Difference between revisions of "Endless Battle"
From EVE University Wiki
m (Bot: Automated text replacement (-Category:Mission reports + ); cosmetic changes) |
|||
(6 intermediate revisions by 4 users not shown) | |||
Line 1: | Line 1: | ||
− | + | {{cleanup|More information needed on this mission chain}} | |
− | + | {{NPCTableCSS}}{{MissionLinks}} | |
− | + | ||
− | |||
− | |||
{{Missiondetails | {{Missiondetails | ||
|Level=1 | |Level=1 | ||
|Type=Encounter | |Type=Encounter | ||
− | |Objective= | + | |Objective=Bring 1x Stolen Documents to your agent |
|Faction1=Mercenaries | |Faction1=Mercenaries | ||
− | |DamageToDeal= | + | |DamageToDeal= |
− | |DamageToResist= | + | |DamageToResist= |
|WebPoint= | |WebPoint= | ||
|EWAR= | |EWAR= | ||
|ShipSizeLimit= | |ShipSizeLimit= | ||
− | |ShipSuggestion= | + | |ShipSuggestion=Frigate |
|Rewards= | |Rewards= | ||
+ | |StandingLoss= | ||
|Extra= | |Extra= | ||
}} | }} | ||
− | + | === Single Pocket === | |
− | Single Pocket | + | |
− | + | {{NPCTableHead|Initial Group (auto-aggro)}} | |
− | This mission leads to Part 2: Encryption Code Book (Courier) | + | {{NPCTableRow|Frigate|1|Saboteur Mercenary|note=Drops 1x Stolen Documents}} |
− | + | |} | |
− | [[Category: | + | |
+ | |||
+ | === Notes === | ||
+ | * This mission leads to Part 2: Encryption Code Book (Courier) | ||
+ | |||
+ | {{Missionrelated}} | ||
+ | |||
+ | [[Category:Security missions]] |
Latest revision as of 14:28, 27 August 2022
This article should be cleaned up or improved.
The reason is: More information needed on this mission chain
The reason is: More information needed on this mission chain
Missions |
---|
Mission Reports |
Mission Guides |
Special Missions |
Helpful Links |
Level | 1 |
Type | Encounter |
Objective | Bring 1x Stolen Documents to your agent |
Faction | Mercenaries |
Best damage to deal | Kin Th |
Damage to resist | Kin Th |
Ship suggestion | Frigate |
Single Pocket
Initial Group (auto-aggro)
WD | EWAR | L
| ||
---|---|---|---|---|
1 x Frigate Saboteur Mercenary |
Notes
- This mission leads to Part 2: Encryption Code Book (Courier)
|