# Attacker detail

**Attacker** detail page focuses on the behavior of a particular Sandwich MEV attacker. Like all the other pages, all the data here are filtered by the chosen time duration, except the **Real-time Attack**.

![](/files/ixIWmJfv8EEjDPInnHGw)

**Summary** shows the profit, cost, revenue, and the number of attacks this attacker finished. You would find them helpful if you are a researcher.&#x20;

![](/files/SVvZS9WYUX8lw4AoOkgS)

**Attack Behavior** figure displays the daily profit and sandwich MEV count by this attacker.&#x20;

![](/files/hcS1RtmZv70YfQU11iaC)

**Profit Distribution** illustrates the attacker's performance in another way. In the figure below, this attacker had one MEV losing $235.42.&#x20;

![](/files/F0BqFvRxvBx5iZRTQktt)

**Latest Attack** lists the sandwich MEVs done by this attacker with profit, cost, and revenue. Click the hash address to examine the [token flow of the sandwich attack](/arbitrage-scan-user-guide/home/universal-search/transaction-profile/liquidation-transaction.md). You can retrospect the old Sandwich MEVs by using the date and the time period selector.&#x20;

![](/files/BzJR5hk4qDAXWPqU5JYS)

**Leaderboard** enumerates the top 10 attacks using this contract, ranked by profit, and the top 10 victims who suffered from attacks using this contract, ranked by their losses.&#x20;

Click the data row in the **Attack** tab, and you will be directed to the [details of the Sandwich arbitrage](/arbitrage-scan-user-guide/home/universal-search/transaction-profile/liquidation-transaction.md). You can also sort them using profit, cost, and revenue.&#x20;

![](/files/WP5Q5Nhpo4DmgZdXLDF7)

The **Victim** tab's data can be sorted by their losses and the count of attacks. A click on the victim address will bring you to the [Victim detail](/arbitrage-scan-user-guide/sandwich/victim-detail.md) page.&#x20;

![](/files/BLyj0g95e9zidSIZaBLh)


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://eigenphi-1.gitbook.io/arbitrage-scan-user-guide/sandwich/attacker-detail.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
