
I remember the first time I got sandwiched. I was aping into a brand-new pump.fun token — some dog coin with a funny ticker that had just crossed 50K market cap. I set my slippage to 15% on Jupiter because the token was moving fast and I didn’t want the transaction to fail. I swapped 2 SOL, expecting roughly 45,000 tokens. I got 31,000. My transaction went through at a price about 30% higher than what I saw on screen. And within the same block, two other transactions — one right before mine and one right after — had eaten the difference. That was my introduction to sandwich attacks on Solana.
If you’ve been trading memecoins for any length of time, there’s a good chance this has happened to you too. Maybe you noticed. Maybe you didn’t. Either way, let me walk you through exactly what’s going on, why Solana memecoins are the perfect hunting ground for these bots, and — most importantly — what you can actually do about it.
What Is MEV and Why Should Memecoin Traders Care?
MEV stands for Maximum Extractable Value. It’s the profit that someone (usually a bot) can make by manipulating the order of transactions within a block. Think of it like this: if a validator or a bot operator can see your pending swap before it gets confirmed, they can rearrange the transaction order to extract money from you.
On Ethereum, MEV has been a known issue for years. On Solana, it was supposed to be different — Solana doesn’t have a traditional mempool where transactions sit waiting. But MEV searchers found workarounds. They partner with validators, use relay infrastructure, and scan incoming transactions at the network edge. The result? Between $370 million and $500 million was extracted from Solana users by sandwich bots over a recent 16-month stretch. That’s not theoretical. That’s real money from real traders’ wallets.
If you’re using a solana memecoin tracker to find early entries on new tokens, you need to understand this threat. Finding the right token is only half the battle — executing the trade without getting robbed is the other half.
How Sandwich Attacks Work: Step by Step
A sandwich attack has three parts. Here’s exactly what happens when you get sandwiched:
Step 1: Detection
A MEV bot monitors the network for incoming swap transactions. It’s looking for trades with high slippage tolerance on low-liquidity tokens — exactly the kind of trades memecoin traders make every day. When it spots your pending transaction to buy Token X, it springs into action.
Step 2: Front-Run (The First Slice of Bread)
The bot submits its own buy order for Token X just before your transaction. Because the token has low liquidity, this purchase pushes the price up. The bot uses Jito bundles or validator relationships to guarantee its transaction lands first.
Step 3: Your Transaction Executes (The Filling)
Your swap now executes at the inflated price. You expected to buy at $0.001 per token, but the bot’s front-run pushed it to $0.0013. You get fewer tokens than you expected, but because your slippage tolerance was set high enough, the transaction still goes through. You’re the meat in the sandwich.
Step 4: Back-Run (The Second Slice)
Immediately after your transaction, the bot sells the tokens it bought in Step 2. Your purchase pushed the price up even further, so the bot sells at a profit. The price drops back down. You’re left holding tokens at an inflated entry price.
| Step | Actor | Action | Effect on Price |
|---|---|---|---|
| 1. Front-run | Bot | Buys token before you | Price increases ↑ |
| 2. Victim trade | You | Your swap executes at inflated price | Price increases further ↑↑ |
| 3. Back-run | Bot | Sells token immediately | Price drops back down ↓ |
| 4. Result | You | Hold tokens bought at the worst price | Instant unrealized loss |
The whole thing happens in a single block — roughly 400 milliseconds on Solana. You never see it coming.
Why Solana Memecoins Are the Perfect Target
Not all trades get sandwiched. Bots go after the most profitable opportunities, and Solana memecoins check every box:
- Ultra-low liquidity: New pump.fun tokens might have only $5K-$50K in their liquidity pool. A small buy can move the price 5-20%. That’s profit margin for bots. If you’re not familiar with how liquidity affects your trades, our guide on what liquidity means in crypto covers this in depth.
- High slippage settings: Traders routinely set 10-20% slippage on new tokens because anything lower causes failed transactions. Bots use that entire slippage window. We’ve written about why slippage matters and how it works — it’s essential reading.
- Speed pressure: When a token is pumping, traders rush to get in. They accept worse execution because they’re afraid of missing the move. This urgency is exactly what bots exploit. There’s always a tension between speed and safety in memecoin trading.
- Volume: Solana processes thousands of memecoin swaps per minute. That’s a massive surface area for MEV extraction.
- Low fees: Solana’s transaction fees are fractions of a cent, so sandwich attacks are profitable even on small trades. Understanding how Solana gas and priority fees work helps you see why this is different from Ethereum.
The Real Cost: How Much Are You Losing?
Let’s do the math on a typical sandwich attack against a memecoin trader:
Say you’re swapping 3 SOL (~$450 at current prices) for a new token with $20K liquidity. You set 12% slippage. A sandwich bot can comfortably extract 5-8% of your trade value. On this single swap, that’s $22-$36 going straight to the bot. If you make 10 trades a day — which isn’t unusual for active memecoin traders — that’s $220-$360 per day. Over a month, you could be losing $6,000-$10,000 to sandwich attacks alone, often without even realizing it.
And here’s the painful part: those losses happen whether the token goes up or down. You can pick the right token, time the entry perfectly, and still lose money because a bot ate your execution.
How to Detect If You’ve Been Sandwiched
Most traders never realize they’ve been attacked. Here’s how to check:
- Compare expected vs. received tokens: If you got significantly fewer tokens than the quote showed, and it wasn’t just normal price movement, you may have been sandwiched.
- Check surrounding transactions: Open your transaction on Solscan or Solana Explorer. Look at the transactions immediately before and after yours in the same block. If you see a buy right before your buy and a sell right after — from the same wallet — that’s a sandwich.
- Look for known bot wallets: Some MEV dashboards track notorious sandwich bot addresses. Cross-reference the wallets that traded around your transaction.
- Check price impact: If the price impact shown on your confirmed transaction is dramatically higher than what the DEX quoted you pre-swap, a front-run likely pushed the price up before your trade executed.
Tools like TokenRadar can help you evaluate tokens before you trade, so you can make more informed decisions about what to buy. But protecting how you buy requires the strategies below.
7 Ways to Protect Yourself from Sandwich Attacks
1. Use Tight Slippage Settings
This is the single most effective defense. If your slippage is set to 1-3%, sandwich bots can only extract 1-3% at most — often making the attack unprofitable after gas costs. Yes, your transactions will fail more often on volatile tokens. That’s the tradeoff. A failed transaction costs you a fraction of a cent on Solana. A successful sandwich costs you dollars or more.
My approach: I start at 1% slippage and only increase if the transaction keeps failing. I’d rather retry 5 times at 1% than succeed once at 15%.
2. Use MEV Protection / Private RPCs
When you submit a transaction through a standard RPC, it’s visible to anyone monitoring the network. Private RPCs and MEV-protection features route your transaction through channels that bots can’t see.
Jupiter and other Solana DEXs now offer built-in MEV protection options. When you toggle this on, your transaction is submitted privately, reducing the chance of being detected by sandwich bots. Always enable this when it’s available.
3. Use Jito Bundles and DontFront
Jito controls the validator infrastructure that processes over 95% of Solana’s stake. Their DontFront feature ensures your transaction must appear at position 0 in any bundle — meaning nothing can be inserted before it. If you’re using a trading bot or custom scripts, implementing Jito bundles is one of the strongest protections available.
For regular traders, the practical version is: use DEX frontends that integrate Jito MEV protection. Jupiter’s swap interface has this built in.
4. Split Large Trades
Sandwich bots target larger trades because the profit is higher. If you’re swapping 10 SOL, consider splitting it into 3-4 smaller transactions. Each smaller trade moves the price less and offers less profit to attackers, making you a less attractive target.
This connects to smart position sizing for memecoins — smaller entries aren’t just good risk management, they’re good MEV defense too.
5. Use Limit Orders Instead of Market Swaps
Market orders are what sandwich bots target. Limit orders specify an exact price you’re willing to pay, leaving no slippage window for bots to exploit. Jupiter and Raydium both support limit orders on Solana. The trade-off is you might not get filled if the token is moving fast, but you’ll never overpay.
6. Trade During Off-Peak Hours
MEV bot activity correlates with overall trading volume. During peak hours (US market open, big token launches), bots are most active and aggressive. Trading during quieter periods can reduce — though not eliminate — your exposure.
7. Use Trading Bots with MEV Protection
Many Solana trading bots (Photon, BonkBot, Trojan, Axiom) now include MEV protection features. They route transactions through private channels and use Jito bundles by default. If you’re using a bot, make sure MEV protection is turned on. Check our comparison of trading bots vs. manual trading on Solana for more details.
Protection Strategies Compared
| Strategy | Effectiveness | Difficulty | Trade-off |
|---|---|---|---|
| Low slippage (1-3%) | High | Easy | More failed transactions |
| MEV protection toggle | High | Easy | Slightly slower confirmation |
| Jito DontFront | Very High | Technical | Requires Jito tip (small SOL fee) |
| Splitting trades | Medium | Easy | More transactions to manage |
| Limit orders | Very High | Easy | May not fill on fast movers |
| Trading bots w/ MEV protection | High | Medium | Bot fees, trust in third-party |
| Off-peak trading | Low-Medium | Easy | Miss time-sensitive opportunities |
Tools That Help You Trade Safer
Beyond execution strategies, using the right tools to research tokens before you trade is critical. If you’re chasing low-liquidity tokens with no safety analysis, you’re setting yourself up as a perfect sandwich target.
- TokenRadar — A solana token scanner that shows you real-time data on new tokens, including liquidity depth, holder distribution, and safety scores. Knowing a token’s liquidity before you trade helps you set appropriate slippage and position size. Our liquidity pools guide explains why this matters.
- Jupiter Swap — Use the built-in MEV protection and set custom slippage per trade.
- Jito MEV Dashboard — Monitor sandwich bot activity across the network.
- Solscan / Solana FM — Inspect your transactions to detect sandwich patterns after the fact.
- RugCheck — Evaluate token contract safety before trading. TokenRadar integrates RugCheck scores directly into the memecoin screener so you don’t have to check manually.
The Bigger Picture: Is Solana Doing Anything About This?
Yes, actually. The Solana Foundation has taken steps against malicious validators who facilitate sandwich attacks. In 2024, they removed several validators from their delegation program for enabling MEV exploitation. Jito’s infrastructure has evolved with features like DontFront specifically designed to prevent front-running. And DEX aggregators are increasingly making MEV protection a default setting rather than an opt-in feature.
But here’s the honest truth: sandwich attacks aren’t going away completely. As long as there’s profit in transaction ordering, someone will find a way. The best you can do is make yourself a hard target.
My Personal Checklist Before Every Memecoin Swap
- Check the token on TokenRadar — liquidity, holders, safety score
- Set slippage to 1-3% (increase only if absolutely necessary)
- Enable MEV protection on Jupiter or my trading bot
- If trading more than 5 SOL, split into smaller orders
- Verify the transaction after — did I get close to the quoted amount?
- If the network is congested, use priority fees instead of raising slippage
It takes 30 extra seconds. It saves real money.
Final Thoughts
Sandwich attacks are one of those things that separate traders who survive in the memecoin space from those who slowly bleed out without understanding why. You can have the best token picks, the fastest alerts, the sharpest instincts — and still lose thousands if your execution is sloppy.
The good news is that protection is getting easier. MEV protection toggles, Jito bundles, and smarter DEX interfaces are making it harder for bots to extract value from informed traders. But you have to actually use these tools. Default settings are not your friend.
Use a real-time token scanner to find the right tokens. Use the strategies above to execute your trades safely. And always, always check your slippage settings before you hit swap.
Stay sharp out there.