Skip to main content
POST
/
mev
/
check-attacker
Profile a Sandwich Attacker
curl --request POST \
  --url https://api.soltop.sh/mev/check-attacker \
  --header 'Authorization: Bearer <token>' \
  --header 'Content-Type: application/json' \
  --data '
{
  "attacker_address": "DDm1Bc9KuXB7Q2UbxyMRLGmbcV2J93xmiWDPt7Edhqbs",
  "victim_address": "8ENw3qJSzWGUV31BW5u2YEmsyp9XKjH1FxuwLhhwwMe2",
  "time_range_days": 1,
  "slot_window": 4
}
'
{ "success": true, "jobId": "<string>", "status": "queued", "message": "<string>" }

Authorizations

Authorization
string
header
required

Supabase JWT authentication. Used for MEV Analysis and Write Locks endpoints. Requires an active subscription (trial, active, or grace_period status).

Body

application/json
attacker_address
string
required

Attacker wallet address (from check-wallet results)

Example:

"DDm1Bc9KuXB7Q2UbxyMRLGmbcV2J93xmiWDPt7Edhqbs"

victim_address
string
required

Victim wallet address

Example:

"8ENw3qJSzWGUV31BW5u2YEmsyp9XKjH1FxuwLhhwwMe2"

time_range_days
integer
default:1

Number of days to analyze

Required range: 1 <= x <= 4
slot_window
integer
default:4

Slot window (±) for detection

Required range: 0 <= x <= 10

Response

Job submitted or cached result returned

Job queued

success
boolean
Example:

true

jobId
string
status
string
Example:

"queued"

message
string