How to Detect MEV in Your Trades 2026: A Practical Guide
**Answer first** — To detect MEV against your own trades in 2026, follow a four-step forensic process: **(1) pull the transaction receipt** and identify the block; **(2) inspect ad

Answer first — To detect MEV against your own trades in 2026, follow a four-step forensic process: (1) pull the transaction receipt and identify the block; (2) inspect adjacent transactions in the same block for matching pool / matching tokens; (3) compare your effective price to the pool's pre-trade quote; (4) attribute the slippage to MEV (sandwich/back-run) vs natural price impact vs ordering luck. The tools that make this fast: EigenPhi, MEV-Inspect-py, Etherscan's MEV labels, and Libmev. For Solana, Eclipse and Jito-Explorer give equivalent visibility. Most retail traders discover they're being sandwiched on 5–20% of their swaps once they actually look.
Why Bother Detecting
Three reasons:
- Routing changes. If you discover Aggregator A leaks 12 bps per swap on average and Aggregator B leaks 3 bps, you switch.
- Behavioral changes. If you're being sandwiched mostly on trades > $5,000, you split orders or use a private mempool.
- Real loss accounting. MEV is a real, quantifiable trading cost. Most people underestimate it because they never measure it. Measuring forces honest book-keeping.
Step 1: Pull The Transaction Receipt
Find your trade's transaction hash. From the receipt, you need:
- The block number
- The transaction index within the block (your position in the ordering)
- The pool address you swapped against
- The token amounts you swapped (in and out, both raw and human-readable)
- The gas paid and the priority fee paid
On Etherscan, all of this is on the transaction detail page. For programmatic analysis, eth_getTransactionByHash + eth_getTransactionReceipt give you the same data.
Step 2: Inspect Adjacent Transactions
Look at the transactions in the same block, ordered by index. Two patterns indicate MEV:
Pattern A: Sandwich (Front-Run / Back-Run)
If you see:
- Transaction (your index - 1): A swap on the same pool in the same direction as yours (e.g. buying the same token you're buying)
- Transaction (your index + 1): A swap on the same pool in the opposite direction (selling what you bought)
That's a classic sandwich. The front-run pushed the price up before your fill, your trade filled at the worse price, and the back-run captured the imbalance.
Pattern B: Back-Run (No Front-Run)
If you see:
- No matching front-run in the prior index
- Transaction (your index + 1): A swap on the same pool immediately after yours, in the opposite direction
That's a pure back-run — the searcher saw your trade hit the pool and arbed the resulting imbalance against another venue. Less damaging to you (the back-run doesn't change your fill price), but it indicates your trade was "visible" in the mempool.
Pattern C: JIT Liquidity
If between your transaction and the block's surrounding transactions, you see an IncreaseLiquidity then a DecreaseLiquidity on the same pool with very small intervening swap count — that's JIT (just-in-time) liquidity. A searcher added liquidity, captured your trade's fee, and removed liquidity. This isn't sandwich — it's the searcher capturing the LP fee from your swap.
Step 3: Compare Effective Price To Pool Quote
Independent of the pattern detection, do a price comparison:
- Note the pool reserves (or tick state for V3) at the start of the block — query at block (N - 1)
- Compute the expected output of your trade against those reserves:
amount_out = AMM_math(reserves, amount_in) - Compare to your actual output from the receipt
If your actual output is less than ~99.5% of expected for a small trade in a deep pool, something captured value. For larger trades or shallower pools, the natural price-impact tolerance widens — you have to subtract the expected price impact before attributing the residual to MEV.
A back-of-envelope formula:
mev_loss_bps = (expected_output - actual_output) / expected_output * 10000 - expected_price_impact_bps
If mev_loss_bps > 5–10 and you can match the front-run/back-run pattern in step 2, you've been sandwiched.
Step 4: Attribute The Slippage
Not all slippage is MEV. Three categories:
| Source | Detection |
|---|---|
| Natural price impact | Predicted by AMM math from your trade size; subtract from observed slippage |
| Other-trade ordering | Another (non-malicious) user filled before you and moved the price |
| MEV (sandwich / back-run / JIT) | Matches the patterns in step 2 |
Most real-world slippage on retail swaps in 2026 is a mix of all three. The MEV component is typically 3–25 bps for small public-mempool swaps, larger for big swaps and long-tail tokens. See How to Avoid Sandwich Attacks 2026 for what to do about it once you've detected it.
Tools That Do The Heavy Lifting
You don't have to do this manually for every trade. The 2026 toolset:
EigenPhi
Best-in-class MEV analytics. Paste a transaction hash and get a labeled breakdown — sandwich front-run, victim, back-run, profit captured. Works for Ethereum mainnet, several L2s, and BNB Chain.
MEV-Inspect-py (Flashbots)
Open-source library that classifies MEV-extraction patterns from block data. Best for running your own analysis on your trading history. Requires a full node or an archive RPC.
Etherscan's MEV labels
Etherscan tags known MEV bot addresses and shows MEV-extracted value in the block detail view. Quick and accessible, less precise than dedicated tools.
Libmev
Open-source library and dashboard. Good for self-hosted analysts who want a Web UI without paying for EigenPhi's enterprise tier.
Solana-specific: Jito-Explorer + Eclipse
For Solana trades, Jito's bundle explorer shows tipped transactions and bundle composition. Eclipse offers MEV analytics with sandwich detection on major DEX programs.
Quick-Look Workflow
A 5-minute workflow for retail users to check a recent trade:
- Copy your transaction hash
- Paste into EigenPhi (free tier covers most retail-size trades)
- Look at the "Victim Loss" field — that's your MEV cost in USD
- If significant, check whether the trade went through a public mempool. If yes, your routing leaked.
If you don't trust third-party tools and want to verify yourself, the four-step process above takes 15–30 minutes per trade using only Etherscan + a calculator.
What Detection Tells You About Routing
Patterns you'll see repeatedly once you start measuring:
- Public-mempool swaps on long-tail tokens: MEV leakage ranges 15–80 bps. Routing through aggregators with private orderflow (1inch Fusion, CoW, Paraswap Delta) typically cuts this to <3 bps.
- Large swaps on blue-chip pairs: Even on major pairs, swaps above ~$50k consistently leak 5–20 bps to back-running. Splitting the order across blocks reduces leakage roughly linearly.
- Small swaps: For < $500 trades, gas costs dominate and the absolute MEV loss is usually < $0.50. Not worth obsessing about; not worth using maximum-protection routing either.
See DEX Aggregator MEV 2026 for the aggregator-specific leakage breakdown.
Detecting Sniper-Bot Front-Running
A related detection pattern: if you're trying to snipe new memecoin launches and your fills always come at noticeably worse prices than the launch transaction, you're being out-bid in the priority-fee competition. To verify:
- Find the launch transaction (pool creation)
- Check the first 20 swap transactions on that pool
- See where your transaction ranks
- Compare your fill price to transactions before yours
If you're consistently 5+ transactions deep, your priority-fee strategy is uncompetitive against sniper bots. Tune up your priority fee or accept the slower fills.
What To Do With The Data
Three actionable responses to MEV detection:
Action 1: Change Routing
If your detection shows consistent leakage above 10 bps, switch to a private-orderflow aggregator (1inch Fusion, CoW, Paraswap Delta) or to a direct submission through a private relay.
Action 2: Use Private Mempool
For sniper-style trades where you control your own bot, submit through Flashbots Protect, MEV-Share, or your chain's equivalent. Routes that don't touch public mempool can't be sandwiched.
Action 3: Split And Time Trades
For large trades, split into chunks below the threshold where MEV becomes cost-effective for searchers (typically ~$5,000-$10,000 chunks on mainnet, smaller on L2s).
See How to Avoid Sandwich Attacks 2026 for the full mitigation playbook.
What FRB Agent Provides
FRB Agent doesn't sit between users and the chain — it executes trades on the user's behalf. The detection tools above are post-trade forensics; FRB Agent's job is pre-trade prevention. The agent ships with:
- Default routing through private orderflow on supported chains (Flashbots on mainnet, MEV-Share where active, Jito bundles on Solana)
- Slippage caps per trade to abort if expected MEV exceeds threshold
- Per-trade logging so the user can audit their own execution post-hoc using the tools above
The agent isn't a substitute for periodic auditing of your own trade history. Even with private orderflow, edge cases exist. Detecting MEV in your trades is a habit, not a one-time check.
Bottom Line
If you've never measured MEV against your own trades, you're almost certainly losing more than you think. The tools take 5 minutes to learn and minutes per trade to use. Most retail traders cut their MEV exposure by 60–90% within a month of starting to measure — the act of looking changes the routing decisions.
Further Reading
Step after reading
Launch FRB dashboard
Connect your wallet, pair the node client with a 6-character PIN, and assign the contract mentioned above.
Need the signed build?
Download & verify FRB
Grab the latest installer, compare SHA‑256 to Releases, then follow the Safe start checklist.
Check Releases & SHA‑256Related Articles
Further reading & tools
Discussion
No notes yet. Add the first observation, or share the link with your team on X (@MCFRB).