Untitled
  • Finder
  • Using a bot
    • Initial configuration of the Finder
    • Procedure CEX -> DEX
  • Procedure DEX -> CEX
  • Useful tips
    • Flip instead of arbitrage
    • Lifechange arbitrage
    • Contract review
    • Arbitrage under Mexc
  • List of basic DEXs
  • List of major CEXs
  • Major cryptocurrency wallets
  • MEV protection
  • Bots for trading
  • FAQ
    • How do I buy a subscription for USDT?
    • Description of signals
    • What tokens are supported?
    • What networks are supported?
    • How does the bot count spreads?
Powered by GitBook
On this page

MEV protection

PreviousMajor cryptocurrency walletsNextBots for trading

Last updated 2 months ago

MEV defense

An example of MEV is the so-called “sandwich attack”: when a MEV bot sees your purchase of an asset with slippage in the mempool and realizes that its price will rise, it can react by buying the asset in the same block before the price increase. The bot then instantly sells the asset after the increase, capitalizing on the difference. As a result, you end up buying the asset at a less favorable price than expected.

To protect against such attacks, you can install a custom RPC in your wallet. This allows you to send transactions bypassing the public mempool, making it difficult for MEV bots to track and intervene.

ETH:

Here you can check if you have been victimized by MEV bots (just enter your wallet address):

https://www.mevscanner.com/?utm_source=cow.fi&utm_medium=web&utm_content=mev-blocker-mev-scanner-link
https://cow.fi/mev-blocker#rpc