More actions
Chow chowcyj (talk | contribs) mNo edit summary |
|||
| Line 1: | Line 1: | ||
{{Exploration links}} | {{Exploration links}} | ||
'''Relic and data sites''' are types of [[Cosmic Signature|cosmic signatures]] that can be found with probing. Data and relic sites can be divided | '''Relic and data sites''' are types of [[Cosmic Signature|cosmic signatures]] that can be found with probing. Data and relic sites can be divided into 5 categories: | ||
* Pirate data and relic sites | * Pirate data and relic sites | ||
* Drone data sites | * Drone data sites | ||
| Line 11: | Line 11: | ||
[[File:Container_data.jpg|200px|thumb|right|A Data Site container]] | [[File:Container_data.jpg|200px|thumb|right|A Data Site container]] | ||
[[File:Container_relic.jpg|200px|thumb|right|A Relic Site container]] | [[File:Container_relic.jpg|200px|thumb|right|A Relic Site container]] | ||
Pirate relic and data sites can be found in all [[k-space|normal space regions]], in C1, C2 and C3 class [[Wormhole Space|wormhole systems]], as well as in [[Shattered_wormhole_systems|shattered wormhole systems]]. There are pockets of space populated with a variety of cosmic structures (i.e., wrecked stations, abandoned machines) and several containers that need to be [[hacking|hacked]] before the contents can be accessed. The sites do not have any triggers or NPC defenders. Pirate relic sites contain T1 and T2 [[Salvaging#Uses_for_salvage|salvage materials]], | Pirate relic and data sites can be found in all [[k-space|normal space regions]], in C1, C2 and C3 class [[Wormhole Space|wormhole systems]], as well as in [[Shattered_wormhole_systems|shattered wormhole systems]]. There are pockets of space populated with a variety of cosmic structures (i.e., wrecked stations, abandoned machines) and several containers that need to be [[hacking|hacked]] before the contents can be accessed. The sites do not have any triggers or NPC defenders. Pirate relic sites contain T1 and T2 [[Salvaging#Uses_for_salvage|salvage materials]], skill books and [[Blueprints#Blueprint_Copies|blueprint copies]]. Pirate data sites contain decryptors, data cores, skill books, blueprint copies and manufacturing materials. The contents may vary by faction. | ||
Data sites use the following naming convention according to their location: "{{co|wheat|Local}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" in high-security systems; "{{co|wheat|Regional}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" in low-security systems; and "{{co|wheat|Central}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" in null-security and wormhole systems. Relic sites follow a similar convention: "{{co|wheat|Crumbling}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" in high-security systems; "{{co|wheat|Decayed}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" in low-security systems; and "{{co|wheat|Ruined}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" in null-security and wormhole systems. Each region spawns sites for the local pirate group. | Data sites use the following naming convention according to their location: "{{co|wheat|Local}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" in high-security systems; "{{co|wheat|Regional}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" in low-security systems; and "{{co|wheat|Central}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" in null-security and wormhole systems. Relic sites follow a similar convention: "{{co|wheat|Crumbling}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" in high-security systems; "{{co|wheat|Decayed}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" in low-security systems; and "{{co|wheat|Ruined}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" in null-security and wormhole systems. Each region spawns sites for the local pirate group. | ||
| Line 29: | Line 29: | ||
Drone data sites spawn only in drone regions: Cobalt Edge, Perrigen Falls, Malpais, Oasa, Kalevala Expanse, Outer Passage, Etherium Reach, and The Spire. Drone data sites have two main differences from pirate data sites: | Drone data sites spawn only in drone regions: Cobalt Edge, Perrigen Falls, Malpais, Oasa, Kalevala Expanse, Outer Passage, Etherium Reach, and The Spire. Drone data sites have two main differences from pirate data sites: | ||
* Failing the hack twice in drone data site will not destroy the container. Instead there is a chance that failure spawns hostile frigates. These rogue drones can be easily handled by the drones of T1 explorer and do not pose serious threat. These frigates need to be destroyed before you can hack again. | * Failing the hack twice in drone data site will not destroy the container. Instead, there is a chance that failure spawns hostile frigates. These rogue drones can be easily handled by the drones of T1 explorer and do not pose a serious threat. These frigates need to be destroyed before you can hack again. | ||
* Drone data sites can escalate into another drone data site. | * Drone data sites can escalate into another drone data site. | ||
Drone data sites contain three hackable containers: Two "High Security Containment Facility" and one "Research and Development Laboratories". Most of the time the lone research container is empty but leaving it unhacked misses possibility for data site escalation. | Drone data sites contain three hackable containers: Two "High-Security Containment Facility" and one "Research and Development Laboratories". Most of the time the lone research container is empty but leaving it unhacked misses possibility for data site escalation. | ||
Drone data sites contain drone components and blueprint copies for [[Drones#Variants|'Integrated' and 'Augmented' drones]]. Each drone region drop blueprint copies for different racial drones: Kalevala Expanse and The Spire for Minmatar, Malpais and Oasa for Caldari, Etherium Reach and Perrigen Falls for Gallente and finally Outer Passage and Cobalt Edge for Amarr. | Drone data sites contain drone components and blueprint copies for [[Drones#Variants|' Integrated' and 'Augmented' drones]]. Each drone region drop blueprint copies for different racial drones: Kalevala Expanse and The Spire for Minmatar, Malpais and Oasa for Caldari, Etherium Reach and Perrigen Falls for Gallente and finally Outer Passage and Cobalt Edge for Amarr. | ||
==Sleeper caches== | ==Sleeper caches== | ||
| Line 46: | Line 46: | ||
*[[Superior Sleeper Cache]] Level V scanning difficulty | *[[Superior Sleeper Cache]] Level V scanning difficulty | ||
Sleeper caches are gated deadspace pockets with size limits for entry. Each sleeper cache has its own set of dangers. They contain mixture of containers with damaging explosions on failed hack, timed triggers, hazardous clouds, proximity explosions and sentry guns. For details see the page for individual sleeper cache. | Sleeper caches are gated deadspace pockets with size limits for entry. Each sleeper cache has its own set of dangers. They contain a mixture of containers with damaging explosions on a failed hack, timed triggers, hazardous clouds, proximity explosions and sentry guns. For details see the page for individual sleeper cache. | ||
Sleeper caches contain sleeper components, manufacturing materials, | Sleeper caches contain sleeper components, manufacturing materials, skill books and blueprint copies for polarized weapons. | ||
==Ghost sites== | ==Ghost sites== | ||
| Line 54: | Line 54: | ||
Ghost sites are data sites with limited time and riskier failures. They can be identified from {{co|wheat|"Covert Research Facility"}} on their name. | Ghost sites are data sites with limited time and riskier failures. They can be identified from {{co|wheat|"Covert Research Facility"}} on their name. | ||
The sites have invisible time limit after which strong NPC force will arrive, blow up remaining containers and attack the pilot on site. The hacks are also riskier as single failure will cause the container to explode dealing 4000–6000 raw explosive damage to 10 km radius. | The sites have an invisible time limit after which strong NPC force will arrive, blow up remaining containers and attack the pilot on-site. The hacks are also riskier as single failure will cause the container to explode dealing 4000–6000 raw explosive damage to 10 km radius. | ||
Ghost sites contain Covert Research Tools, Villard Wheels, blueprint copies for 'Packrat' and 'Magpie' Mobile Tractor Units, ‘Wetu’ and ‘Yurt’ Mobile Depots and Ascendancy implants. | Ghost sites contain Covert Research Tools, Villard Wheels, blueprint copies for 'Packrat' and 'Magpie' Mobile Tractor Units, ‘Wetu’ and ‘Yurt’ Mobile Depots and Ascendancy implants. | ||
| Line 60: | Line 60: | ||
==Sleeper sites== | ==Sleeper sites== | ||
{{main|Wormhole sites}} | {{main|Wormhole sites}} | ||
Sleeper data and relic sites are found in wormholes. They are not empty, instead they have strong sleepers defending the site that need to be defeated before hacking. | Sleeper data and relic sites are found in wormholes. They are not empty, instead, they have strong sleepers defending the site that need to be defeated before hacking. | ||
Sleeper data and relic sites can be identified from {{co|wheat|"Forgotten"}} and {{co|wheat|"Unsecured"}} at the beginning of their names. The combat in them is harder than in combat anomalies of same wormhole class and the rats drop sleeper components as they do in combat sites. They can be | Sleeper data and relic sites can be identified from {{co|wheat|"Forgotten"}} and {{co|wheat|"Unsecured"}} at the beginning of their names. The combat in them is harder than in combat anomalies of same wormhole class and the rats drop sleeper components as they do in combat sites. They can be run as combat sites only looting the wrecks and ignoring the hacking part. | ||
==Silent Battleground== | ==Silent Battleground== | ||
| Line 68: | Line 68: | ||
Silent Battleground is a very rare data site found in [[Shattered Wormhole Space|shattered wormholes]]. | Silent Battleground is a very rare data site found in [[Shattered Wormhole Space|shattered wormholes]]. | ||
The silent battleground contains 20 data and relic cans scattered in 60 km radius, with no Sleeper rats present. It must be scanned down | The silent battleground contains 20 data and relic cans scattered in 60 km radius, with no Sleeper rats present. It must be scanned down and requires decent skills to do so. Failing the hack twice does not blow up the can. The data cans contain data cores, and the relic cans contain T3 manufacturing components such as Intact Power Cores. Early reports suggest that this site operates on a timer and will explosively despawn after some time, though dealing no damage. This timer should be longer than 30 minutes. 3 hacking ships should be able to clear the entire site before this happens, however. | ||
At the | At the centre of the silent battleground is a wrecked [[Revenant]], suggesting an unexpected historical [[Sansha's Nation]] presence in these shattered wormholes. The wreck cannot be salvaged. | ||
== Contested Covert Research Facilities == | == Contested Covert Research Facilities == | ||
| Line 76: | Line 76: | ||
{{ note box | Note that it is unclear to this author whether Contested Covert Research Facilities are still in the game; some sources seem to indicate that they were removed when the Besieged Covert Research Facilities were added. Another thing to consider is that the reward received may not be worth the effort and risk of doing them: you will almost certainly lose your ship if you attempt them in an untanked frigate, but carrying around tanking modules just for these sites may be inconvenient. }} | {{ note box | Note that it is unclear to this author whether Contested Covert Research Facilities are still in the game; some sources seem to indicate that they were removed when the Besieged Covert Research Facilities were added. Another thing to consider is that the reward received may not be worth the effort and risk of doing them: you will almost certainly lose your ship if you attempt them in an untanked frigate, but carrying around tanking modules just for these sites may be inconvenient. }} | ||
[[Contested Covert Research Facilities]] are hacking sites that may or may not be in the game anymore. They contain one hackable container. The site will self destruct and deal 2000 damage 45-60 seconds after warp in. | [[Contested Covert Research Facilities]] are hacking sites that may or may not be in the game anymore. They contain one hackable container. The site will self destruct and deal 2000 damage 45-60 seconds after warp-in. | ||
==Combat relic sites== | ==Combat relic sites== | ||
Combat relic sites are very rare relic sites that spawn only in certain areas of Nullsec. They feature rats from many different pirate factions in large numbers. These sites are hard to run and should only be attempted by high-skill players. | Combat relic sites are very rare relic sites that spawn only in certain areas of Nullsec. They feature rats from many different pirate factions in large numbers. These sites are hard to run and should only be attempted by high-skill players. | ||
| Line 83: | Line 83: | ||
== Tips and tricks== | == Tips and tricks== | ||
* The contents of containers can be scanned with [[cargo scanning|cargo scanners]] before hacking. This allows skipping containers that do not have valuable contents. | * The contents of containers can be scanned with [[cargo scanning|cargo scanners]] before hacking. This allows skipping containers that do not have valuable contents. | ||
* Emptied sites will despawn in few minutes. Sites that have been warped to or partially completed will despawn in few hours. | * Emptied sites will despawn in few minutes. Sites that have been warped to or partially completed will despawn in a few hours. | ||
* Once a site has despawned, the same site (sorted based on data or relic) will respawn within 2 minutes within the same region, but never within the same system. | * Once a site has despawned, the same site (sorted based on data or relic) will respawn within 2 minutes within the same region, but never within the same system. | ||
* Sites with difficulty levels I and II should be scannable for any ship fitted with a core probe launcher, and a set of | * Sites with difficulty levels I and II should be scannable for any ship fitted with a core probe launcher, and a set of Sister's core probe scanners. However, as the difficulty level of the site increases, the minimum scanning strength required also increases. | ||
* Sites with difficulty levels III and higher normally need to be scanned by a scanning-bonused ship. However, some level III sites may still be scanned by any ship if it is fitted with a Sisters core probe launcher. | * Sites with difficulty levels III and higher normally need to be scanned by a scanning-bonused ship. However, some level III sites may still be scanned by any ship if it is fitted with a Sisters core probe launcher. | ||
* The recommended scan strength for level IV sites is around 90, while the recommended scan strength for level V sites is 100 and above. | * The recommended scan strength for level IV sites is around 90, while the recommended scan strength for level V sites is 100 and above. | ||
* After the DownTime all Relic and Data sites update their containers. For example you hack 5/6 containers and leave 1. After DT all these containers will be updated and you can hack them again. | * After the DownTime all Relic and Data sites update their containers. For example, you hack 5/6 containers and leave 1. After DT all these containers will be updated and you can hack them again. | ||
== Is this site "safe" to warp to? == | == Is this site "safe" to warp to? == | ||
The following tables give a quick overview whether a site is "safe" or not. This only relates to PVE hazards (like rats or exploding cans) NOT to other people hunting you down! | The following tables give a quick overview of whether a site is "safe" or not. This only relates to PVE hazards (like rats or exploding cans) NOT to other people hunting you down! | ||
{| class="wikitable" | {| class="wikitable" | ||
| Line 160: | Line 160: | ||
(Credit to David Louis for making an overview like this | (Credit to David Louis for making an overview like this one: https://forums.eve-scout.com/topic/409/safety-can-i-warp-to-this-site) | ||
== Pirate relic site loot== | == Pirate relic site loot== | ||
Pirate faction relic sites contain following items: | Pirate faction relic sites contain the following items: | ||
* Salvage. Type of salvage is based on the faction. | * Salvage. Type of salvage is based on the faction. | ||
* Carbon | * Carbon | ||
* Spatial attunement units | * Spatial attunement units | ||
* T2 rig | * T2 rig blueprint copies | ||
* POS blueprint copies | * POS blueprint copies | ||
Based on research done by MacrophageNT the relic site contents follow certain simple rules<ref name="relic | Based on research done by MacrophageNT the relic site contents follow certain simple rules<ref name="relic distribution">[https://www.reddit.com/r/Eve/comments/af7536/the_ultimate_nullsec_faction_relicdata_sites/ The Ultimate Nullsec Faction Relic/Data Sites Profitability Comparison]</ref>. The following information is for sites in null security space, the distribution of materials in other areas is likely identical but with lower drop rates. | ||
{| class="wikitable" style="text-align: center;padding:10px;" | {| class="wikitable" style="text-align: center;padding:10px;" | ||
| Line 254: | Line 254: | ||
|} | |} | ||
Each relic site in null security space/wormholes contains three different | Each relic site in null security space/wormholes contains three different kinds of containers: Rubble, remains and ruins. These containers always have the same loot distribution without influence from the site type. | ||
{| class="wikitable" style="text-align: center;padding:10px;" | {| class="wikitable" style="text-align: center;padding:10px;" | ||
| Line 267: | Line 267: | ||
|} | |} | ||
For example in a "Rubble" container each T1 salvage has independent 25% probability to appear in a stack of 3-20 units. Stack sizes are all uniformly distributed so a stack of 1 is equally likely to a stack of 14. | For example, in a "Rubble" container each T1 salvage has independent 25% probability to appear in a stack of 3-20 units. Stack sizes are all uniformly distributed so a stack of 1 is equally likely to a stack of 14. | ||
The amount of different container types depends on the name of the relic site. As a result higher rank relic sites are on average more valuable. | The amount of different container types depends on the name of the relic site. As a result, higher rank relic sites are on average more valuable. | ||
{| class="wikitable" style="text-align: center;padding:10px;" | {| class="wikitable" style="text-align: center;padding:10px;" | ||
| Line 288: | Line 288: | ||
{{MessageBox | {{MessageBox | ||
|Expected average site value | |Expected average site value | ||
|Paste this to | |Paste this to appraisal, divide the result by 100 and you get the expected value per site for that faction. | ||
Angel Cartel: | Angel Cartel: | ||
| Line 365: | Line 365: | ||
Tripped Power Circuit 3945 | Tripped Power Circuit 3945 | ||
Defective Current Pump 3945 | Defective Current Pump 3945 | ||
Armour Plates 3945 | |||
Contaminated Nanite Compound 3945 | Contaminated Nanite Compound 3945 | ||
| Line 392: | Line 392: | ||
== Pirate data site loot == | == Pirate data site loot == | ||
Data sites of pirate factions contain following items: | Data sites of pirate factions contain the following items: | ||
* Decryptors of all types | * Decryptors of all types | ||
* High-Tech Manufacturing Tools | * High-Tech Manufacturing Tools | ||
| Line 398: | Line 398: | ||
* Carbon | * Carbon | ||
* Calm Abyssal filaments | * Calm Abyssal filaments | ||
* Invention | * Invention skill books | ||
* | * Blueprint copies for: | ||
** Target Spectrum Breakers | ** Target Spectrum Breakers | ||
** Ancillary shield and | ** Ancillary shield and armour repairers (local and remote) | ||
** Faction POS modules | ** Faction POS modules | ||
** 'ligature' and 'zeugma' integrated analyzers | ** 'ligature' and 'zeugma' integrated analyzers | ||
** Medium and large micro jump drives | ** Medium and large micro jump drives | ||
** Reactive | ** Reactive armour hardeners | ||
* Storyline materials. Not fully limited to only own faction materials. | * Storyline materials. Not fully limited to only own faction materials. | ||
* Datacores. See the table below to see which faction has what. | * Datacores. See the table below to see which faction has what. | ||
| Line 545: | Line 545: | ||
[[Category:Exploration]] | [[Category:Exploration]] | ||
[[Category:Data sites]] | [[Category: Data sites]] | ||
[[Category:Relic sites]] | [[Category: Relic sites]] | ||