File size: 8,158 Bytes
7fc0764
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
---
license: cc-by-4.0
task_categories:
  - tabular-classification
  - tabular-regression
  - time-series-forecasting
language:
  - en
tags:
  - synthetic
  - finance
  - fraud-detection
  - aml
  - anti-money-laundering
  - anomaly-detection
  - transaction-monitoring
  - fintech
  - banking
  - crypto
  - market-manipulation
  - account-takeover
  - false-positive-reduction
pretty_name: Aestrea Dark Pool Financial Anomaly Pack
size_categories:
  - 10K<n<100K
configs:
  - config_name: default
    data_files:
      - split: train
        path: dark_pool_sample.parquet
---

# Aestrea Dark Pool Financial Anomaly Pack (Sample)

**A synthetic financial-anomaly and fraud-detection dataset for AML / transaction-monitoring model training, false-positive reduction research, and fintech anomaly-detection pipelines.** Each row is a complete financial activity sequence — a dormant warm-up period followed by a sudden activity burst — labeled as account takeover, market-manipulation spoofing, or legitimate-but-high-risk (false positive) behavior, with telemetry, identity context, detection logic, and financial exposure.

Built by [SolsticeAI](https://www.solsticestudio.ai/datasets) as a free sample of a larger commercial pack. 100% synthetic. No real transactions, accounts, addresses, order books, or customer data.

## What is included

| File | Rows | Format | Purpose |
|---|---:|---|---|
| `dark_pool_sample.parquet` | 10,000 | Parquet | Columnar, typed, best for analytics |
| `dark_pool_sample.jsonl` | 10,000 | JSON Lines | Streaming / LLM training friendly |

**This sample:** 10,000 financial activity sequences, stratified 3,333 per fraud class.  
**Fraud classes (3):** `Account_Takeover_Sequence`, `Market_Manipulation_Spoofing`, `Legitimate_High_Risk_Activity` (false positive)  
**Label distribution:** ~6,666 `fraudulent` / ~3,334 `benign` (by design — one of three scenarios is a benign high-risk lookalike)  
**Severity tiers:** `low`, `medium`, `high`, `critical` — scenario-weighted so spoofing skews mid, ATO skews high, false-positives skew low  
**Assets covered:** BTC, ETH, USDC, USDT, SOL, USD, EUR, GBP, JPY  
**Geographic coverage:** 20 country codes across high-risk and low-risk jurisdictions

## Record structure

Each record is one financial activity sequence with 7 top-level fields:

| Field | Type | Contents |
|---|---|---|
| `schema_version` | string | Pack schema version (`1.0.0-dark-pool-sample`) |
| `event` | struct | `id`, `trace_id`, `timestamp`, `severity`, `label`, `label_confidence` |
| `identity_context` | struct | `account_id`, `baseline_risk_score`, `session_entropy`, `account_age_days`, `kyc_tier` |
| `telemetry_stream` | list<struct> | Ordered financial events: `timestamp`, `event_name` (e.g., `LARGE_WITHDRAWAL`, `LIMIT_ORDER_CANCELLED`, `LOGIN_NEW_COUNTRY`), `asset`, `transaction_amount_usd`, `geo_country`, `latency_ms`, `burst_indicator` |
| `vulnerability` | struct | `fraud_class`, `scenario_description`, `exposure_vector` |
| `detection` | struct | `anomaly_type`, `baseline_deviation`, `detection_logic` (SQL-like), `anomaly_score`, `confidence_band` |
| `impact` | struct | `financial_exposure_usd`, `customer_funds_at_risk_usd`, `recoverable_pct` |
| `simulation` | struct | `synthetic`, `engine`, `chaos_profile`, `ground_truth_classification` |

See [SCHEMA.md](./SCHEMA.md) for the full nested field breakdown.

## Why this dataset is useful

Most public financial-fraud datasets are either flat tabular snapshots (IEEE-CIS, credit-card fraud) or narrow single-event labels. Real AML / transaction-monitoring models need something these don't provide: **sequences** (warm-up → burst), **ambiguous labels** (legitimate-but-high-risk that looks like fraud), and **detection logic grounded in behavioral patterns** rather than just feature engineering.

- Full pre-event dormant and check-in telemetry — not just the burst
- `burst_indicator` flags at each step so models can learn temporal dynamics explicitly
- A dedicated false-positive class (`Legitimate_High_Risk_Activity`) with benign ground truth but fraud-adjacent behavior — the exact class that drives real-world FP rates
- Per-record `detection_logic` in SQL-like form shows how the scenario would be detected in production
- Per-record `anomaly_score` and `label_confidence` so models can train on calibration targets, not just hard labels
- Cross-asset (crypto + fiat), cross-geography coverage

## Typical use cases

- Fraud-detection model training
- AML / transaction-monitoring pipelines
- False-positive-reduction research (reducing customer-experience pain)
- Risk-scoring systems
- Account-takeover detection
- Spoofing / market-manipulation classifiers
- Temporal-burst anomaly detection
- LLM fine-tuning on fraud-investigation narratives
- Benchmarking anomaly scoring against ambiguous ground truth

## Quick start

```python
import pandas as pd
import pyarrow.parquet as pq

df = pq.read_table("dark_pool_sample.parquet").to_pandas()

# Label distribution (mix of fraudulent and benign)
print(df["event"].apply(lambda e: e["label"]).value_counts())

# Average financial exposure by fraud class
df["cls"] = df["vulnerability"].apply(lambda v: v["fraud_class"])
df["exposure"] = df["impact"].apply(lambda i: i["financial_exposure_usd"])
print(df.groupby("cls")["exposure"].mean().round(0))

# Burst density by scenario (bursts per sequence)
df["burst_count"] = df["telemetry_stream"].apply(
    lambda s: sum(1 for step in s if step["burst_indicator"])
)
print(df.groupby("cls")["burst_count"].mean().round(2))

# False-positive rate signal — proportion of fraudulent-label vs benign per severity
df["severity"] = df["event"].apply(lambda e: e["severity"])
df["label"] = df["event"].apply(lambda e: e["label"])
print(pd.crosstab(df["severity"], df["label"], normalize="index").round(3))
```

Streaming form:

```python
import json

with open("dark_pool_sample.jsonl") as f:
    for line in f:
        sequence = json.loads(line)
        # one financial activity sequence per line
```

## Responsible use

This dataset is intended for **defensive / monitoring** use cases: fraud-detection model training, AML research, false-positive reduction, and academic benchmarks. It contains synthesized transaction amounts, synthetic account IDs, and fictional scenario narratives — it does **not** contain real customer data, real transactions, real wallet addresses, or any PII. Models trained on this data will learn fraud-pattern shape and temporal dynamics; downstream deployment for live transaction monitoring requires calibration against institution-specific real-world data under appropriate compliance review.

## License

Released under **CC BY 4.0**. Use freely for research, fraud-tool prototyping, education, and commercial development with attribution.

## Get the full pack

This Hugging Face repo is a **10K-sequence sample**. The production pack scales to 5M+ sequences with expanded scenario coverage (layering, smurfing, wash trading, sanctions-evasion routing, trade-based ML, bust-out fraud), additional asset classes (equities, FX, derivatives, NFTs), multi-entity transaction graphs, richer ambiguous-label distribution tuning, parquet + JSONL + SAR-narrative-aligned delivery, and buyer-specific variants.

**Self-serve (Stripe checkout):**
- [**Sample Scale tier — $5,000**](https://buy.stripe.com/7sY5kD2j85QTfSb5lfeEo03) — ~25K records, one subject, 72-hour delivery.

**Full pack + enterprise scope:**
- [www.solsticestudio.ai/datasets](https://www.solsticestudio.ai/datasets) — per-SKU pricing across Starter / Professional / Enterprise tiers, plus commercial licensing, custom generation, and buyer-specific variants.

**Procurement catalog:**
- [SolsticeAI Data Storefront](https://solsticeai.mydatastorefront.com) — available via Datarade / Monda.

## Citation

```bibtex
@dataset{solstice_dark_pool_pack_2026,
  title        = {Aestrea Dark Pool Financial Anomaly Pack (Sample)},
  author       = {SolsticeAI},
  year         = {2026},
  publisher    = {Hugging Face},
  url          = {https://huggingface.co/datasets/solsticestudioai/dark-pool-pack}
}
```