Vitalik Buterin Transaction Targeted by MEV Sandwich Bot

2049.news · 08.05.2026, 10:45:01

Vitalik Buterin Transaction Targeted by MEV Sandwich Bot


Users observed that an Ethereum transaction from Vitalik Buterin was sandwiched by the MEV bot Jaredfromsubway.eth, yielding profit in the public mempool.

What happened

Observers reported that the bot inserted two trades around Buterin's swap, executing a buy then a sell to capture price movement.

The target transaction was enclosed between those operations, and the bot profited from the temporary slippage created during the swap.

How sandwich attacks work

Sandwich attacks are a form of MEV exploitation that manipulates transaction ordering to realize small arbitrage profits regularly.

Bots monitor the public mempool for pending swaps, then front-run and back-run the target trade to extract value from slippage directly.

What this means for users

Even high-profile wallet holders like Vitalik Buterin can be affected, highlighting the limits of privacy and timing protections on-chain in practice.

Users and developers rely on mitigations such as private transaction relays, gas-price strategies, and MEV-aware infrastructure to reduce these risks effectively.

Broader context

Researchers and protocol teams continue studying MEV dynamics to design mechanisms that limit extractable value without undermining core blockchain properties today.

The incident involving Jaredfromsubway.eth and Buterin's transaction serves as a practical example of ongoing MEV pressure in active smart contract ecosystems.

On-chain transparency enables detection of sandwiching, but effective prevention requires coordinated protocol-level changes and improved transaction privacy techniques and broader adoption.


Related posts

TrustedVolumes hacked, attacker stole $6 mln in crypto
KelpDAO $293 Million Exploit: Attacker Lost Funds After Liquidation
Scroll down to load next post