Summary of Main Points:
- MEV sandwich bot “arsc” accumulated $30 million through attacks on Solana users
- The bot operates from wallet addresses to protect its funds
- Another active wallet converts SOL to USDC via Dollar-Cost Averaging (DCA)
- MEV bot activity is also observed on Ethereum, with significant profits reported
- Regulatory bodies like ESMA are investigating MEV as potential market abuse
Exploits of MEV Sandwich Bot “arsc” on Solana
The infamous MEV sandwich bot “arsc” reaped around $30 million in profits by exploiting Solana users through MEV attacks. These attacks involve manipulating prices to purchase tokens at lower prices and quickly selling them for a profit.
Activity of Wallet Addresses and Conversion to USDC
Wallet addresses like “9973h…zyWp6” and “Ai4zq…VXKKT” play a significant role in storing and managing funds, with one actively converting SOL to USDC through Dollar-Cost Averaging. These wallets hold various tokens, showcasing the operator’s strategic financial moves.
MEV Bot Operations on Ethereum and Regulatory Scrutiny
MEV bots are not limited to Solana, as Ethereum has also experienced similar activities. Profits like $1.8 million from single transaction bundles have raised concerns among regulatory bodies like ESMA, prompting investigations into possible market abuse related to MEV practices.