 0.35
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 927,
"timestamp": "2026-01-01T00:49:00Z",
"transaction_amount_usd": 6253.62
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.638,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 242663.73,
"financial_exposure_usd": 584110.59,
"recoverable_pct": 0.145
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107022",
"label": "benign",
"label_confidence": 0.597,
"severity": "medium",
"timestamp": "2026-01-05T21:02:00Z",
"trace_id": "52f601c3-e898-b5a1-6968-4b4c54f7bd37"
} | {
"account_age_days": 465,
"account_id": "ACCT-D883ED737322",
"baseline_risk_score": 0.143,
"kyc_tier": "tier_1",
"session_entropy": 0.946
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 618,
"timestamp": "2026-01-05T21:02:00Z",
"transaction_amount_usd": 4646.03
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.479,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3503.91,
"financial_exposure_usd": 5545.13,
"recoverable_pct": 0.846
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107364",
"label": "benign",
"label_confidence": 0.511,
"severity": "high",
"timestamp": "2026-01-06T02:44:00Z",
"trace_id": "2d7d8d66-10b2-73fe-87b4-93dac3de97e6"
} | {
"account_age_days": 1304,
"account_id": "ACCT-596FDA0F3B48",
"baseline_risk_score": 0.172,
"kyc_tier": "tier_1",
"session_entropy": 0.906
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 282,
"timestamp": "2026-01-06T02:44:00Z",
"transaction_amount_usd": 2781.05
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.576,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3348.11,
"financial_exposure_usd": 6294.35,
"recoverable_pct": 0.845
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109870",
"label": "benign",
"label_confidence": 0.719,
"severity": "high",
"timestamp": "2026-01-07T20:30:00Z",
"trace_id": "6208cd4e-91c9-44c2-8197-d3e84c57fbcb"
} | {
"account_age_days": 1016,
"account_id": "ACCT-8FAC62A232F7",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.639
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 317,
"timestamp": "2026-01-07T12:24:00Z",
"transaction_amount_usd": 17.62
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.772,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1075.82,
"financial_exposure_usd": 1209.09,
"recoverable_pct": 0.97
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104919",
"label": "fraudulent",
"label_confidence": 0.789,
"severity": "critical",
"timestamp": "2026-01-04T09:59:00Z",
"trace_id": "fb29bab2-d88b-aaea-0cbd-af2a46d3f514"
} | {
"account_age_days": 125,
"account_id": "ACCT-F266D5A6E236",
"baseline_risk_score": 0.368,
"kyc_tier": "tier_2",
"session_entropy": 0.49
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 250,
"timestamp": "2026-01-04T03:12:00Z",
"transaction_amount_usd": 1.5
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.741,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3499848.9,
"financial_exposure_usd": 3831966.64,
"recoverable_pct": 0.644
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103683",
"label": "fraudulent",
"label_confidence": 0.751,
"severity": "high",
"timestamp": "2026-01-03T13:23:00Z",
"trace_id": "5464fa17-5cf1-0b2d-be69-0c3bf5fb17f2"
} | {
"account_age_days": 660,
"account_id": "ACCT-0FB651B04291",
"baseline_risk_score": 0.165,
"kyc_tier": "tier_3",
"session_entropy": 0.537
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 350,
"timestamp": "2026-01-03T07:48:00Z",
"transaction_amount_usd": 9.81
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.543,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2060250.13,
"financial_exposure_usd": 3275227.98,
"recoverable_pct": 0.787
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108765",
"label": "benign",
"label_confidence": 0.651,
"severity": "low",
"timestamp": "2026-01-07T02:05:00Z",
"trace_id": "a95208d1-a2ab-f584-e6c6-a0d395c828b8"
} | {
"account_age_days": 749,
"account_id": "ACCT-9623CDAFFBDA",
"baseline_risk_score": 0.111,
"kyc_tier": "tier_3",
"session_entropy": 0.142
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 303,
"timestamp": "2026-01-06T17:02:00Z",
"transaction_amount_usd": 17.67
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.624,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 831.39,
"financial_exposure_usd": 897.55,
"recoverable_pct": 0.846
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109888",
"label": "benign",
"label_confidence": 0.561,
"severity": "low",
"timestamp": "2026-01-07T20:48:00Z",
"trace_id": "4fdeb364-c030-4535-a5ca-76bfd21c6768"
} | {
"account_age_days": 173,
"account_id": "ACCT-1EF249D104E9",
"baseline_risk_score": 0.092,
"kyc_tier": "tier_3",
"session_entropy": 0.666
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 299,
"timestamp": "2026-01-07T10:10:00Z",
"transaction_amount_usd": 22.13
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.749,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 6200.51,
"financial_exposure_usd": 7903.59,
"recoverable_pct": 0.767
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105355",
"label": "fraudulent",
"label_confidence": 0.768,
"severity": "high",
"timestamp": "2026-01-04T17:15:00Z",
"trace_id": "48a41249-8009-4018-ef6d-816dcb8af925"
} | {
"account_age_days": 1869,
"account_id": "ACCT-5B42D61A1C66",
"baseline_risk_score": 0.191,
"kyc_tier": "tier_2",
"session_entropy": 0.419
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 340,
"timestamp": "2026-01-04T17:15:00Z",
"transaction_amount_usd": 2196110.78
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.67,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 701883,
"financial_exposure_usd": 1257779.81,
"recoverable_pct": 0.701
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105955",
"label": "fraudulent",
"label_confidence": 0.894,
"severity": "high",
"timestamp": "2026-01-05T03:15:00Z",
"trace_id": "6b01bc75-61c8-4785-3a85-8338bbcbafc8"
} | {
"account_age_days": 900,
"account_id": "ACCT-011361BDCD13",
"baseline_risk_score": 0.374,
"kyc_tier": "tier_2",
"session_entropy": 0.567
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 395,
"timestamp": "2026-01-05T01:37:00Z",
"transaction_amount_usd": 15.21
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.391,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1580533.22,
"financial_exposure_usd": 2043113.36,
"recoverable_pct": 0.985
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107301",
"label": "benign",
"label_confidence": 0.464,
"severity": "high",
"timestamp": "2026-01-06T01:41:00Z",
"trace_id": "f5cfd7fc-df92-55bf-394b-ed7d6f620426"
} | {
"account_age_days": 860,
"account_id": "ACCT-8FDB24E42102",
"baseline_risk_score": 0.084,
"kyc_tier": "tier_1",
"session_entropy": 0.421
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 422,
"timestamp": "2026-01-06T01:41:00Z",
"transaction_amount_usd": 7201.4
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.566,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2500.14,
"financial_exposure_usd": 2998.18,
"recoverable_pct": 0.957
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102900",
"label": "fraudulent",
"label_confidence": 0.913,
"severity": "critical",
"timestamp": "2026-01-03T00:20:00Z",
"trace_id": "6f682a85-0c17-fd69-f4b1-2749e7c861c8"
} | {
"account_age_days": 1934,
"account_id": "ACCT-1DE212C7EED5",
"baseline_risk_score": 0.506,
"kyc_tier": "tier_3",
"session_entropy": 0.305
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 248,
"timestamp": "2026-01-03T00:20:00Z",
"transaction_amount_usd": 17236.82
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.902,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 822474.86,
"financial_exposure_usd": 1106499.23,
"recoverable_pct": 0.588
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102570",
"label": "fraudulent",
"label_confidence": 0.822,
"severity": "critical",
"timestamp": "2026-01-02T18:50:00Z",
"trace_id": "e66088f9-fa87-c091-e72c-840e25e8cc15"
} | {
"account_age_days": 684,
"account_id": "ACCT-C6776C76C096",
"baseline_risk_score": 0.516,
"kyc_tier": "tier_1",
"session_entropy": 0.338
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CH",
"latency_ms": 199,
"timestamp": "2026-01-02T18:50:00Z",
"transaction_amount_usd": 67269.17
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.863,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 658374.74,
"financial_exposure_usd": 1243148.15,
"recoverable_pct": 0.224
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106759",
"label": "benign",
"label_confidence": 0.496,
"severity": "critical",
"timestamp": "2026-01-05T16:39:00Z",
"trace_id": "60d2813a-576f-0b14-04a7-27d152c31b95"
} | {
"account_age_days": 1022,
"account_id": "ACCT-8D78651B0645",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.84
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 378,
"timestamp": "2026-01-05T09:44:00Z",
"transaction_amount_usd": 16.11
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.633,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 5502.82,
"financial_exposure_usd": 10868.47,
"recoverable_pct": 0.781
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106165",
"label": "fraudulent",
"label_confidence": 0.852,
"severity": "medium",
"timestamp": "2026-01-05T06:45:00Z",
"trace_id": "a0a1a44d-8fad-1cf9-ac7b-e68df4156c8d"
} | {
"account_age_days": 1461,
"account_id": "ACCT-E8A352E3DF27",
"baseline_risk_score": 0.45,
"kyc_tier": "tier_2",
"session_entropy": 0.611
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 298,
"timestamp": "2026-01-04T21:02:00Z",
"transaction_amount_usd": 15.61
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.461,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 6235393.01,
"financial_exposure_usd": 8762728.22,
"recoverable_pct": 0.96
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107296",
"label": "benign",
"label_confidence": 0.628,
"severity": "medium",
"timestamp": "2026-01-06T01:36:00Z",
"trace_id": "f246485d-54f0-31c9-0482-becd7fc96f0e"
} | {
"account_age_days": 73,
"account_id": "ACCT-5EF89EF52E03",
"baseline_risk_score": 0.174,
"kyc_tier": "tier_3",
"session_entropy": 0.949
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 372,
"timestamp": "2026-01-05T13:47:00Z",
"transaction_amount_usd": 2.17
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.454,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 848.42,
"financial_exposure_usd": 1722.93,
"recoverable_pct": 0.822
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102569",
"label": "fraudulent",
"label_confidence": 0.894,
"severity": "high",
"timestamp": "2026-01-02T18:49:00Z",
"trace_id": "67ed0bea-0448-ea22-c440-6185ea0ec2b4"
} | {
"account_age_days": 902,
"account_id": "ACCT-DA37E9237DCD",
"baseline_risk_score": 0.391,
"kyc_tier": "tier_1",
"session_entropy": 0.217
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 177,
"timestamp": "2026-01-02T14:31:00Z",
"transaction_amount_usd": 0.57
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.587,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 1164228.25,
"financial_exposure_usd": 1345871.01,
"recoverable_pct": 0.459
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108099",
"label": "benign",
"label_confidence": 0.557,
"severity": "medium",
"timestamp": "2026-01-06T14:59:00Z",
"trace_id": "b530f239-b9a1-08e9-a937-ba42b31617ed"
} | {
"account_age_days": 734,
"account_id": "ACCT-A245A1CCDD85",
"baseline_risk_score": 0.061,
"kyc_tier": "tier_2",
"session_entropy": 0.412
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 168,
"timestamp": "2026-01-06T14:59:00Z",
"transaction_amount_usd": 3490.64
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.78,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 2562.07,
"financial_exposure_usd": 5846.6,
"recoverable_pct": 0.895
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103162",
"label": "fraudulent",
"label_confidence": 0.876,
"severity": "critical",
"timestamp": "2026-01-03T04:42:00Z",
"trace_id": "8875757b-6c45-577b-1c6a-58c97cc520fb"
} | {
"account_age_days": 377,
"account_id": "ACCT-05FF9F913E0B",
"baseline_risk_score": 0.373,
"kyc_tier": "tier_2",
"session_entropy": 0.806
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "MY",
"latency_ms": 695,
"timestamp": "2026-01-03T04:42:00Z",
"transaction_amount_usd": 4171.78
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.527,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 681440.6,
"financial_exposure_usd": 1088372.52,
"recoverable_pct": 0.764
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103178",
"label": "fraudulent",
"label_confidence": 0.972,
"severity": "critical",
"timestamp": "2026-01-03T04:58:00Z",
"trace_id": "bfc171ed-1a69-bc77-dc71-2e5249951b23"
} | {
"account_age_days": 1270,
"account_id": "ACCT-F40B55FE83FE",
"baseline_risk_score": 0.439,
"kyc_tier": "tier_1",
"session_entropy": 0.919
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 296,
"timestamp": "2026-01-02T22:25:00Z",
"transaction_amount_usd": 3.39
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.378,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 195595.05,
"financial_exposure_usd": 213747.73,
"recoverable_pct": 0.258
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101281",
"label": "fraudulent",
"label_confidence": 0.885,
"severity": "medium",
"timestamp": "2026-01-01T21:21:00Z",
"trace_id": "2994894a-9807-75c0-d053-f08049642d70"
} | {
"account_age_days": 211,
"account_id": "ACCT-9DAD1A60CE5C",
"baseline_risk_score": 0.289,
"kyc_tier": "tier_3",
"session_entropy": 0.674
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 290,
"timestamp": "2026-01-01T21:21:00Z",
"transaction_amount_usd": 98784
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.793,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 311447.55,
"financial_exposure_usd": 683344.69,
"recoverable_pct": 0.064
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100197",
"label": "fraudulent",
"label_confidence": 0.827,
"severity": "critical",
"timestamp": "2026-01-01T03:17:00Z",
"trace_id": "9720b88f-1b98-a0e3-9a06-8a930ac7256b"
} | {
"account_age_days": 469,
"account_id": "ACCT-CE1EAEB5BD67",
"baseline_risk_score": 0.593,
"kyc_tier": "tier_2",
"session_entropy": 0.811
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 943,
"timestamp": "2026-01-01T03:17:00Z",
"transaction_amount_usd": 69287.25
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.411,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 569925.02,
"financial_exposure_usd": 727250.33,
"recoverable_pct": 0.266
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106189",
"label": "fraudulent",
"label_confidence": 0.75,
"severity": "medium",
"timestamp": "2026-01-05T07:09:00Z",
"trace_id": "07ded3f2-1ac8-637a-a71f-3740f25bdc43"
} | {
"account_age_days": 1628,
"account_id": "ACCT-C2DF150A3A45",
"baseline_risk_score": 0.268,
"kyc_tier": "tier_2",
"session_entropy": 0.449
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 458,
"timestamp": "2026-01-05T07:09:00Z",
"transaction_amount_usd": 824626.01
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.945,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1917950.76,
"financial_exposure_usd": 2996870.21,
"recoverable_pct": 0.846
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103989",
"label": "fraudulent",
"label_confidence": 0.827,
"severity": "medium",
"timestamp": "2026-01-03T18:29:00Z",
"trace_id": "ce8f6e7b-22a0-b8e9-af85-3ccf686efc60"
} | {
"account_age_days": 993,
"account_id": "ACCT-341C0284BF94",
"baseline_risk_score": 0.188,
"kyc_tier": "tier_2",
"session_entropy": 0.377
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 544,
"timestamp": "2026-01-03T18:29:00Z",
"transaction_amount_usd": 176747.42
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.404,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3607593.38,
"financial_exposure_usd": 3673551,
"recoverable_pct": 0.731
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102739",
"label": "fraudulent",
"label_confidence": 0.977,
"severity": "high",
"timestamp": "2026-01-02T21:39:00Z",
"trace_id": "5ec73f78-b2f7-d2e7-0b97-762de996cdcb"
} | {
"account_age_days": 1092,
"account_id": "ACCT-AA62FE6325BA",
"baseline_risk_score": 0.325,
"kyc_tier": "tier_2",
"session_entropy": 0.938
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "JP",
"latency_ms": 362,
"timestamp": "2026-01-02T21:39:00Z",
"transaction_amount_usd": 70946.93
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.743,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 863610.71,
"financial_exposure_usd": 956928.41,
"recoverable_pct": 0.704
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104169",
"label": "fraudulent",
"label_confidence": 0.884,
"severity": "low",
"timestamp": "2026-01-03T21:29:00Z",
"trace_id": "85c7db25-66b0-9604-66db-d23b5b3235e8"
} | {
"account_age_days": 1085,
"account_id": "ACCT-6B17DF0A2208",
"baseline_risk_score": 0.372,
"kyc_tier": "tier_1",
"session_entropy": 0.846
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 124,
"timestamp": "2026-01-03T21:29:00Z",
"transaction_amount_usd": 2180328.36
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.354,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2801621.09,
"financial_exposure_usd": 4025405.93,
"recoverable_pct": 0.99
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108500",
"label": "benign",
"label_confidence": 0.642,
"severity": "high",
"timestamp": "2026-01-06T21:40:00Z",
"trace_id": "13daad1c-5173-7328-8de0-54cbaeb16b36"
} | {
"account_age_days": 1802,
"account_id": "ACCT-4EE3B7A3AA37",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.446
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 237,
"timestamp": "2026-01-06T21:40:00Z",
"transaction_amount_usd": 4218.32
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.682,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2597.02,
"financial_exposure_usd": 3158.09,
"recoverable_pct": 0.998
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100829",
"label": "fraudulent",
"label_confidence": 0.76,
"severity": "critical",
"timestamp": "2026-01-01T13:49:00Z",
"trace_id": "3d5bd3bb-b612-b36a-feba-5384a97ebc2e"
} | {
"account_age_days": 1057,
"account_id": "ACCT-0EEBFA4952FE",
"baseline_risk_score": 0.327,
"kyc_tier": "tier_3",
"session_entropy": 0.726
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 238,
"timestamp": "2026-01-01T13:49:00Z",
"transaction_amount_usd": 23074.32
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.569,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 685248.07,
"financial_exposure_usd": 790088.92,
"recoverable_pct": 0.155
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108679",
"label": "benign",
"label_confidence": 0.528,
"severity": "medium",
"timestamp": "2026-01-07T00:39:00Z",
"trace_id": "1669b9d5-121f-9976-96c4-ca837553f04c"
} | {
"account_age_days": 1980,
"account_id": "ACCT-1F202E1EB3D0",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.165
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 802,
"timestamp": "2026-01-07T00:39:00Z",
"transaction_amount_usd": 10521.9
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.545,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2341.49,
"financial_exposure_usd": 3715.09,
"recoverable_pct": 0.831
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106994",
"label": "benign",
"label_confidence": 0.715,
"severity": "medium",
"timestamp": "2026-01-05T20:34:00Z",
"trace_id": "b1f059e5-5d1b-b192-95d8-a09d95324f43"
} | {
"account_age_days": 1325,
"account_id": "ACCT-4104883900E5",
"baseline_risk_score": 0.2,
"kyc_tier": "tier_1",
"session_entropy": 0.402
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 263,
"timestamp": "2026-01-05T20:34:00Z",
"transaction_amount_usd": 13486.46
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.463,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2793.74,
"financial_exposure_usd": 3971.63,
"recoverable_pct": 0.796
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101806",
"label": "fraudulent",
"label_confidence": 0.835,
"severity": "high",
"timestamp": "2026-01-02T06:06:00Z",
"trace_id": "ebed052a-e2d9-7921-07da-d02f98024842"
} | {
"account_age_days": 468,
"account_id": "ACCT-4846F2EED7E4",
"baseline_risk_score": 0.455,
"kyc_tier": "tier_3",
"session_entropy": 0.804
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 394,
"timestamp": "2026-01-02T03:58:00Z",
"transaction_amount_usd": 23.35
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.88,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 340062.58,
"financial_exposure_usd": 671104.72,
"recoverable_pct": 0.479
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104576",
"label": "fraudulent",
"label_confidence": 0.601,
"severity": "high",
"timestamp": "2026-01-04T04:16:00Z",
"trace_id": "44313a94-cb71-0c87-c4fd-a5a205304a4d"
} | {
"account_age_days": 436,
"account_id": "ACCT-3CB61A6BA594",
"baseline_risk_score": 0.306,
"kyc_tier": "tier_3",
"session_entropy": 0.897
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 147,
"timestamp": "2026-01-04T01:45:00Z",
"transaction_amount_usd": 15.66
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.947,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2152753.16,
"financial_exposure_usd": 2901690.53,
"recoverable_pct": 0.69
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106682",
"label": "benign",
"label_confidence": 0.528,
"severity": "medium",
"timestamp": "2026-01-05T15:22:00Z",
"trace_id": "42c92a05-9dab-6f4b-c080-c88a7ee052b7"
} | {
"account_age_days": 1977,
"account_id": "ACCT-727270703530",
"baseline_risk_score": 0.119,
"kyc_tier": "tier_3",
"session_entropy": 0.52
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 313,
"timestamp": "2026-01-05T02:43:00Z",
"transaction_amount_usd": 18.93
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.455,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 353.31,
"financial_exposure_usd": 541.73,
"recoverable_pct": 0.752
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107460",
"label": "benign",
"label_confidence": 0.681,
"severity": "medium",
"timestamp": "2026-01-06T04:20:00Z",
"trace_id": "b8ab72dc-4acf-954f-e768-bdb976627dfc"
} | {
"account_age_days": 1801,
"account_id": "ACCT-06C1926A10FE",
"baseline_risk_score": 0.063,
"kyc_tier": "tier_2",
"session_entropy": 0.546
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 128,
"timestamp": "2026-01-05T19:44:00Z",
"transaction_amount_usd": 24.73
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.709,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2546.25,
"financial_exposure_usd": 3028.22,
"recoverable_pct": 0.537
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105856",
"label": "fraudulent",
"label_confidence": 0.85,
"severity": "medium",
"timestamp": "2026-01-05T01:36:00Z",
"trace_id": "ac66145f-6032-3c44-0235-30615033dd30"
} | {
"account_age_days": 512,
"account_id": "ACCT-027FFC719437",
"baseline_risk_score": 0.222,
"kyc_tier": "tier_3",
"session_entropy": 0.436
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 1117,
"timestamp": "2026-01-05T01:36:00Z",
"transaction_amount_usd": 1092038.01
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.783,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 6557499.98,
"financial_exposure_usd": 6789886,
"recoverable_pct": 0.679
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108207",
"label": "benign",
"label_confidence": 0.575,
"severity": "low",
"timestamp": "2026-01-06T16:47:00Z",
"trace_id": "21212179-6622-3aac-b31b-070865a3ca32"
} | {
"account_age_days": 670,
"account_id": "ACCT-73843F4698E6",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.296
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 385,
"timestamp": "2026-01-06T07:31:00Z",
"transaction_amount_usd": 19.26
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.621,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1646.18,
"financial_exposure_usd": 2030.5,
"recoverable_pct": 0.426
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109005",
"label": "benign",
"label_confidence": 0.477,
"severity": "low",
"timestamp": "2026-01-07T06:05:00Z",
"trace_id": "e85e181a-45c5-f558-1180-2e46397c7dea"
} | {
"account_age_days": 1449,
"account_id": "ACCT-924D7FEF0E31",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.301
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 1044,
"timestamp": "2026-01-07T06:05:00Z",
"transaction_amount_usd": 160.65
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.511,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 604.11,
"financial_exposure_usd": 1027.04,
"recoverable_pct": 0.827
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107877",
"label": "benign",
"label_confidence": 0.734,
"severity": "medium",
"timestamp": "2026-01-06T11:17:00Z",
"trace_id": "236c8edf-2c90-4a57-4e60-3e9032dcdb6a"
} | {
"account_age_days": 871,
"account_id": "ACCT-DAF56FFA3FCB",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.599
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 109,
"timestamp": "2026-01-06T11:17:00Z",
"transaction_amount_usd": 6778.08
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.467,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2003.92,
"financial_exposure_usd": 4818.24,
"recoverable_pct": 0.572
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105527",
"label": "fraudulent",
"label_confidence": 0.935,
"severity": "high",
"timestamp": "2026-01-04T20:07:00Z",
"trace_id": "2d413df2-0265-55df-c957-7710253e97e0"
} | {
"account_age_days": 541,
"account_id": "ACCT-26F1A981AA9A",
"baseline_risk_score": 0.12,
"kyc_tier": "tier_1",
"session_entropy": 0.104
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 228,
"timestamp": "2026-01-04T11:51:00Z",
"transaction_amount_usd": 5.23
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.933,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4712719,
"financial_exposure_usd": 5127703.55,
"recoverable_pct": 0.986
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101416",
"label": "fraudulent",
"label_confidence": 0.802,
"severity": "high",
"timestamp": "2026-01-01T23:36:00Z",
"trace_id": "a572ed78-2366-34c7-9211-472519a82293"
} | {
"account_age_days": 1650,
"account_id": "ACCT-78BBDB31E8CF",
"baseline_risk_score": 0.458,
"kyc_tier": "tier_2",
"session_entropy": 0.402
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 385,
"timestamp": "2026-01-01T12:01:00Z",
"transaction_amount_usd": 16.42
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.571,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 648852.66,
"financial_exposure_usd": 1033184.21,
"recoverable_pct": 0.241
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100135",
"label": "fraudulent",
"label_confidence": 0.822,
"severity": "low",
"timestamp": "2026-01-01T02:15:00Z",
"trace_id": "bec5715c-a71d-b3a6-2c28-1bbdf45dbd91"
} | {
"account_age_days": 182,
"account_id": "ACCT-34CB7B9A9338",
"baseline_risk_score": 0.429,
"kyc_tier": "tier_3",
"session_entropy": 0.655
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "GB",
"latency_ms": 862,
"timestamp": "2026-01-01T02:15:00Z",
"transaction_amount_usd": 118944.09
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.861,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 412509.37,
"financial_exposure_usd": 915129.33,
"recoverable_pct": 0.106
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107561",
"label": "benign",
"label_confidence": 0.713,
"severity": "low",
"timestamp": "2026-01-06T06:01:00Z",
"trace_id": "d74f43b5-cf3f-dcbf-1bdd-059fdaa275f5"
} | {
"account_age_days": 1332,
"account_id": "ACCT-62DE663F637F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.677
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 824,
"timestamp": "2026-01-06T06:01:00Z",
"transaction_amount_usd": 1018.85
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.633,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2010.87,
"financial_exposure_usd": 3103.49,
"recoverable_pct": 0.998
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105562",
"label": "fraudulent",
"label_confidence": 0.896,
"severity": "critical",
"timestamp": "2026-01-04T20:42:00Z",
"trace_id": "1cc74e92-8a51-9d5a-4c3f-5443d8d3a36f"
} | {
"account_age_days": 563,
"account_id": "ACCT-561DC2FA75EE",
"baseline_risk_score": 0.34,
"kyc_tier": "tier_3",
"session_entropy": 0.637
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 761,
"timestamp": "2026-01-04T20:42:00Z",
"transaction_amount_usd": 538554.59
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.863,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2502778.14,
"financial_exposure_usd": 4667554.37,
"recoverable_pct": 0.444
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100352",
"label": "fraudulent",
"label_confidence": 0.858,
"severity": "critical",
"timestamp": "2026-01-01T05:52:00Z",
"trace_id": "a6d62d00-5690-d9cd-de12-43a588f05a37"
} | {
"account_age_days": 1489,
"account_id": "ACCT-134F86EFF071",
"baseline_risk_score": 0.447,
"kyc_tier": "tier_3",
"session_entropy": 0.452
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 80,
"timestamp": "2026-01-01T03:01:00Z",
"transaction_amount_usd": 14.38
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.923,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 629169.79,
"financial_exposure_usd": 657338.13,
"recoverable_pct": 0.621
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103757",
"label": "fraudulent",
"label_confidence": 0.937,
"severity": "medium",
"timestamp": "2026-01-03T14:37:00Z",
"trace_id": "4046a383-549a-6c89-6b1d-cf91d0efb2a9"
} | {
"account_age_days": 1592,
"account_id": "ACCT-825E7F80A5EF",
"baseline_risk_score": 0.422,
"kyc_tier": "tier_2",
"session_entropy": 0.703
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 370,
"timestamp": "2026-01-03T14:37:00Z",
"transaction_amount_usd": 2110113.59
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.619,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1056442.75,
"financial_exposure_usd": 1999440.13,
"recoverable_pct": 0.842
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106683",
"label": "benign",
"label_confidence": 0.618,
"severity": "medium",
"timestamp": "2026-01-05T15:23:00Z",
"trace_id": "861f3adc-0cd8-31a0-3d80-f05ad2c9c8e0"
} | {
"account_age_days": 1456,
"account_id": "ACCT-F4733A496E86",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.637
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 399,
"timestamp": "2026-01-05T15:23:00Z",
"transaction_amount_usd": 3372.5
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.744,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3148.94,
"financial_exposure_usd": 3288.87,
"recoverable_pct": 0.964
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107569",
"label": "benign",
"label_confidence": 0.603,
"severity": "high",
"timestamp": "2026-01-06T06:09:00Z",
"trace_id": "73cdf237-319c-9d70-0100-a49a250e267b"
} | {
"account_age_days": 43,
"account_id": "ACCT-D02ACFBF32DE",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.829
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 902,
"timestamp": "2026-01-06T06:09:00Z",
"transaction_amount_usd": 12142.39
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.755,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1597.83,
"financial_exposure_usd": 3113.82,
"recoverable_pct": 0.526
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105754",
"label": "fraudulent",
"label_confidence": 0.851,
"severity": "high",
"timestamp": "2026-01-04T23:54:00Z",
"trace_id": "cb5f23af-2da5-e572-3585-b75c938c2948"
} | {
"account_age_days": 71,
"account_id": "ACCT-A4DC4FFBD709",
"baseline_risk_score": 0.394,
"kyc_tier": "tier_1",
"session_entropy": 0.276
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 554,
"timestamp": "2026-01-04T23:54:00Z",
"transaction_amount_usd": 2028592.09
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.502,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4886859.96,
"financial_exposure_usd": 6200538.91,
"recoverable_pct": 0.773
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106526",
"label": "fraudulent",
"label_confidence": 0.609,
"severity": "critical",
"timestamp": "2026-01-05T12:46:00Z",
"trace_id": "ec9c774d-dd87-1b31-f68b-eab9a53017e5"
} | {
"account_age_days": 594,
"account_id": "ACCT-658AB787CFB7",
"baseline_risk_score": 0.053,
"kyc_tier": "tier_3",
"session_entropy": 0.655
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 852,
"timestamp": "2026-01-05T12:46:00Z",
"transaction_amount_usd": 2391551.45
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.462,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1704361.11,
"financial_exposure_usd": 3023828.37,
"recoverable_pct": 0.755
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100150",
"label": "fraudulent",
"label_confidence": 0.966,
"severity": "high",
"timestamp": "2026-01-01T02:30:00Z",
"trace_id": "6808f471-ac87-ae14-f850-5ae9cac19d2e"
} | {
"account_age_days": 1717,
"account_id": "ACCT-FED01FCA1966",
"baseline_risk_score": 0.531,
"kyc_tier": "tier_1",
"session_entropy": 0.174
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 1000,
"timestamp": "2026-01-01T02:30:00Z",
"transaction_amount_usd": 939.39
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.74,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 434140.13,
"financial_exposure_usd": 939280.1,
"recoverable_pct": 0.637
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109326",
"label": "benign",
"label_confidence": 0.476,
"severity": "medium",
"timestamp": "2026-01-07T11:26:00Z",
"trace_id": "5ac86188-2e15-8bce-8b6c-7ed61ecdbac8"
} | {
"account_age_days": 143,
"account_id": "ACCT-93A82EDFFB4A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.836
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 257,
"timestamp": "2026-01-07T08:28:00Z",
"transaction_amount_usd": 12.15
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.647,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 729.37,
"financial_exposure_usd": 1403.45,
"recoverable_pct": 0.761
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108684",
"label": "benign",
"label_confidence": 0.549,
"severity": "low",
"timestamp": "2026-01-07T00:44:00Z",
"trace_id": "a43db9a6-8538-a959-e5f6-1795bf5c26d4"
} | {
"account_age_days": 184,
"account_id": "ACCT-F7F2ED37187E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.521
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 613,
"timestamp": "2026-01-07T00:44:00Z",
"transaction_amount_usd": 11190.6
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.6,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3374.89,
"financial_exposure_usd": 4933.59,
"recoverable_pct": 0.751
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107063",
"label": "benign",
"label_confidence": 0.625,
"severity": "low",
"timestamp": "2026-01-05T21:43:00Z",
"trace_id": "31d79a46-6d21-7db0-47e7-46b12eb1cfa3"
} | {
"account_age_days": 1863,
"account_id": "ACCT-325E0354C539",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.248
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 172,
"timestamp": "2026-01-05T10:29:00Z",
"transaction_amount_usd": 22.82
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.794,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2717.77,
"financial_exposure_usd": 2843.27,
"recoverable_pct": 0.853
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107408",
"label": "benign",
"label_confidence": 0.664,
"severity": "low",
"timestamp": "2026-01-06T03:28:00Z",
"trace_id": "71fef12c-67ba-a94b-01b6-a7f5e3be453e"
} | {
"account_age_days": 1894,
"account_id": "ACCT-0E3C6AD9E6DF",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.717
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 675,
"timestamp": "2026-01-06T03:28:00Z",
"transaction_amount_usd": 4697.79
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.73,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 462.29,
"financial_exposure_usd": 883.1,
"recoverable_pct": 0.952
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103458",
"label": "fraudulent",
"label_confidence": 0.908,
"severity": "critical",
"timestamp": "2026-01-03T09:38:00Z",
"trace_id": "ccfb0e93-3cbe-5613-d08d-3cc3e9a8b493"
} | {
"account_age_days": 512,
"account_id": "ACCT-09C2F1385E96",
"baseline_risk_score": 0.305,
"kyc_tier": "tier_3",
"session_entropy": 0.693
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 244,
"timestamp": "2026-01-03T05:09:00Z",
"transaction_amount_usd": 3.4
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.46,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3823997.26,
"financial_exposure_usd": 5536643.09,
"recoverable_pct": 0.829
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108833",
"label": "benign",
"label_confidence": 0.566,
"severity": "high",
"timestamp": "2026-01-07T03:13:00Z",
"trace_id": "f2b20617-6352-9af6-0b07-1e3db1ac93ed"
} | {
"account_age_days": 1066,
"account_id": "ACCT-2C7AC0C44AD9",
"baseline_risk_score": 0.134,
"kyc_tier": "tier_3",
"session_entropy": 0.458
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 1193,
"timestamp": "2026-01-07T03:13:00Z",
"transaction_amount_usd": 8313.31
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.62,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 1097.11,
"financial_exposure_usd": 1223.61,
"recoverable_pct": 0.442
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105315",
"label": "fraudulent",
"label_confidence": 0.768,
"severity": "high",
"timestamp": "2026-01-04T16:35:00Z",
"trace_id": "03c96291-f7b7-40d5-67b3-b85e3a3492e5"
} | {
"account_age_days": 133,
"account_id": "ACCT-3C920CD48A17",
"baseline_risk_score": 0.217,
"kyc_tier": "tier_2",
"session_entropy": 0.443
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 182,
"timestamp": "2026-01-04T11:43:00Z",
"transaction_amount_usd": 4.27
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.557,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1674439.11,
"financial_exposure_usd": 2057153.07,
"recoverable_pct": 0.743
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100199",
"label": "fraudulent",
"label_confidence": 0.907,
"severity": "critical",
"timestamp": "2026-01-01T03:19:00Z",
"trace_id": "94b59339-84c1-1826-d910-498c2fa17fe6"
} | {
"account_age_days": 1943,
"account_id": "ACCT-46ADDBE7B807",
"baseline_risk_score": 0.309,
"kyc_tier": "tier_3",
"session_entropy": 0.584
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "HK",
"latency_ms": 825,
"timestamp": "2026-01-01T03:19:00Z",
"transaction_amount_usd": 106688.19
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.778,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 195074.95,
"financial_exposure_usd": 296242.28,
"recoverable_pct": 0.65
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102675",
"label": "fraudulent",
"label_confidence": 0.879,
"severity": "high",
"timestamp": "2026-01-02T20:35:00Z",
"trace_id": "e1a4d7bc-29d3-70d8-16eb-818f94720624"
} | {
"account_age_days": 1512,
"account_id": "ACCT-7DE9D221369E",
"baseline_risk_score": 0.492,
"kyc_tier": "tier_1",
"session_entropy": 0.168
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "LU",
"latency_ms": 677,
"timestamp": "2026-01-02T20:35:00Z",
"transaction_amount_usd": 53836.68
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.562,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 526012.41,
"financial_exposure_usd": 726307.41,
"recoverable_pct": 0.805
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101918",
"label": "fraudulent",
"label_confidence": 0.757,
"severity": "high",
"timestamp": "2026-01-02T07:58:00Z",
"trace_id": "6dd0d4d7-12d4-ab70-29d5-9fa82f388288"
} | {
"account_age_days": 858,
"account_id": "ACCT-D69BBBAACF0E",
"baseline_risk_score": 0.447,
"kyc_tier": "tier_3",
"session_entropy": 0.857
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 1001,
"timestamp": "2026-01-02T07:58:00Z",
"transaction_amount_usd": 69709.57
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.943,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 834609.06,
"financial_exposure_usd": 1066149.22,
"recoverable_pct": 0.199
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108897",
"label": "benign",
"label_confidence": 0.735,
"severity": "low",
"timestamp": "2026-01-07T04:17:00Z",
"trace_id": "eb026f34-8045-3d8d-8f69-540bce0bbeff"
} | {
"account_age_days": 605,
"account_id": "ACCT-E0AFC29E6A2F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.132
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 322,
"timestamp": "2026-01-07T02:31:00Z",
"transaction_amount_usd": 7.6
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.692,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1264.39,
"financial_exposure_usd": 1399.86,
"recoverable_pct": 0.581
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107793",
"label": "benign",
"label_confidence": 0.66,
"severity": "high",
"timestamp": "2026-01-06T09:53:00Z",
"trace_id": "c32c7253-31fb-6515-05f0-b1f6beba0cd2"
} | {
"account_age_days": 752,
"account_id": "ACCT-6E9FE6491086",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.462
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 959,
"timestamp": "2026-01-06T09:53:00Z",
"transaction_amount_usd": 3392.65
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.532,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2691.77,
"financial_exposure_usd": 2727.02,
"recoverable_pct": 0.566
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100423",
"label": "fraudulent",
"label_confidence": 0.886,
"severity": "medium",
"timestamp": "2026-01-01T07:03:00Z",
"trace_id": "e4f96eed-d192-dcc4-125e-a338a9c84868"
} | {
"account_age_days": 1497,
"account_id": "ACCT-B76091DFA233",
"baseline_risk_score": 0.41,
"kyc_tier": "tier_2",
"session_entropy": 0.182
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 336,
"timestamp": "2025-12-31T18:46:00Z",
"transaction_amount_usd": 23.56
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.643,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 897105.47,
"financial_exposure_usd": 911214.66,
"recoverable_pct": 0.106
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103716",
"label": "fraudulent",
"label_confidence": 0.864,
"severity": "medium",
"timestamp": "2026-01-03T13:56:00Z",
"trace_id": "eaba0204-179f-c778-e4f3-0c6e6b79aed2"
} | {
"account_age_days": 1132,
"account_id": "ACCT-63E5D58CE791",
"baseline_risk_score": 0.341,
"kyc_tier": "tier_3",
"session_entropy": 0.273
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 1121,
"timestamp": "2026-01-03T13:56:00Z",
"transaction_amount_usd": 442485.64
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.878,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2941816.45,
"financial_exposure_usd": 6112045.33,
"recoverable_pct": 0.765
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103172",
"label": "fraudulent",
"label_confidence": 0.932,
"severity": "medium",
"timestamp": "2026-01-03T04:52:00Z",
"trace_id": "829a4365-b086-6da6-52e8-d5ca84bbebb7"
} | {
"account_age_days": 1785,
"account_id": "ACCT-48A350CD6EB2",
"baseline_risk_score": 0.577,
"kyc_tier": "tier_1",
"session_entropy": 0.361
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "BR",
"latency_ms": 1058,
"timestamp": "2026-01-03T04:52:00Z",
"transaction_amount_usd": 35522.38
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.368,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 375546.29,
"financial_exposure_usd": 930278.18,
"recoverable_pct": 0.311
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104156",
"label": "fraudulent",
"label_confidence": 0.727,
"severity": "medium",
"timestamp": "2026-01-03T21:16:00Z",
"trace_id": "044f951a-9ae4-ef79-ce04-1f5b80fb68a8"
} | {
"account_age_days": 948,
"account_id": "ACCT-8650C01260A2",
"baseline_risk_score": 0.363,
"kyc_tier": "tier_1",
"session_entropy": 0.341
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 160,
"timestamp": "2026-01-03T09:46:00Z",
"transaction_amount_usd": 24.86
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.698,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3822943.61,
"financial_exposure_usd": 4912227.13,
"recoverable_pct": 0.969
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104503",
"label": "fraudulent",
"label_confidence": 0.645,
"severity": "medium",
"timestamp": "2026-01-04T03:03:00Z",
"trace_id": "738b5b08-be97-088a-f517-6ee8208b1d50"
} | {
"account_age_days": 1413,
"account_id": "ACCT-1C101FE5ED81",
"baseline_risk_score": 0.374,
"kyc_tier": "tier_1",
"session_entropy": 0.388
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 570,
"timestamp": "2026-01-04T03:03:00Z",
"transaction_amount_usd": 661596.31
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.728,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3707661.92,
"financial_exposure_usd": 4854764.39,
"recoverable_pct": 0.798
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108128",
"label": "benign",
"label_confidence": 0.722,
"severity": "high",
"timestamp": "2026-01-06T15:28:00Z",
"trace_id": "6c74c4ce-5460-2721-a657-e9b514484eb4"
} | {
"account_age_days": 1815,
"account_id": "ACCT-BDD2750EAFDF",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.592
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 542,
"timestamp": "2026-01-06T15:28:00Z",
"transaction_amount_usd": 5900.89
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.583,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 743.29,
"financial_exposure_usd": 1385.79,
"recoverable_pct": 0.679
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104417",
"label": "fraudulent",
"label_confidence": 0.873,
"severity": "low",
"timestamp": "2026-01-04T01:37:00Z",
"trace_id": "04b4906a-a591-5810-1782-bed08e47e0a5"
} | {
"account_age_days": 1891,
"account_id": "ACCT-C7E12CD540EF",
"baseline_risk_score": 0.44,
"kyc_tier": "tier_2",
"session_entropy": 0.476
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 538,
"timestamp": "2026-01-04T01:37:00Z",
"transaction_amount_usd": 2404093.74
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.92,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2174849.14,
"financial_exposure_usd": 3081414.39,
"recoverable_pct": 0.762
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108800",
"label": "benign",
"label_confidence": 0.665,
"severity": "medium",
"timestamp": "2026-01-07T02:40:00Z",
"trace_id": "8ff8f083-fe22-5da0-ca12-9141d62b2940"
} | {
"account_age_days": 1549,
"account_id": "ACCT-4FF1CC2968DC",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.382
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 81,
"timestamp": "2026-01-07T02:40:00Z",
"transaction_amount_usd": 3861.29
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.791,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 10736.58,
"financial_exposure_usd": 11339.15,
"recoverable_pct": 0.916
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101232",
"label": "fraudulent",
"label_confidence": 0.976,
"severity": "high",
"timestamp": "2026-01-01T20:32:00Z",
"trace_id": "79e5c313-1540-3fc2-f19b-a98d38146caf"
} | {
"account_age_days": 990,
"account_id": "ACCT-F69052AF7BEC",
"baseline_risk_score": 0.468,
"kyc_tier": "tier_1",
"session_entropy": 0.766
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 130,
"timestamp": "2026-01-01T09:02:00Z",
"transaction_amount_usd": 12.13
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.655,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 251503.36,
"financial_exposure_usd": 585239.89,
"recoverable_pct": 0.474
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.