x402basequality 0.82

Detect early token buyers, bot activity, and sniper wallets with AI-powered on-chain analysis.

Price
1.00 USDC / call
Protocol
x402
Verified
no

What it does

This endpoint from Einstein AI analyzes early token purchase patterns to identify bot activity and sniper wallets for any ERC-20 token. It queries Bitquery on-chain data across Ethereum, Base, BSC, Arbitrum, and Polygon, then layers AI-generated analysis on top of the raw results. You provide a token contract address and optional chain parameter, and receive structured data about the earliest buyers along with an AI interpretation highlighting suspicious patterns.

The endpoint is part of Einstein AI's broader x402-enabled blockchain intelligence suite, which includes 20+ endpoints covering market data, whale tracking, launchpad monitoring, security audits, and DeFi analytics. All endpoints accept payment via the x402 protocol — no API keys required. This specific endpoint costs $1.00 per request, payable in USDC on Base, USDC on Solana, or 1,309 sats via Lightning Network. The payment is settled atomically: you include a signed payment authorization in the X-PAYMENT header, and the endpoint processes both payment and query in a single round-trip.

Supported chains are ethereum, base (default), bsc, arbitrum, and polygon. The required parameter is `tokenAddress` (the token contract address to analyze). Optional parameters include `chain` and `limit` (max 500 results, default varies). Responses include a `status` field, raw `result` data, an AI `analysis` object with insights, and a `payment` receipt with on-chain transaction hash.

Capabilities

token-sniping-detectionbot-detectionearly-buyer-analysismulti-chain-evmai-analysisx402-paymentusdc-baseusdc-solanalightning-networkbitquery-data

Use cases

  • Audit a newly launched token to see if bots or snipers dominated early buying
  • Evaluate token fairness by checking how many early buyers were automated
  • Screen tokens before investing to identify coordinated sniper activity
  • Monitor your own token launch for bot interference
  • Research MEV-adjacent sniper behavior across EVM chains

Fit

Best for

  • DeFi researchers analyzing token launch fairness
  • Token creators auditing their launch for bot activity
  • AI agents performing automated token security screening
  • Traders evaluating whether early accumulation was organic

Not for

  • Real-time trade execution or sniping (this is analysis only)
  • Non-EVM chains beyond the supported set (no Solana token analysis despite Solana payment support)
  • Free or high-volume bulk scanning (each call costs $1.00)

Quick start

curl -X POST https://emc2ai.io/x402/bitquery/token-sniping \
  -H "Content-Type: application/json" \
  -H "X-PAYMENT: <base64-signed-USDC-authorization>" \
  -d '{"tokenAddress": "0xYourTokenAddress", "chain": "base"}'

Example

Request

{
  "chain": "base",
  "limit": "50",
  "tokenAddress": "0x0b3e328455c4059EEb9e3f84b5543F74E24e7E1b"
}

Response

{
  "result": {
    "botCount": 12,
    "earlyBuyers": [
      {
        "isBot": true,
        "wallet": "0xabc...123",
        "amountUsd": 5200.5,
        "confidence": 0.95,
        "blockNumber": 12345678,
        "buyTimestamp": "2024-12-01T00:00:05Z"
      }
    ],
    "sniperCount": 8,
    "totalEarlyBuyers": 47
  },
  "status": "completed",
  "payment": {
    "asset": "0x833589fCD6eDb6E08f4c7C32D4f71b54bdA02913",
    "amount": "1000000",
    "scheme": "exact",
    "txHash": "0xdef...789",
    "network": "base",
    "x402Version": 1
  },
  "analysis": {
    "summary": "12 of 47 early buyers flagged as bots. 8 wallets exhibited sniper patterns.",
    "riskLevel": "medium"
  }
}

Endpoint

Transporthttp
Protocolx402
Pay to0xc9368b30BD620164FD1a05a5d99dcaf8Ae754775
CurrencyUSD COIN

Quality

0.82/ 1.00

Full OpenAPI schema with detailed request/response models, live 402 challenge confirming the endpoint is operational, clear pricing ($1.00 USDC), and multi-chain payment options. Deducted because no actual response example is provided in the docs (response schema is generic across all Bitquery endpoints), and the /api route returned a 522 timeout during crawl.

Warnings

  • The /api route returned a Cloudflare 522 timeout during crawl, suggesting occasional origin server issues
  • Response body schema is generic (shared BitqueryResponse) — actual field names in the sniping result are inferred, not documented
  • The example_response_json is illustrative and inferred from the output schema; no real response sample was available

Citations

Provenance

Indexed fromx402_bazaar
Enriched2026-04-22 01:18:34Z · anthropic/claude-opus-4.6 · v2
First seen2026-04-21
Last seen2026-04-22

Agent access