What sizes are left?
Nike Mac Attack
A clean leather tennis shoe with strong retrowave appeal, held back by limited colorway depth and hype-inflated resale on popular pairs.
Guide Score
How to trust it
The Sources section links to 8 pages we used or checked.
This is a SoleFeed guide page with live store data.
Key facts
- Popularity: Surged after 2023 retro, still riding hype wave
- Comfort: Flat and firm, fine for walking but no modern cushioning
- Fit: True to size with a slightly narrow toe box
- Value: Retail is fair; resale on hyped colorways is steep
- Use case: Casual wear, tennis-inspired outfits, warm-weather rotation
- Risk: Limited colorway selection outside collab pairs
Shoe intelligence
Guide
Full breakdown
Nike's Mac Attack debuted in 1984 as a tennis shoe tied to John McEnroe's aggressive on-court style. The low-profile leather upper, flat rubber outsole, and minimal branding gave it a court-classic look. After decades of dormancy, Nike brought it back in 2023-2024 with Travis Scott collaboration pairs driving massive attention. The base model retails as a clean, understated lifestyle sneaker.
Questions answered
FAQ
Is the Nike Mac Attack comfortable for all-day wear?
It's a flat tennis shoe with minimal cushioning, so it works for walking and daily wear but won't compete with modern foam-based runners. Most wearers find it adequate for 6-8 hours on their feet.
How does the Mac Attack fit?
It runs true to size for most buyers. The toe box is slightly narrow compared to something like a Killshot, so wide-footed buyers might want to go up half a size.
Is the Mac Attack worth it at resale prices?
The general release pairs at retail are well-priced for a leather Nike sneaker. Resale on the Travis Scott colorways is significantly marked up and driven by hype rather than material quality differences.
How does the Mac Attack compare to the Nike Killshot?
Both are low-profile leather tennis shoes. The Mac Attack has a sleeker profile and less visible branding, while the Killshot is slightly wider and more cushioned. The Mac Attack tends to run narrower.
Sources & methodology
This page mixes guide writing with current store data.



