MEV protection
Last updated
Last updated
An example of MEV is the so-called “sandwich attack”: when a MEV bot sees your purchase of an asset with slippage in the mempool and realizes that its price will rise, it can react by buying the asset in the same block before the price increase. The bot then instantly sells the asset after the increase, capitalizing on the difference. As a result, you end up buying the asset at a less favorable price than expected.
To protect against such attacks, you can install a custom RPC in your wallet. This allows you to send transactions bypassing the public mempool, making it difficult for MEV bots to track and intervene.
ETH:
Here you can check if you have been victimized by MEV bots (just enter your wallet address):