The dex.sandwiches
table captures detailed data on the outer trades of sandwich attacks in decentralized exchanges (DEXs), recording front-running and back-running trades across various EVM networks.
dex.sandwiches
table captures detailed data on the outer trades of sandwich attacks executed via decentralized exchanges (DEXs). This table records the trades that constitute the “bread” of the sandwich attack, which can include both front-running and back-running trades, as well as more complex patterns. It provides a comprehensive view of sandwich attack patterns across various EVM networks.
dex.sandwiches
table provides an in-depth view of the outer trades in sandwich attacks on decentralized exchanges. A sandwich attack typically occurs when a searcher spots a pending transaction in the mempool, quickly executes a trade before it (front-running), and then immediately after it (back-running) to profit from the price movement caused by the victim’s trade.
However, this table also captures more complex sandwich attack patterns. For example:
bot1: ETH>USDC
victim1: USDC>ETH
bot1: USDC>ETH
victim2: ETH>USDC
bot1: ETH>USDC
In this scenario, the bot executes trades on both sides of the liquidity pool, sandwiching multiple victim trades in a single sequence.
This table includes entries for all bot trades involved in these attack patterns.
Note that the victim trades sandwiched between these outer trades are captured in a separate table, dex.sandwiched
.
This detailed approach allows for granular analysis of sandwich attack patterns, enabling users to:
dex.sandwiches
table supports advanced analytics and research into DEX trading behavior, market manipulation, and potential areas for improved trade execution or protocol design.
dex.sandwiched
: This complementary table captures the victim trades that are sandwiched between the trades recorded in dex.sandwiches
.dex.trades
: This table captures all trades and is the basis for the dex.sandwiches
table.