Solana Bot Rakes in $30M from MEV Arbitrage in Just 2 Months!

Last Updated on June 17, 2024

Victor Headshot
Written by
Illustrative photo for news about Solana (SOL). Source: photo_gonzo - stock.adobe.com

Key Takeaways:

  • Solana-based MEV sandwich bot “arsc” has amassed approximately $30 million in the last two months.
  • The bot uses three main wallets: one for cold storage with $19 million, one active in DeFi with $9.9 million, and one for conducting attacks.
  • The operator of “arsc” employs measures to remain low-profile and obscure their activities and profits.

MRGN Research’s Ben Coverston has highlighted the activities of a Solana-based MEV sandwich bot named “arsc,” which has amassed around $30 million through MEV attacks in the past two months.

These attacks involve sandwiching a victim’s transaction between two of the attacker’s transactions to manipulate prices and profit.

Coverston points out that arsc has intentionally kept a low profile.

One of arsc’s major wallets, primarily for cold storage, holds over $19 million, including $17 million in Solana (SOL) and $1.1 million in USD Coin (USDC).

Another active wallet, involved in decentralized finance activities, holds over $9.9 million, mostly in non-SOL tokens.

A third wallet, used for conducting the sandwich attacks, holds significant SOL positions.

Overall, these three wallets hold nearly $30 million.

Coverston notes that the operator behind arsc seems to be avoiding attention and has taken measures to obscure their activities and profits.

MEV sandwich bots are also prevalent on Ethereum, having extracted over $1.38 billion from users by April 2023.

About The Author

Victor Headshot
Written by

News Reporter

Victor Fawole, a seasoned Web3 content creator and social media influencer, excels in bringing the pulse of the crypto world to our readers.

With a keen eye for emerging trends and a talent for engaging storytelling, Victor’s articles offer a fresh perspective on the ever-evolving digital currency landscape.

Check Victor out on: