More actions
Clarified the existence of null sites in C4 space |
Proton One (talk | contribs) m Oxford commas; dashes; Target Spectrum Breakers do not exist anymore |
||
| (25 intermediate revisions by 9 users not shown) | |||
| Line 1: | Line 1: | ||
{{Exploration links}} | {{Exploration links}} | ||
'''Relic and data sites''' are types of [[cosmic signatures]] that can be found with probing. Relic and data sites can be divided into | '''Relic and data sites''' are types of [[cosmic signatures]] that can be found with probing. Relic and data sites can be divided into 6 categories: | ||
* Pirate relic and data sites | * Pirate relic and data sites | ||
* Drone data sites | * Drone data sites | ||
* Drone relic sites | |||
* Ghost sites | * Ghost sites | ||
* Sleeper caches | * Sleeper caches | ||
* Sleeper sites | * Sleeper sites | ||
Relic and data sites are also categorized into 5 different levels of difficulty, ranging from I to V. While a ship that is not scanning bonused can scan down a level I cosmic signature, even exploration-focused ships and fittings may struggle with level V sites. | |||
== Pirate sites == | == Pirate sites == | ||
Pirate relic and data sites can be found in all [[known space|normal space regions]], in C1, C2 and C3 class [[Wormhole space|wormhole systems]], as well as in [[shattered wormhole systems]]. There are pockets of space populated with a variety of cosmic structures (i.e., wrecked stations, abandoned machines) and several containers that need to be [[hacking|hacked]] before the contents can be accessed. The sites do not have any triggers or NPC defenders. Pirate relic sites contain T1 and T2 [[Salvaging# | {{See also|List of data and relic sites}} | ||
Pirate relic and data sites can be found in all [[known space|normal space regions]], in C1-, C2-, and C3 class [[Wormhole space|wormhole systems]], as well as in [[shattered wormhole systems]]. There are pockets of space populated with a variety of cosmic structures (i.e., wrecked stations, abandoned machines) and several containers that need to be [[hacking|hacked]] before the contents can be accessed. The sites do not have any triggers or NPC defenders. Pirate relic sites contain T1 and T2 [[Salvaging#Uses for salvage|salvage materials]], skill books, and [[Blueprints#Blueprint_Copies|blueprint copies]]. Pirate data sites contain decryptors, data cores, skill books, blueprint copies, and manufacturing materials. The contents may vary by faction. | |||
[[File:Container_data.jpg|200px|thumb|A Data Site container]] | [[File:Container_data.jpg|200px|thumb|A Data Site container]] | ||
[[File:Container_relic.jpg|200px|thumb|A Relic Site container]] | [[File:Container_relic.jpg|200px|thumb|A Relic Site container]] | ||
Relic and data sites use the following naming convention according to their location. | Relic and data sites use the following naming convention according to their location, except for drone relic sites. | ||
{| class="wikitable" | {| class="wikitable" | ||
|- | |- | ||
| Line 42: | Line 44: | ||
You'll have to hack into the containers first by playing the [[hacking|hacking minigame]]. In order to attempt a hack, you’ll need to lock on to the container and activate the corresponding hacking module. The module (Relic Analyzer in a relic site, Data Analyzer in a data site, or Integrated Analyzer for both) only works if the distance between the container and your ship is less or equal to the module's maximum activation range. Activating the module will open a new window containing the hacking minigame. Failing to hack a container twice will destroy it and its contents. | You'll have to hack into the containers first by playing the [[hacking|hacking minigame]]. In order to attempt a hack, you’ll need to lock on to the container and activate the corresponding hacking module. The module (Relic Analyzer in a relic site, Data Analyzer in a data site, or Integrated Analyzer for both) only works if the distance between the container and your ship is less or equal to the module's maximum activation range. Activating the module will open a new window containing the hacking minigame. Failing to hack a container twice will destroy it and its contents. | ||
== Drone relic sites == | |||
Drone relic sites spawn only in C1–C3 wormholes and in drone regions: Cobalt Edge, Perrigen Falls, Malpais, Oasa, Kalevala Expanse, Outer Passage, Etherium Reach, and The Spire. This means that they are always {{co|wheat|Ruined}}, so Debris containers will not spawn. The naming convention for the sites remains identical to Pirate relic sites. Additionally, medium-difficulty containers are called {{co|#9ef37c|(Rogue Drone)}} Ship Remains, but they maintain the same difficulty level. | |||
The two main differences from Pirate relic sites are: | |||
* The site despawns very quickly, so once you enter, it is best not to warp out unless you have a bookmark on grid, or unless you are in danger. | |||
* The loot table contains all of the faction loot for other relic sites, so it is possible to get any kind of relic site loot. | |||
== Drone data sites == | == Drone data sites == | ||
| Line 47: | Line 56: | ||
* [[Abandoned Research Complex DA015]] | * [[Abandoned Research Complex DA015]] | ||
* [[Abandoned Research Complex DA025]] | * [[Abandoned Research Complex DA025]] | ||
* [[Abandoned Research Complex DC007]] | |||
* [[Abandoned Research Complex DC035]] | |||
* [[Abandoned Research Complex DG003]] | * [[Abandoned Research Complex DG003]] | ||
* [[Abandoned Research Complex DG018]] | * [[Abandoned Research Complex DG018]] | ||
* [[Abandoned Research Complex DM083]] | * [[Abandoned Research Complex DM083]] | ||
| Line 55: | Line 65: | ||
* Failing the hack twice in drone data site will not destroy the container. Instead, there is a chance that failure spawns hostile frigates. These rogue drones can be easily handled by the drones of T1 explorer and do not pose a serious threat. These frigates need to be destroyed before you can hack again. | * Failing the hack twice in drone data site will not destroy the container. Instead, there is a chance that failure spawns hostile frigates. These rogue drones can be easily handled by the drones of T1 explorer and do not pose a serious threat. These frigates need to be destroyed before you can hack again. | ||
* Drone data sites can escalate into another drone data site. | * Drone data sites can escalate into another drone data site. | ||
Drone data sites contain three hackable containers: Two "High-Security Containment Facility" and one "Research and Development Laboratories". Most of the time the lone research container is empty but leaving it unhacked misses possibility for data site escalation. | Drone data sites contain three hackable containers: Two "High-Security Containment Facility" and one "Research and Development Laboratories". Most of the time the lone research container is empty but leaving it unhacked misses possibility for data site escalation. | ||
Drone data sites contain drone components and blueprint copies for [[Drones#Variants|' Integrated' and 'Augmented' drones]]. Each drone region | Drone data sites contain drone components and blueprint copies for [[Drones#Variants|'Integrated' and 'Augmented' drones]]. Each drone region drops blueprint copies for different racial drones: Kalevala Expanse and The Spire for Minmatar, Malpais and Oasa for Caldari, Etherium Reach and Perrigen Falls for Gallente, and Outer Passage and Cobalt Edge for Amarr. | ||
== Other data sites == | == Other data sites == | ||
* [[AEGIS Capital Ship Security Facility]] | * [[AEGIS Capital Ship Security Facility]] | ||
* [[AEGIS Secure Capital Construction Forge]] | * [[AEGIS Secure Capital Construction Forge]] | ||
* [[ | * [[AEGIS Secure Transfer Facility]]—mostly a combat site with a little data hacking | ||
* [[Overmind Nursery Grove]]—Does not feature any actual hacking and can treated more like a combat site | |||
* [[Faction warfare#Operation Centers|Faction Warfare Operation Center]] e.g. "Caldari Operation Center" | |||
* [[SCC Secure Key Storage]] | * [[SCC Secure Key Storage]] | ||
* [[Observatory Infiltration]] | |||
== Detected sites == | |||
The Legion Expansion introduced Exploration Upgrades that can be fitted to [[Sovereignty Hub]]s. These upgrades spawn detected relic and data sites in a 5 jump radius of the system that has the Hub with the upgrade installed. | |||
This means that they can only be found in NullSec Sovereignty space. | |||
The detected sites that spawn have the same site name formatting as all the other [[#Pirate sites|pirate sites]], but are prefaced with "Detected" (i.e. Detected <Ruined/Central> <Faction> <Site Name>). | |||
The detected sites that spawn have the same faction as the region of space in which the Sovereignty Hub that spawns them is in. This includes drone data and relic sites. | |||
The containers in detected sites may or may not have better loot drops than those in normal sites. | |||
Completing a detected relic site has the chance to trigger an escalation: | |||
* [[Emergent Ruins]] | |||
* [[Interrupted Expedition]] | |||
Completing a detected data site has the chance to trigger an escalation specific to them. | |||
* [[Interrupted Expedition]] | |||
* ??? | |||
== Sleeper caches == | == Sleeper caches == | ||
| Line 78: | Line 108: | ||
* [[Superior Sleeper Cache]] Level V scanning difficulty | * [[Superior Sleeper Cache]] Level V scanning difficulty | ||
Sleeper caches are gated deadspace pockets with size limits for entry. Each sleeper cache has its own set of dangers. They contain a mixture of containers with damaging explosions on a failed hack, timed triggers, hazardous clouds, proximity explosions and sentry guns. For details see the page for individual sleeper cache. | Sleeper caches are gated deadspace pockets with size limits for entry. Each sleeper cache has its own set of dangers. They contain a mixture of containers with damaging explosions on a failed hack, timed triggers, hazardous clouds, proximity explosions, and sentry guns. For details see the page for individual sleeper cache. | ||
Sleeper caches contain sleeper components, manufacturing materials, skill books and blueprint copies for polarized weapons. | Sleeper caches contain sleeper components, manufacturing materials, skill books, and blueprint copies for polarized weapons. | ||
== Ghost sites == | == Ghost sites == | ||
| Line 88: | Line 118: | ||
The sites have an invisible time limit after which a strong NPC force will arrive, blow up the remaining containers and attack the pilot on-site. The hacks are also riskier as a single failure will cause the container to explode dealing 4000–6000 raw explosive damage to a 10 km radius. | The sites have an invisible time limit after which a strong NPC force will arrive, blow up the remaining containers and attack the pilot on-site. The hacks are also riskier as a single failure will cause the container to explode dealing 4000–6000 raw explosive damage to a 10 km radius. | ||
Ghost sites contain Covert Research Tools, Villard Wheels, blueprint copies for 'Packrat' and 'Magpie' Mobile Tractor Units, | Ghost sites contain Covert Research Tools, Villard Wheels, blueprint copies for 'Packrat' and 'Magpie' Mobile Tractor Units, 'Wetu' and 'Yurt' Mobile Depots, and Ascendancy implants. | ||
== Sleeper sites == | == Sleeper sites == | ||
| Line 100: | Line 130: | ||
Silent Battleground is a very rare data site found in [[Shattered Wormhole Space|shattered wormholes]]. | Silent Battleground is a very rare data site found in [[Shattered Wormhole Space|shattered wormholes]]. | ||
The silent battleground contains 20 relic and data cans scattered in 60 km radius, with no Sleeper rats present. It must be scanned down and requires decent skills to do so. Failing the hack twice does not blow up the can. The data cans contain data cores, and the relic cans contain T3 manufacturing components such as Intact Power Cores. Early reports suggest that this site operates on a timer and will explosively despawn after some time, though dealing no damage. This timer should be longer than 30 minutes. 3 hacking ships should be able to clear the entire site before this happens, however. | The silent battleground contains 20 relic and data cans scattered in 60-km radius, with no Sleeper rats present. It must be scanned down and requires decent skills to do so. Failing the hack twice does not blow up the can. The data cans contain data cores, and the relic cans contain T3 manufacturing components such as Intact Power Cores. Early reports suggest that this site operates on a timer and will explosively despawn after some time, though dealing no damage. This timer should be longer than 30 minutes. 3 hacking ships should be able to clear the entire site before this happens, however. | ||
At the | At the center of the silent battleground is a wrecked [[Revenant]], suggesting an unexpected historical [[Sansha's Nation]] presence in these shattered wormholes. The wreck cannot be salvaged. | ||
== Contested Covert Research Facilities == | == Contested Covert Research Facilities == | ||
| Line 109: | Line 139: | ||
}} | }} | ||
[[Contested Covert Research Facilities]] are hacking sites that may or may not be in the game anymore. They contain one hackable container. The site will self destruct and deal 2000 damage | [[Contested Covert Research Facilities]] are hacking sites that may or may not be in the game anymore. They contain one hackable container. The site will self destruct and deal 2000 damage 45–60 seconds after warp-in. | ||
== Combat relic sites == | == Combat relic sites == | ||
| Line 123: | Line 153: | ||
== Tips and tricks== | == Tips and tricks== | ||
* The contents of containers can be scanned with [[cargo scanning|cargo scanners]] before hacking. This allows skipping containers that do not have valuable contents. | * The contents of containers can be scanned with [[cargo scanning|cargo scanners]] before hacking. This allows skipping containers that do not have valuable contents. | ||
* Emptied sites will despawn in few minutes. Sites that have been | |||
{{Important note box|Please check with your corp/alliance/coalition before doing this as they may have rules against cherry-picking. if so, self-destruct the cans instead by failing the hacks 2 times by opening and immediate closing the hacking window.}} | |||
* Emptied sites will despawn in few minutes. Sites that have been partially completed will despawn in a few hours. | |||
* Once a site has despawned, the same site (sorted based on data or relic) will respawn within 2 minutes within the same region, but never within the same system. | * Once a site has despawned, the same site (sorted based on data or relic) will respawn within 2 minutes within the same region, but never within the same system. | ||
* Sites with difficulty levels I and II should be scannable for any ship fitted with a core probe launcher, and a set of Sister's core probe scanners. However, as the difficulty level of the site increases, the minimum scanning strength required also increases. | * Sites with difficulty levels I and II should be scannable for any ship fitted with a core probe launcher, and a set of Sister's core probe scanners. However, as the difficulty level of the site increases, the minimum scanning strength required also increases. | ||
* Sites with difficulty levels III and higher normally need to be scanned by a scanning-bonused ship. However, some level III sites may still be scanned by any ship if it is fitted with a Sisters core probe launcher. | * Sites with difficulty levels III and higher normally need to be scanned by a scanning-bonused ship. However, some level III sites may still be scanned by any ship if it is fitted with a Sisters core probe launcher. | ||
* The recommended scan strength for level IV sites is around 90, while the recommended scan strength for level V sites is 100 and above. | * The recommended scan strength for level IV sites is around 90, while the recommended scan strength for level V sites is 100 and above. | ||
* After the daily [[Server downtime|downtime]](DT) all Relic and Data sites update their containers. For example, you hack 5/6 containers and leave 1. After DT all these containers will be updated and you can hack them again. | * After the daily [[Server downtime|downtime]] (DT) all Relic and Data sites update their containers. For example, you hack 5/6 containers and leave 1. After DT all these containers will be updated and you can hack them again. | ||
== Is this site "safe" to warp to? == | == Is this site "safe" to warp to? == | ||
The following are quick reference tables for evaluating PvE exploration site dangers<ref>https://wiki.signalcartel.space/Public:Exploration_Site_Safety_Guide Signal Cartels Exploration Site Safety Guide.</ref> (such as hostile NPCs and/or exploding cans) based on the cosmic signature name. | The following are quick reference tables for evaluating PvE exploration site dangers<ref>https://wiki.signalcartel.space/Public:Exploration_Site_Safety_Guide Signal Cartels Exploration Site Safety Guide.</ref> (such as hostile NPCs and/or exploding cans) based on the cosmic signature name. Thank you to David Louis for the original, but now out of date [https://forums.eve-scout.com/topic/409/safety-can-i-warp-to-this-site forum post] | ||
{{Note box|'''Note:''' | {{Note box|'''Note:''' "SAFE" does not mean you are safe from PvP. Always assume you are being hunted by other players. Be forever vigilant dear explorers!}} | ||
| Line 163: | Line 196: | ||
| style="text-align:left;" | Central <> || Safe || || || x || x || x || x || * || || | | style="text-align:left;" | Central <> || Safe || || || x || x || x || x || * || || | ||
|- | |- | ||
| style="text-align:left;" | Unsecured <> || NOT | | style="text-align:left;" | Unsecured <> || NOT Safe || || || || x || x || x || x || x || x | ||
|- | |||
| style="text-align:left;" | AEGIS <> || NOT Safe|| || x || x || || || || || x || x | |||
|- | |||
| style="text-align:left;" | SCC <> || NOT Safe|| || x || x || || || || || x || x | |||
|} | |} | ||
Exceptions and details for [[Shattered wormhole systems]]: | Exceptions and details for [[Shattered wormhole systems]]: | ||
* Shattered systems can spawn sites of their own class and also one class higher or lower. This technically allows Ruined and Central sites to exist in a C4 system, since it can spawn sites usually only found in C3 space. However, shattered systems are rare, and | * Shattered systems can spawn sites of their own class and also one class higher or lower. This technically allows Ruined and Central sites to exist in a C4 system, since it can spawn sites usually only found in C3 space. However, shattered systems are rare, and no other C4 systems spawn these sites. | ||
* C13 or "small ship" shattered systems contain sites only found in C1, C2, or C3 systems. This includes Ruined and Central sites. | * C13 or "small ship" shattered systems contain sites only found in C1, C2, or C3 systems. This includes Ruined and Central sites. | ||
* [[#Silent Battleground]] (a very rare Data Site) in Shattered systems is SAFE.</small> | * [[#Silent Battleground|Silent Battleground]] (a very rare Data Site) in Shattered systems is SAFE.</small> | ||
{| class="wikitable" style="text-align: center;" | {| class="wikitable" style="text-align: center;" | ||
| Line 229: | Line 265: | ||
* X = possible site location | * X = possible site location | ||
* HS = high sec; LS = low sec; NS = null sec | * HS = high sec; LS = low sec; NS = null sec | ||
* | * C1–C6 = wormhole system class | ||
}} | }} | ||
}} | }} | ||
| Line 235: | Line 271: | ||
== Pirate relic site loot == | == Pirate relic site loot == | ||
Pirate faction relic sites contain the following items: | Pirate faction relic sites contain the following items: | ||
* | * Salvage—Type of salvage is based on the faction | ||
* Carbon | * Carbon | ||
* Spatial attunement units | * Spatial attunement units | ||
| Line 324: | Line 360: | ||
|} | |} | ||
Each relic site in null security space/wormholes contains three different kinds of containers: Rubble, remains and ruins. These containers always have the same loot distribution without influence from the site type. | Note: Rogue Drone relic sites can contain any of the items in the above table. | ||
Each relic site in null security space/wormholes contains three different kinds of containers: Rubble, remains, and ruins. These containers always have the same loot distribution without influence from the site type. | |||
{| class="wikitable" style="text-align: center;padding:10px;" | {| class="wikitable" style="text-align: center;padding:10px;" | ||
| Line 330: | Line 368: | ||
! Container !! T1 probability<br>(amount)!! T2 probability<br>(amount) | ! Container !! T1 probability<br>(amount)!! T2 probability<br>(amount) | ||
|- | |- | ||
|style="text-align:right;"|Rubble | |style="text-align:right;"|Rubble|| 25% (3–20) || 5.5% (1–3) | ||
|- | |- | ||
|style="text-align:right;"| | |style="text-align:right;"|Remains|| 50% (5–40) || 12.5% (1–5) | ||
|- | |- | ||
|style="text-align:right;"| | |style="text-align:right;"|Ruins|| 0% || 25% (1–15) | ||
|} | |} | ||
For example, in a "Rubble" container each T1 salvage has independent 25% probability to appear in a stack of | For example, in a "Rubble" container each T1 salvage has independent 25% probability to appear in a stack of 3–20 units. Stack sizes are all uniformly distributed so a stack of 1 is equally likely to a stack of 14. | ||
The amount of different container types depends on the name of the relic site. As a result, higher rank relic sites are on average more valuable. | The amount of different container types depends on the name of the relic site. As a result, higher rank relic sites are on average more valuable. | ||
| Line 361: | Line 399: | ||
Angel Cartel: | Angel Cartel: | ||
https:// | https://janice.e-351.com/a/ypaCO6 | ||
Artificial Neural Network 472 | Artificial Neural Network 472 | ||
| Line 381: | Line 419: | ||
Blood Raider Covenant: | Blood Raider Covenant: | ||
https:// | https://janice.e-351.com/a/bjz3kc | ||
Artificial Neural Network 472 | Artificial Neural Network 472 | ||
| Line 399: | Line 437: | ||
Guristas Pirates: | Guristas Pirates: | ||
https:// | https://janice.e-351.com/a/7YKOpP | ||
Artificial Neural Network 472 | Artificial Neural Network 472 | ||
| Line 419: | Line 457: | ||
Sansha's Nation: | Sansha's Nation: | ||
https:// | https://janice.e-351.com/a/pXC4r5 | ||
Artificial Neural Network 472 | Artificial Neural Network 472 | ||
| Line 435: | Line 473: | ||
Tripped Power Circuit 3945 | Tripped Power Circuit 3945 | ||
Defective Current Pump 3945 | Defective Current Pump 3945 | ||
Armor Plates 3945 | |||
Contaminated Nanite Compound 3945 | Contaminated Nanite Compound 3945 | ||
Serpentis Corporation: | Serpentis Corporation: | ||
https:// | https://janice.e-351.com/a/LbsFmu | ||
Artificial Neural Network 472 | Artificial Neural Network 472 | ||
| Line 469: | Line 507: | ||
* Invention skill books | * Invention skill books | ||
* Blueprint copies for: | * Blueprint copies for: | ||
** Ancillary shield and armor repairers (local and remote) | |||
** Ancillary shield and | |||
** Faction POS modules | ** Faction POS modules | ||
** ' | ** 'Ligature' and 'Zeugma' integrated analyzers | ||
** Medium and large micro jump drives | ** Medium and large micro jump drives | ||
** Reactive | ** Reactive armor hardeners | ||
* Storyline materials. Not fully limited to only own faction materials. | * Storyline materials. Not fully limited to only own faction materials. | ||
* Datacores. See the table below to see which faction has what. | * Datacores. See the table below to see which faction has what. | ||
| Line 607: | Line 644: | ||
== See also == | == See also == | ||
* [https://www.eveonline.com/news/view/ghastly-hotbed-of-spaceship-trauma | * Dev blog: [https://www.eveonline.com/news/view/ghastly-hotbed-of-spaceship-trauma Ghastly Hotbed Of Spaceship Trauma - Ghost Sites in Rubicon] - Introducing Ghost Sites | ||
* [https://www.eveonline.com/news/view/sweeping-death-and-chaos | * Dev blog: [https://www.eveonline.com/news/view/sweeping-death-and-chaos Sweeping Death and Chaos: New Exploration Sites in Kronos] - Introducing the Contested and Besieged Covert Research Facilities | ||
* [[List of data and relic sites]] | * [[List of data and relic sites]] | ||