Difference between revisions of "Relic and data sites"

From EVE University Wiki
Jump to: navigation, search
m (→‎Is this site "safe" to warp to?: Fix typo in site name)
 
(34 intermediate revisions by 13 users not shown)
Line 1: Line 1:
 
{{Exploration links}}
 
{{Exploration links}}
'''Relic and data sites''' are types of [[Cosmic Signature|cosmic signatures]] that can be found with probing. Data and relic sites can be divided into 5 categories:  
+
'''Relic and data sites''' are types of [[cosmic signatures]] that can be found with probing. Relic and data sites can be divided into 5 categories:  
* Pirate data and relic sites
+
* Pirate relic and data sites
 
* Drone data sites
 
* Drone data sites
 
* Ghost sites
 
* Ghost sites
Line 8: Line 8:
 
It should be noted that relic and data sites are also categorized into 5 different levels of difficulty, ranging from I to V. While a ship that is not bonus-ed to scanning can scan down a level I cosmic signature, even exploration-focused ships and fittings may struggle with level V sites.
 
It should be noted that relic and data sites are also categorized into 5 different levels of difficulty, ranging from I to V. While a ship that is not bonus-ed to scanning can scan down a level I cosmic signature, even exploration-focused ships and fittings may struggle with level V sites.
  
==Pirate sites==
+
== Pirate sites ==
[[File:Container_data.jpg|200px|thumb|right|A Data Site container]]
+
{{See also|List of data and relic sites}}
[[File:Container_relic.jpg|200px|thumb|right|A Relic Site container]]
+
Pirate relic and data sites can be found in all [[known space|normal space regions]], in C1, C2 and C3 class [[Wormhole space|wormhole systems]], as well as in [[shattered wormhole systems]]. There are pockets of space populated with a variety of cosmic structures (i.e., wrecked stations, abandoned machines) and several containers that need to be [[hacking|hacked]] before the contents can be accessed. The sites do not have any triggers or NPC defenders. Pirate relic sites contain T1 and T2 [[Salvaging#Uses_for_salvage|salvage materials]], skill books and [[Blueprints#Blueprint_Copies|blueprint copies]]. Pirate data sites contain decryptors, data cores, skill books, blueprint copies and manufacturing materials. The contents may vary by faction.
Pirate relic and data sites can be found in all [[k-space|normal space regions]], in C1, C2 and C3 class [[Wormhole Space|wormhole systems]], as well as in [[Shattered_wormhole_systems|shattered wormhole systems]]. There are pockets of space populated with a variety of cosmic structures (i.e., wrecked stations, abandoned machines) and several containers that need to be [[hacking|hacked]] before the contents can be accessed. The sites do not have any triggers or NPC defenders. Pirate relic sites contain T1 and T2 [[Salvaging#Uses_for_salvage|salvage materials]], skill books and [[Blueprints#Blueprint_Copies|blueprint copies]]. Pirate data sites contain decryptors, data cores, skill books, blueprint copies and manufacturing materials. The contents may vary by faction.
 
  
Data sites use the following naming convention according to their location: "{{co|wheat|Local}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" in high-security systems; "{{co|wheat|Regional}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" in low-security systems; and "{{co|wheat|Central}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" in null-security and wormhole systems. Relic sites follow a similar convention: "{{co|wheat|Crumbling}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" in high-security systems; "{{co|wheat|Decayed}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" in low-security systems; and "{{co|wheat|Ruined}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" in null-security and wormhole systems. Each region spawns sites for the local pirate group.
+
[[File:Container_data.jpg|200px|thumb|A Data Site container]]
 +
[[File:Container_relic.jpg|200px|thumb|A Relic Site container]]
 +
Relic and data sites use the following naming convention according to their location.
 +
{| class="wikitable"
 +
|-
 +
! Data site names !! Relic site names !! Location
 +
|-
 +
| {{co|wheat|Local}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}} || {{co|wheat|Crumbling}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}} || High-security systems
 +
|-
 +
| {{co|wheat|Regional}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}} || {{co|wheat|Decayed}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}} || Low-security systems
 +
|-
 +
| {{co|wheat|Central}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}} || {{co|wheat|Ruined}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}} || Null-security and wormhole systems
 +
|}
  
Data site containers have a physical appearance that resembles a gyroscope, and are usually named "{{co|#9ef37c|(Faction)}} Info Shard", "{{co|#9ef37c|(Faction)}} Com Tower", "{{co|#9ef37c|(Faction)}} Mainframe", "{{co|#9ef37c|(Faction)}} Data Processing Center", "{{co|#9ef37c|(Faction)}} Shattered Life-Support Unit", "{{co|#9ef37c|(Faction)}} Virus Test Site", "{{co|#9ef37c|(Faction)}} Minor Shipyard", "{{co|#9ef37c|(Faction)}} Production Installer" or "{{co|#9ef37c|(Faction)}} Backup Server". Relic Site containers resemble ancient shipwrecks and are named "{{co|#9ef37c|(Faction)}} Debris", "{{co|#9ef37c|(Faction)}} Rubble", "{{co|#9ef37c|(Faction)}} Crystal Quarry", "{{co|#9ef37c|(Faction)}} Antiquated Outpost" or "{{co|#9ef37c|(Faction)}} Stone Formation". You'll have to hack into the containers first by playing the [[hacking|hacking minigame]]. In order to attempt a hack, you’ll need to lock on to the container and activate the corresponding hacking module. The module (Relic Analyzer in a Relic Site, Data Analyzer in a Data Site, or Integrated Aanalyzer for both) only works if the distance between the container and your ship is less or equal to the module's maximum activation range. Activating the module will open a new window containing the hacking minigame. Failing to hack a container twice will destroy it and its contents.
+
Data site containers have a physical appearance that resembles a gyroscope while relic site containers resemble ancient shipwrecks.  The containers are named as follows.
 +
{| class="wikitable"
 +
|-
 +
! Data site containers !! Relic site containers !! Difficulty
 +
|-
 +
| {{co|#9ef37c|(Faction)}} Info Shard || {{co|#9ef37c|(Faction)}} Debris || Very easy
 +
|-
 +
| {{co|#9ef37c|(Faction)}} Com Tower || {{co|#9ef37c|(Faction)}} Rubble || Easy
 +
|-
 +
| {{co|#9ef37c|(Faction)}} Mainframe || {{co|#9ef37c|(Faction)}} Remains || Medium
 +
|-
 +
| {{co|#9ef37c|(Faction)}} Databank || {{co|#9ef37c|(Faction)}} Ruins || Hard
 +
|}
  
==Drone data sites==
+
The {{co|#9ef37c|(Faction)}} in the above site and container names will be the local pirate group for each region.  For a list of  {{co|#9ef37c|(site)}} names, see [[List of data and relic sites]].
  
*[[Abandoned Research Complex DA005]]
+
You'll have to hack into the containers first by playing the [[hacking|hacking minigame]]. In order to attempt a hack, you’ll need to lock on to the container and activate the corresponding hacking module. The module (Relic Analyzer in a relic site, Data Analyzer in a data site, or Integrated Analyzer for both) only works if the distance between the container and your ship is less or equal to the module's maximum activation range. Activating the module will open a new window containing the hacking minigame. Failing to hack a container twice will destroy it and its contents.
*[[Abandoned Research Complex DA015]]
+
 
*[[Abandoned Research Complex DA025]]
+
== Drone data sites ==
*[[Abandoned Research Complex DG003]]
+
* [[Abandoned Research Complex DA005]]
*[[Abandoned Research Complex DG018]]
+
* [[Abandoned Research Complex DA015]]
*[[Abandoned Research Complex DC007]]
+
* [[Abandoned Research Complex DA025]]
*[[Abandoned Research Complex DM083]]
+
* [[Abandoned Research Complex DC007]]
 +
* [[Abandoned Research Complex DC035]]
 +
* [[Abandoned Research Complex DG003]]
 +
* [[Abandoned Research Complex DG018]]
 +
* [[Abandoned Research Complex DM083]]
  
 
Drone data sites spawn only in drone regions: Cobalt Edge, Perrigen Falls, Malpais, Oasa, Kalevala Expanse, Outer Passage, Etherium Reach, and The Spire. Drone data sites have two main differences from pirate data sites:
 
Drone data sites spawn only in drone regions: Cobalt Edge, Perrigen Falls, Malpais, Oasa, Kalevala Expanse, Outer Passage, Etherium Reach, and The Spire. Drone data sites have two main differences from pirate data sites:
  
 
* Failing the hack twice in drone data site will not destroy the container. Instead, there is a chance that failure spawns hostile frigates. These rogue drones can be easily handled by the drones of T1 explorer and do not pose a serious threat. These frigates need to be destroyed before you can hack again.
 
* Failing the hack twice in drone data site will not destroy the container. Instead, there is a chance that failure spawns hostile frigates. These rogue drones can be easily handled by the drones of T1 explorer and do not pose a serious threat. These frigates need to be destroyed before you can hack again.
 
 
* Drone data sites can escalate into another drone data site.
 
* Drone data sites can escalate into another drone data site.
  
Line 37: Line 63:
 
Drone data sites contain drone components and blueprint copies for [[Drones#Variants|' Integrated' and 'Augmented' drones]]. Each drone region drop blueprint copies for different racial drones: Kalevala Expanse and The Spire for Minmatar, Malpais and Oasa for Caldari, Etherium Reach and Perrigen Falls for Gallente and finally Outer Passage and Cobalt Edge for Amarr.
 
Drone data sites contain drone components and blueprint copies for [[Drones#Variants|' Integrated' and 'Augmented' drones]]. Each drone region drop blueprint copies for different racial drones: Kalevala Expanse and The Spire for Minmatar, Malpais and Oasa for Caldari, Etherium Reach and Perrigen Falls for Gallente and finally Outer Passage and Cobalt Edge for Amarr.
  
==Sleeper caches==
+
== Other data sites ==
 +
* [[AEGIS Capital Ship Security Facility]]
 +
* [[AEGIS Secure Capital Construction Forge]]
 +
* [[AEGIS Secure Transfer Facility]]
 +
* [[Overmind Nursery Groves]] - Does not feature any actual hacking and can treated more like a combat site
 +
* [[Faction_warfare#Operation_Centers|Faction Warfare Operation Center]] e.g. "Caldari Operation Center"
 +
* [[SCC Secure Key Storage]]
 +
 
 +
== Sleeper caches ==
 
{{main|Sleeper Cache}}
 
{{main|Sleeper Cache}}
 
Sleeper caches are data sites with various triggers and dangers. They are significantly more difficult than pirate data sites. Sleeper caches spawn in normal space and do ''not'' spawn in wormholes even though the sleeper connection would imply the opposite; they are not to be confused with the Forgotten [[#Sleeper sites|Sleeper sites]], which function more like combat sites.
 
Sleeper caches are data sites with various triggers and dangers. They are significantly more difficult than pirate data sites. Sleeper caches spawn in normal space and do ''not'' spawn in wormholes even though the sleeper connection would imply the opposite; they are not to be confused with the Forgotten [[#Sleeper sites|Sleeper sites]], which function more like combat sites.
  
 
The Sleeper Caches from easiest to hardest are:
 
The Sleeper Caches from easiest to hardest are:
*[[Limited Sleeper Cache]] Level IV scanning difficulty
+
* [[Limited Sleeper Cache]] Level IV scanning difficulty
*[[Standard Sleeper Cache]] Level IV scanning difficulty
+
* [[Standard Sleeper Cache]] Level IV scanning difficulty
*[[Superior Sleeper Cache]] Level V scanning difficulty
+
* [[Superior Sleeper Cache]] Level V scanning difficulty
  
 
Sleeper caches are gated deadspace pockets with size limits for entry. Each sleeper cache has its own set of dangers. They contain a mixture of containers with damaging explosions on a failed hack, timed triggers, hazardous clouds, proximity explosions and sentry guns. For details see the page for individual sleeper cache.
 
Sleeper caches are gated deadspace pockets with size limits for entry. Each sleeper cache has its own set of dangers. They contain a mixture of containers with damaging explosions on a failed hack, timed triggers, hazardous clouds, proximity explosions and sentry guns. For details see the page for individual sleeper cache.
Line 50: Line 84:
 
Sleeper caches contain sleeper components, manufacturing materials, skill books and blueprint copies for polarized weapons.
 
Sleeper caches contain sleeper components, manufacturing materials, skill books and blueprint copies for polarized weapons.
  
==Ghost sites==
+
== Ghost sites ==
 
{{main|Ghost Site}}
 
{{main|Ghost Site}}
 
Ghost sites are data sites with limited time and riskier failures. They can be identified from {{co|wheat|"Covert Research Facility"}} on their name.
 
Ghost sites are data sites with limited time and riskier failures. They can be identified from {{co|wheat|"Covert Research Facility"}} on their name.
  
The sites have an invisible time limit after which strong NPC force will arrive, blow up remaining containers and attack the pilot on-site. The hacks are also riskier as single failure will cause the container to explode dealing 4000–6000 raw explosive damage to 10 km radius.
+
The sites have an invisible time limit after which a strong NPC force will arrive, blow up the remaining containers and attack the pilot on-site. The hacks are also riskier as a single failure will cause the container to explode dealing 4000–6000 raw explosive damage to a 10 km radius.
  
 
Ghost sites contain Covert Research Tools, Villard Wheels, blueprint copies for 'Packrat' and 'Magpie' Mobile Tractor Units, ‘Wetu’ and ‘Yurt’ Mobile Depots and Ascendancy implants.
 
Ghost sites contain Covert Research Tools, Villard Wheels, blueprint copies for 'Packrat' and 'Magpie' Mobile Tractor Units, ‘Wetu’ and ‘Yurt’ Mobile Depots and Ascendancy implants.
  
==Sleeper sites==
+
== Sleeper sites ==
 
{{main|Wormhole sites}}
 
{{main|Wormhole sites}}
Sleeper data and relic sites are found in wormholes. They are not empty, instead, they have strong sleepers defending the site that need to be defeated before hacking.  
+
Sleeper relic and data sites are found in wormholes. They are not empty, instead, they have strong sleepers defending the site that need to be defeated before hacking.  
  
Sleeper data and relic sites can be identified from {{co|wheat|"Forgotten"}} and {{co|wheat|"Unsecured"}} at the beginning of their names. The combat in them is harder than in combat anomalies of same wormhole class and the rats drop sleeper components as they do in combat sites. They can be run as combat sites only looting the wrecks and ignoring the hacking part.
+
Sleeper relic and data sites can be identified from {{co|wheat|"Forgotten"}} and {{co|wheat|"Unsecured"}} at the beginning of their names. The combat in them is harder than in combat anomalies of same wormhole class and the rats drop sleeper components as they do in combat sites. They can be run as combat sites only looting the wrecks and ignoring the hacking part.
  
==Silent Battleground==
+
== Silent Battleground ==
[[File:Silent_battleground.png|thumb|right|The Silent Battleground]]
+
[[File:Silent_battleground.png|thumb|The Silent Battleground]]
 
Silent Battleground is a very rare data site found in [[Shattered Wormhole Space|shattered wormholes]].
 
Silent Battleground is a very rare data site found in [[Shattered Wormhole Space|shattered wormholes]].
  
The silent battleground contains 20 data and relic cans scattered in 60 km radius, with no Sleeper rats present. It must be scanned down and requires decent skills to do so. Failing the hack twice does not blow up the can. The data cans contain data cores, and the relic cans contain T3 manufacturing components such as Intact Power Cores. Early reports suggest that this site operates on a timer and will explosively despawn after some time, though dealing no damage. This timer should be longer than 30 minutes. 3 hacking ships should be able to clear the entire site before this happens, however.
+
The silent battleground contains 20 relic and data cans scattered in 60 km radius, with no Sleeper rats present. It must be scanned down and requires decent skills to do so. Failing the hack twice does not blow up the can. The data cans contain data cores, and the relic cans contain T3 manufacturing components such as Intact Power Cores. Early reports suggest that this site operates on a timer and will explosively despawn after some time, though dealing no damage. This timer should be longer than 30 minutes. 3 hacking ships should be able to clear the entire site before this happens, however.
  
 
At the centre of the silent battleground is a wrecked [[Revenant]], suggesting an unexpected historical [[Sansha's Nation]] presence in these shattered wormholes. The wreck cannot be salvaged.
 
At the centre of the silent battleground is a wrecked [[Revenant]], suggesting an unexpected historical [[Sansha's Nation]] presence in these shattered wormholes. The wreck cannot be salvaged.
  
 
== Contested Covert Research Facilities ==
 
== Contested Covert Research Facilities ==
 +
{{ note box
 +
| Note that it is unclear to this author whether Contested Covert Research Facilities are still in the game; some sources seem to indicate that they were removed when the Besieged Covert Research Facilities were added. Another thing to consider is that the reward received may not be worth the effort and risk of doing them: you will almost certainly lose your ship if you attempt them in an untanked frigate, but carrying around tanking modules just for these sites may be inconvenient. -- 5 April 2017 [[User:Hirmuolio Pine|Hirmuolio Pine]]
 +
}}
  
{{ note box | Note that it is unclear to this author whether Contested Covert Research Facilities are still in the game; some sources seem to indicate that they were removed when the Besieged Covert Research Facilities were added. Another thing to consider is that the reward received may not be worth the effort and risk of doing them: you will almost certainly lose your ship if you attempt them in an untanked frigate, but carrying around tanking modules just for these sites may be inconvenient. }}
+
[[Contested Covert Research Facilities]] are hacking sites that may or may not be in the game anymore. They contain one hackable container. The site will self destruct and deal 2000 damage 45-60 seconds after warp-in.
  
[[Contested Covert Research Facilities]] are hacking sites that may or may not be in the game anymore. They contain one hackable container. The site will self destruct and deal 2000 damage 45-60 seconds after warp-in.
+
== Combat relic sites ==
==Combat relic sites==
 
 
Combat relic sites are very rare relic sites that spawn only in certain areas of Nullsec. They feature rats from many different pirate factions in large numbers. These sites are hard to run and should only be attempted by high-skill players.
 
Combat relic sites are very rare relic sites that spawn only in certain areas of Nullsec. They feature rats from many different pirate factions in large numbers. These sites are hard to run and should only be attempted by high-skill players.
*[[Bloated Ruins]] Found only in Wicked Creek(especially 760-9C constellation).
+
*[[Ancient Ruins]] Only found in Catch (especially in 9HXQ-G constellation)
*[[Wispy Ruins]] Found only in Feythabolis(especially I-3ODK constellation).
+
*[[Bloated Ruins]] Only found in Wicked Creek (especially in 760-9C constellation)
 +
*[[Crumbling Ruins]] Only found in Vale of the Silent
 +
*[[Festering Ruins]] Only found in Fountain
 +
*[[Forgotten Ruins]] Only found in Delve
 +
*[[Hidden Ruins]] Only found in Cloud Ring
 +
*[[Wispy Ruins]] Only found in Feythabolis (especially in I-3ODK constellation)
 +
 
 
== Tips and tricks==
 
== Tips and tricks==
 
* The contents of containers can be scanned with [[cargo scanning|cargo scanners]] before hacking. This allows skipping containers that do not have valuable contents.
 
* The contents of containers can be scanned with [[cargo scanning|cargo scanners]] before hacking. This allows skipping containers that do not have valuable contents.
* Emptied sites will despawn in few minutes. Sites that have been warped to or partially completed will despawn in a few hours.
+
* Emptied sites will despawn in few minutes. Sites that have been partially completed will despawn in a few hours.
 
* Once a site has despawned, the same site (sorted based on data or relic) will respawn within 2 minutes within the same region, but never within the same system.
 
* Once a site has despawned, the same site (sorted based on data or relic) will respawn within 2 minutes within the same region, but never within the same system.
 
* Sites with difficulty levels I and II should be scannable for any ship fitted with a core probe launcher, and a set of Sister's core probe scanners. However, as the difficulty level of the site increases, the minimum scanning strength required also increases.  
 
* Sites with difficulty levels I and II should be scannable for any ship fitted with a core probe launcher, and a set of Sister's core probe scanners. However, as the difficulty level of the site increases, the minimum scanning strength required also increases.  
 
* Sites with difficulty levels III and higher normally need to be scanned by a scanning-bonused ship. However, some level III sites may still be scanned by any ship if it is fitted with a Sisters core probe launcher.
 
* Sites with difficulty levels III and higher normally need to be scanned by a scanning-bonused ship. However, some level III sites may still be scanned by any ship if it is fitted with a Sisters core probe launcher.
 
* The recommended scan strength for level IV sites is around 90, while the recommended scan strength for level V sites is 100 and above.
 
* The recommended scan strength for level IV sites is around 90, while the recommended scan strength for level V sites is 100 and above.
* After the DownTime all Relic and Data sites update their containers. For example, you hack 5/6 containers and leave 1. After DT all these containers will be updated and you can hack them again.
+
* After the daily [[Server downtime|downtime]] (DT) all Relic and Data sites update their containers. For example, you hack 5/6 containers and leave 1. After DT all these containers will be updated and you can hack them again.
  
 
== Is this site "safe" to warp to? ==
 
== Is this site "safe" to warp to? ==
 +
The following are quick reference tables for evaluating PvE exploration site dangers<ref>https://wiki.signalcartel.space/Public:Exploration_Site_Safety_Guide Signal Cartels Exploration Site Safety Guide.</ref> (such as hostile NPCs and/or exploding cans) based on the cosmic signature name. Thank you to David Louis for the original, but now out of date [https://forums.eve-scout.com/topic/409/safety-can-i-warp-to-this-site forum post]
  
The following tables give a quick overview of whether a site is "safe" or not. This only relates to PVE hazards (like rats or exploding cans) NOT to other people hunting you down!
+
{{Note box|'''Note:''' "SAFE" does not mean you are safe from PvP. Always assume you are being hunted by other players. Be forever vigilant dear explorers!}}
  
{| class="wikitable"
+
 
 +
{| class="wikitable" style="text-align: center;"
 +
|-
 +
! rowspan=2 | Relic Sites !! rowspan=2 | Site Safety !! colspan=3 | Security !! colspan=6 | Wormholes
 
|-
 
|-
! Relic Sites !! Is it "Safe"? !! Hic Sec !! Low Sec!! Null Sec !! C1 WH !! C2 WH !! C3 WH !! C4 WH !! C5 WH !! C6 WH
+
! High !! Low !! Null !! C1 !! C2 !! C3 !! C4 !! C5 !! C6  
 
|-
 
|-
| Crumbling <> || Safe || x ||  ||  ||  ||  ||  ||  ||  ||  
+
| style="text-align:left;" | Crumbling <> || Safe || x ||  ||  ||  ||  ||  ||  ||  ||  
 
|-
 
|-
| Decayed <> || Safe ||  || x ||  ||  ||  ||  ||  ||  ||  
+
| style="text-align:left;" | Decayed <> || Safe ||  || x ||  ||  ||  ||  ||  ||  ||  
 
|-
 
|-
| Ruined <> || Safe ||  ||  || x || x || x || x ||   ||  ||   
+
| style="text-align:left;" | Ruined <> || Safe ||  ||  || x || x || x || x || * ||  ||   
 
|-
 
|-
| Forgotten <> || NOT Safe ||  ||  ||  || x || x || x || x || x || x  
+
| style="text-align:left;" | Forgotten <> || NOT Safe ||  ||  ||  || x || x || x || x || x || x  
 
|}
 
|}
Shattered systems may cause other sites to spawn in C4+ systems. A Ruined site was found in J002625 on 02/29/2020 in a C4.
 
  
{| class="wikitable"
+
{| class="wikitable" style="text-align: center;"
 +
|-
 +
! rowspan=2 | Data Sites !! rowspan=2 | Site Safety !! colspan=3 | Security !! colspan=6 | Wormholes
 +
|-
 +
! High !! Low !! Null !! C1 !! C2 !! C3 !! C4 !! C5 !! C6
 +
|-
 +
| style="text-align:left;" | Local <> || Safe || x ||  ||  ||  ||  ||  ||  ||  ||
 
|-
 
|-
! Data Sites !! Is it "Safe"? !! Hic Sec !! Low Sec!! Null Sec !! C1 WH !! C2 WH !! C3 WH !! C4 WH !! C5 WH !! C6 WH
+
| style="text-align:left;" | Regional <> || Safe ||  || x ||  ||  ||  ||  ||  ||  ||
 
|-
 
|-
| Local <> || Safe || x ||  || || || || || || ||  
+
| style="text-align:left;" | Central <> || Safe || ||  || x || x || x || x || * ||   ||
 
|-
 
|-
| Regional <> || Safe ||  || x ||  || || || || || ||  
+
| style="text-align:left;" | Unsecured <> || NOT Safe ||  || ||  || x || x || x || x || x || x
 
|-
 
|-
| Central <> || Safe ||  || || x || x || x || x ||   ||   ||
+
| style="text-align:left;" | AEGIS <> || NOT Safe||  || x || x || || || || || x || x
 
|-
 
|-
| Unsecured <> || NOT safe ||  || || || x || x || x || x || x || x  
+
| style="text-align:left;" | SCC <> || NOT Safe||  || x || x || || || || || x || x
 
|}
 
|}
  
{| class="wikitable"
+
Exceptions and details for [[Shattered wormhole systems]]:
 +
* Shattered systems can spawn sites of their own class and also one class higher or lower. This technically allows Ruined and Central sites to exist in a C4 system, since it can spawn sites usually only found in C3 space. However, shattered systems are rare, and all other C4 systems do not spawn these sites.
 +
* C13 or "small ship" shattered systems contain sites only found in C1, C2, or C3 systems. This includes Ruined and Central sites.
 +
* [[#Silent Battleground|Silent Battleground]] (a very rare Data Site) in Shattered systems is SAFE.</small>
 +
 
 +
{| class="wikitable" style="text-align: center;"
 +
|-
 +
! rowspan=2 | Drone Data Sites !! rowspan=2 | Site Safety !! colspan=3 | Security !! colspan=6 | Wormholes
 
|-
 
|-
! Drone Data Sites !! Is it "Safe"? !! Hic Sec !! Low Sec!! Null Sec !! C1 WH !! C2 WH !! C3 WH !! C4 WH !! C5 WH !! C6 WH
+
! High !! Low !! Null !! C1 !! C2 !! C3 !! C4 !! C5 !! C6  
 
|-
 
|-
| Abandoned Research Complex <> || NOT safe ||  ||  || x ||  ||  ||  ||  ||  ||  
+
| style="text-align:left;" | Abandoned Research Complex <> || NOT safe ||  ||  || x ||  ||  ||  ||  ||  ||  
 
|}
 
|}
  
{| class="wikitable"
+
{| class="wikitable" style="text-align: center;"
 +
|-
 +
! rowspan=2 | Ghost Data Sites !! rowspan=2 | Site Safety !! colspan=3 | Security !! colspan=6 | Wormholes
 
|-
 
|-
! Ghost Data Sites !! Is it "Safe"? !! Hic Sec !! Low Sec!! Null Sec !! C1 WH !! C2 WH !! C3 WH !! C4 WH !! C5 WH !! C6 WH
+
! High !! Low !! Null !! C1 !! C2 !! C3 !! C4 !! C5 !! C6  
 
|-
 
|-
| Lesser <> Covert Research Facility || NOT Safe || x ||  ||  ||  ||  ||  ||  ||  ||  
+
| style="text-align:left;" | Lesser <> Covert Research Facility || NOT Safe || x ||  ||  ||  ||  ||  ||  ||  ||  
 
|-
 
|-
| Standard <> Covert Research Facility || NOT Safe ||  || x ||  ||  ||  ||  ||  ||  ||  
+
| style="text-align:left;" | Standard <> Covert Research Facility || NOT Safe ||  || x ||  ||  ||  ||  ||  ||  ||  
 
|-
 
|-
| Improved <> Covert Research Facility || NOT Safe ||  ||  || x ||  ||  ||  ||  ||  ||   
+
| style="text-align:left;" | Improved <> Covert Research Facility || NOT Safe ||  ||  || x ||  ||  ||  ||  ||  ||   
 
|-
 
|-
| Superior <> Covert Research Facility || NOT safe ||  ||  ||  || x || x || x || x || x || x  
+
| style="text-align:left;" | Superior <> Covert Research Facility || NOT safe ||  ||  ||  || x || x || x || x || x || x  
 
|}
 
|}
  
{| class="wikitable"
+
{| class="wikitable" style="text-align: center;"
 +
|-
 +
! rowspan=2 | Sleeper Cache Data Sites !! rowspan=2 | Site Safety !! colspan=3 | Security !! colspan=6 | Wormholes
 
|-
 
|-
! Sleeper Cache Data Sites !! Is it "Safe"? !! Hic Sec !! Low Sec!! Null Sec !! C1 WH !! C2 WH !! C3 WH !! C4 WH !! C5 WH !! C6 WH
+
! High !! Low !! Null !! C1 !! C2 !! C3 !! C4 !! C5 !! C6  
 
|-
 
|-
| Limited Sleeper Cache || NOT Safe || x || x || x ||  ||  ||  ||  ||  ||  
+
| style="text-align:left;" | Limited Sleeper Cache || NOT Safe || x || x || x ||  ||  ||  ||  ||  ||  
 
|-
 
|-
| Standard Sleeper Cache || NOT Safe || x || x || x ||  ||  ||  ||  ||  ||  
+
| style="text-align:left;" | Standard Sleeper Cache || NOT Safe || x || x || x ||  ||  ||  ||  ||  ||  
 
|-
 
|-
| Superior Sleeper Cache || NOT Safe || x || x || x ||  ||  ||  ||  ||  ||   
+
| style="text-align:left;" | Superior Sleeper Cache || NOT Safe || x || x || x ||  ||  ||  ||  ||  ||   
 
|}
 
|}
  
{| class="wikitable"
+
{| class="wikitable" style="text-align: center;"
 +
|-
 +
! rowspan=2 | Gas Sites !! rowspan=2 | Site Safety !! colspan=3 | Security !! colspan=6 | Wormholes
 +
|-
 +
! High !! Low !! Null !! C1 !! C2 !! C3 !! C4 !! C5 !! C6
 +
|-
 +
| rowspan=2 style="text-align:left;" | <> Nebula || Safe || x || x ||  ||  ||  ||  ||  ||  ||
 
|-
 
|-
! Gas Sites !! Is it "Safe"? !! Hic Sec !! Low Sec!! Null Sec !! C1 WH !! C2 WH !! C3 WH !! C4 WH !! C5 WH !! C6 WH
+
| NOT Safe ||  ||  || x ||  ||  ||  ||  ||  ||
 
|-
 
|-
| <> || NOT Safe || x || x || x || x || x || x || x || x || x
+
| style="text-align:left;" | <> Reservoir || NOT Safe || || || || x || x || x || x || x || x
 
|}
 
|}
  
 +
With [[Ordinary Perimeter Reservoir|one exception]], the sleeper NPCs in wormhole gas sites appear according to a timer after the first capsuleer initiates warp to the site. This allows for what is commonly called [[Gas cloud harvesting#Fullerenes|'ninja-huffing']], i.e. gas harvesting during the "safe" period before they spawn. Some gas sites in null-sec do not have NPCs spawn; for detailed info, refer to the [[Gas cloud harvesting#Cytoserocin|full list]] of sites.
  
(Credit to David Louis for making an overview like this one: https://forums.eve-scout.com/topic/409/safety-can-i-warp-to-this-site)
+
{{Note box|1= '''Table Legend'''{{Plainlist|1=
 
+
* <> = wildcard
== Pirate relic site loot==
+
* SAFE = no NPCs; no Timers; nothing bad you can activate
 +
* X = possible site location
 +
* HS = high sec; LS = low sec; NS = null sec
 +
* C1 - C6 = wormhole system class
 +
}}
 +
}}
  
 +
== Pirate relic site loot ==
 
Pirate faction relic sites contain the following items:
 
Pirate faction relic sites contain the following items:
 
* Salvage. Type of salvage is based on the faction.
 
* Salvage. Type of salvage is based on the faction.
Line 173: Line 248:
 
Based on research done by MacrophageNT the relic site contents follow certain simple rules<ref name="relic distribution">[https://www.reddit.com/r/Eve/comments/af7536/the_ultimate_nullsec_faction_relicdata_sites/ The Ultimate Nullsec Faction Relic/Data Sites Profitability Comparison]</ref>. The following information is for sites in null security space, the distribution of materials in other areas is likely identical but with lower drop rates.
 
Based on research done by MacrophageNT the relic site contents follow certain simple rules<ref name="relic distribution">[https://www.reddit.com/r/Eve/comments/af7536/the_ultimate_nullsec_faction_relicdata_sites/ The Ultimate Nullsec Faction Relic/Data Sites Profitability Comparison]</ref>. The following information is for sites in null security space, the distribution of materials in other areas is likely identical but with lower drop rates.
  
{| class="wikitable" style="text-align: center;padding:10px;"
+
{| class="wikitable" style="text-align: center;"
 
|-
 
|-
 
! Salvage !! Angel Cartel !! Blood Raiders !! Guristas !! Sansha's nation !! Serpentis
 
! Salvage !! Angel Cartel !! Blood Raiders !! Guristas !! Sansha's nation !! Serpentis
 
|-
 
|-
|style="text-align:right;"|Artificial Neural Network&nbsp;|| x || x || x || x || x
+
| style="text-align: left;" | Artificial Neural Network || x || x || x || x || x
 
|-
 
|-
|style="text-align:right;"|Damaged Artificial Neural Network&nbsp;|| x || x || x || x || x
+
| style="text-align: left;" | Damaged Artificial Neural Network || x || x || x || x || x
 
|-
 
|-
|style="text-align:right;"|Interface Circuit&nbsp;|| x || x || x || x || x
+
| style="text-align: left;" | Interface Circuit || x || x || x || x || x
 
|-
 
|-
|style="text-align:right;"|Fried Interface Circuit&nbsp;|| x || x || x || x || x
+
| style="text-align: left;" | Fried Interface Circuit || x || x || x || x || x
 
|-
 
|-
|style="text-align:right;"|Logic Circuit&nbsp;|| x || x || x || x || x
+
| style="text-align: left;" | Logic Circuit || x || x || x || x || x
 
|-
 
|-
|style="text-align:right;"|Burned Logic Circuit&nbsp;|| x || x || x || x || x
+
| style="text-align: left;" | Burned Logic Circuit || x || x || x || x || x
 
|-
 
|-
|style="text-align:right;"|Micro Circuit&nbsp;|| x || x || x || x || x
+
| style="text-align: left;" | Micro Circuit || x || x || x || x || x
 
|-
 
|-
|style="text-align:right;"|Charred Micro Circuit&nbsp;|| x || x || x || x || x
+
| style="text-align: left;" | Charred Micro Circuit || x || x || x || x || x
 
|-
 
|-
|style="text-align:right;"|Power Circuit&nbsp;|| x || x || x || x || x  
+
| style="text-align: left;" | Power Circuit || x || x || x || x || x  
 
|-
 
|-
|style="text-align:right;"|Tripped Power Circuit&nbsp;|| x || x || x || x || x  
+
| style="text-align: left;" | Tripped Power Circuit || x || x || x || x || x  
 
|-
 
|-
|style="text-align:right;"|Impetus Console&nbsp;|| x ||&nbsp;||&nbsp;||&nbsp;||&nbsp;
+
| style="text-align: left;" | Impetus Console || x || || || ||
 
|-
 
|-
|style="text-align:right;"|Thruster Console&nbsp;|| x ||&nbsp;||&nbsp;||&nbsp;||&nbsp;
+
| style="text-align: left;" | Thruster Console || x || || || ||
 
|-
 
|-
|style="text-align:right;"|Single-crystal Superalloy I-beam&nbsp;|| x ||&nbsp;||&nbsp;||&nbsp;||&nbsp;
+
| style="text-align: left;" | Single-crystal Superalloy I-beam || x || || || ||
 
|-
 
|-
|style="text-align:right;"|Alloyed Tritanium Bar&nbsp;|| x ||&nbsp;||&nbsp;||&nbsp;||&nbsp;
+
| style="text-align: left;" | Alloyed Tritanium Bar || x || || || ||
 
|-
 
|-
|style="text-align:right;"|Trigger Unit&nbsp;|| x ||&nbsp;||&nbsp;||&nbsp;||&nbsp;
+
| style="text-align: left;" | Trigger Unit || x || || || ||
 
|-
 
|-
|style="text-align:right;"|Smashed Trigger Unit&nbsp;|| x ||&nbsp;||&nbsp;||&nbsp;||&nbsp;
+
| style="text-align: left;" | Smashed Trigger Unit || x || || || ||
 
|-
 
|-
|style="text-align:right;"|Capacitor Console&nbsp;||&nbsp;|| x ||&nbsp;||&nbsp;||&nbsp;
+
| style="text-align: left;" | Capacitor Console || || x || || ||
 
|-
 
|-
|style="text-align:right;"|Melted Capacitor Console&nbsp;||&nbsp;|| x ||&nbsp;||&nbsp;||&nbsp;
+
| style="text-align: left;" | Melted Capacitor Console || || x || || ||
 
|-
 
|-
|style="text-align:right;"|Power Conduit&nbsp;||&nbsp;|| x ||&nbsp;||&nbsp;||&nbsp;
+
| style="text-align: left;" | Power Conduit || || x || || ||
 
|-
 
|-
|style="text-align:right;"|Tangled Power Conduit&nbsp;||&nbsp;|| x ||&nbsp;||&nbsp;||&nbsp;
+
| style="text-align: left;" | Tangled Power Conduit || || x || || ||
 
|-
 
|-
|style="text-align:right;"|Enhanced Ward Console&nbsp;||&nbsp;||&nbsp;|| x ||&nbsp;||&nbsp;
+
| style="text-align: left;" | Enhanced Ward Console || || || x || ||
 
|-
 
|-
|style="text-align:right;"|Ward Console&nbsp;||&nbsp;||&nbsp;|| x ||&nbsp;||&nbsp;
+
| style="text-align: left;" | Ward Console || || || x || ||
 
|-
 
|-
|style="text-align:right;"|Intact Shield Emitter&nbsp;||&nbsp;||&nbsp;|| x ||&nbsp;||&nbsp;
+
| style="text-align: left;" | Intact Shield Emitter || || || x || ||
 
|-
 
|-
|style="text-align:right;"|Malfunctioning Shield Emitter&nbsp;||&nbsp;||&nbsp;|| x ||&nbsp;|| x
+
| style="text-align: left;" | Malfunctioning Shield Emitter || || || x || || x
 
|-
 
|-
|style="text-align:right;"|Telemetry Processor&nbsp;||&nbsp;||&nbsp;|| x ||&nbsp;||&nbsp;
+
| style="text-align: left;" | Telemetry Processor || || || x || ||
 
|-
 
|-
|style="text-align:right;"|Scorched Telemetry Processor&nbsp;||&nbsp;||&nbsp;|| x ||&nbsp;||&nbsp;
+
| style="text-align: left;" | Scorched Telemetry Processor || || || x || ||
 
|-
 
|-
|style="text-align:right;"|Current Pump&nbsp;||&nbsp;||&nbsp;||&nbsp;|| x ||&nbsp;
+
| style="text-align: left;" | Current Pump || || || || x ||
 
|-
 
|-
|style="text-align:right;"|Defective Current Pump&nbsp;||&nbsp;||&nbsp;||&nbsp;|| x ||&nbsp;
+
| style="text-align: left;" | Defective Current Pump || || || || x ||
 
|-
 
|-
|style="text-align:right;"|Intact Armor Plates&nbsp;||&nbsp;||&nbsp;||&nbsp;|| x ||&nbsp;
+
| style="text-align: left;" | Intact Armor Plates || || || || x ||
 
|-
 
|-
|style="text-align:right;"|Armor Plates&nbsp;||&nbsp;||&nbsp;||&nbsp;|| x ||&nbsp;
+
| style="text-align: left;" | Armor Plates || || || || x ||
 
|-
 
|-
|style="text-align:right;"|Nanite Compound&nbsp;||&nbsp;||&nbsp;||&nbsp;|| x ||&nbsp;
+
| style="text-align: left;" | Nanite Compound || || || || x ||
 
|-
 
|-
|style="text-align:right;"|Contaminated Nanite Compound&nbsp;||&nbsp;||&nbsp;||&nbsp;|| x ||&nbsp;
+
| style="text-align: left;" | Contaminated Nanite Compound || || || || x ||
 
|-
 
|-
|style="text-align:right;"|Conductive Thermoplastic&nbsp;||&nbsp;||&nbsp;||&nbsp;||&nbsp;|| x
+
| style="text-align: left;" | Conductive Thermoplastic || || || || || x
 
|-
 
|-
|style="text-align:right;"|Conductive Polymer&nbsp;||&nbsp;||&nbsp;||&nbsp;||&nbsp;|| x
+
| style="text-align: left;" | Conductive Polymer || || || || || x
 
|-
 
|-
|style="text-align:right;"|Drone Transceiver&nbsp;||&nbsp;||&nbsp;||&nbsp;||&nbsp;|| x
+
| style="text-align: left;" | Drone Transceiver || || || || || x
 
|-
 
|-
|style="text-align:right;"|Broken Drone Transceiver&nbsp;||&nbsp;||&nbsp;||&nbsp;||&nbsp;|| x
+
| style="text-align: left;" | Broken Drone Transceiver || || || || || x
 
|-
 
|-
|style="text-align:right;"|Lorentz Fluid&nbsp;||&nbsp;||&nbsp;||&nbsp;||&nbsp;|| x
+
| style="text-align: left;" | Lorentz Fluid || || || || || x
 
|-
 
|-
|style="text-align:right;"|Contaminated Lorentz Fluid&nbsp;||&nbsp;||&nbsp;||&nbsp;||&nbsp;|| x
+
| style="text-align: left;" | Contaminated Lorentz Fluid || || || || || x
 
|}
 
|}
  
Line 291: Line 366:
 
      
 
      
 
Angel Cartel:
 
Angel Cartel:
https://evepraisal.com/a/ks83x?live&#61;yes
+
https://janice.e-351.com/a/ypaCO6
  
 
     Artificial Neural Network 472
 
     Artificial Neural Network 472
Line 311: Line 386:
 
      
 
      
 
Blood Raider Covenant:
 
Blood Raider Covenant:
https://evepraisal.com/a/ks845?live&#61;yes
+
https://janice.e-351.com/a/bjz3kc
  
 
     Artificial Neural Network 472
 
     Artificial Neural Network 472
Line 329: Line 404:
 
      
 
      
 
Guristas Pirates:
 
Guristas Pirates:
https://evepraisal.com/a/ks84e?live&#61;yes
+
https://janice.e-351.com/a/7YKOpP
  
 
     Artificial Neural Network 472
 
     Artificial Neural Network 472
Line 349: Line 424:
 
      
 
      
 
Sansha's Nation:
 
Sansha's Nation:
https://evepraisal.com/a/ks84k?live&#61;yes
+
https://janice.e-351.com/a/pXC4r5
  
 
     Artificial Neural Network 472
 
     Artificial Neural Network 472
Line 365: Line 440:
 
     Tripped Power Circuit 3945
 
     Tripped Power Circuit 3945
 
     Defective Current Pump 3945
 
     Defective Current Pump 3945
     Armour Plates 3945
+
     Armor Plates 3945
 
     Contaminated Nanite Compound 3945
 
     Contaminated Nanite Compound 3945
 
      
 
      
 
Serpentis Corporation:
 
Serpentis Corporation:
https://evepraisal.com/a/ks84q?live&#61;yes
+
https://janice.e-351.com/a/LbsFmu
  
 
     Artificial Neural Network 472
 
     Artificial Neural Network 472
Line 388: Line 463:
 
     Broken Drone Transceiver 3945
 
     Broken Drone Transceiver 3945
 
     Contaminated Lorentz Fluid 3945
 
     Contaminated Lorentz Fluid 3945
|collapsed=yes}}
+
|collapsed= yes}}
  
 
== Pirate data site loot ==
 
== Pirate data site loot ==
 
 
Data sites of pirate factions contain the following items:
 
Data sites of pirate factions contain the following items:
 
* Decryptors of all types
 
* Decryptors of all types
Line 409: Line 483:
 
* Datacores. See the table below to see which faction has what.
 
* Datacores. See the table below to see which faction has what.
  
{| class="wikitable"
+
{| class="wikitable" style="text-align: center;"
 
! Datacore
 
! Datacore
! style="text-align: center;" | Angel Cartel
+
! Angel Cartel
! style="text-align: center;" | Blood Raider
+
! Blood Raider
! style="text-align: center;" | Guristas
+
! Guristas
! style="text-align: center;" | Sansha's Nation
+
! Sansha's Nation
! style="text-align: center;" | Serpentis
+
! Serpentis
 
|-
 
|-
| Mechanical Engineering
+
| style="text-align: left;" | Mechanical Engineering
| style="text-align: center;" | x
+
| x
| style="text-align: center;" | x
+
| x
| style="text-align: center;" | x
+
| x
| style="text-align: center;" | x
+
| x
| style="text-align: center;" | x
+
| x
 
|-
 
|-
| Hydromagnetic Physics
+
| style="text-align: left;" | Hydromagnetic Physics
| style="text-align: center;" | &nbsp;
+
|  
| style="text-align: center;" | x
+
| x
| style="text-align: center;" | x
+
| x
| style="text-align: center;" | x
+
| x
| style="text-align: center;" | &nbsp;
+
|  
 
|-
 
|-
| Molecular Engineering
+
| style="text-align: left;" | Molecular Engineering
| style="text-align: center;" | x
+
| x
| style="text-align: center;" | x
+
| x
| style="text-align: center;" | &nbsp;
+
|  
| style="text-align: center;" | x
+
| x
| style="text-align: center;" | &nbsp;
+
|  
 
|-
 
|-
| Nanite Engineering
+
| style="text-align: left;" | Nanite Engineering
| style="text-align: center;" | x
+
| x
| style="text-align: center;" | x
+
| x
| style="text-align: center;" | &nbsp;
+
|  
| style="text-align: center;" | x
+
| x
| style="text-align: center;" | &nbsp;
+
|  
 
|-
 
|-
| Quantum Physics
+
| style="text-align: left;" | Quantum Physics
| style="text-align: center;" | &nbsp;
+
|  
| style="text-align: center;" | x
+
| x
| style="text-align: center;" | x
+
| x
| style="text-align: center;" | x
+
| x
| style="text-align: center;" | &nbsp;
+
|  
 
|-
 
|-
| Amarrian Starship Engineering
+
| style="text-align: left;" | Amarrian Starship Engineering
| style="text-align: center;" | &nbsp;
+
|  
| style="text-align: center;" | x
+
| x
| style="text-align: center;" | &nbsp;
+
|  
| style="text-align: center;" | x
+
| x
| style="text-align: center;" | &nbsp;
+
|  
 
|-
 
|-
| Electromagnetic Physics
+
| style="text-align: left;" | Electromagnetic Physics
| style="text-align: center;" | &nbsp;
+
|  
| style="text-align: center;" | &nbsp;
+
|  
| style="text-align: center;" | x
+
| x
| style="text-align: center;" | &nbsp;
+
|  
| style="text-align: center;" | x
+
| x
 
|-
 
|-
| Electronic Engineering
+
| style="text-align: left;" | Electronic Engineering
| style="text-align: center;" | &nbsp;
+
|  
| style="text-align: center;" | &nbsp;
+
|  
| style="text-align: center;" | x
+
| x
| style="text-align: center;" | &nbsp;
+
|  
| style="text-align: center;" | x
+
| x
 
|-
 
|-
| Graviton Physics
+
| style="text-align: left;" | Graviton Physics
| style="text-align: center;" | &nbsp;
+
|  
| style="text-align: center;" | &nbsp;
+
|  
| style="text-align: center;" | x
+
| x
| style="text-align: center;" | &nbsp;
+
|  
| style="text-align: center;" | x
+
| x
 
|-
 
|-
| High Energy Physics
+
| style="text-align: left;" | High Energy Physics
| style="text-align: center;" | &nbsp;
+
|  
| style="text-align: center;" | x
+
| x
| style="text-align: center;" | &nbsp;
+
|  
| style="text-align: center;" | x
+
| x
| style="text-align: center;" | &nbsp;
+
|  
 
|-
 
|-
| Laser Physics
+
| style="text-align: left;" | Laser Physics
| style="text-align: center;" | &nbsp;
+
|  
| style="text-align: center;" | x
+
| x
| style="text-align: center;" | &nbsp;
+
|  
| style="text-align: center;" | x
+
| x
| style="text-align: center;" | &nbsp;
+
|  
 
|-
 
|-
| Rocket Science
+
| style="text-align: left;" | Rocket Science
| style="text-align: center;" | x
+
| x
| style="text-align: center;" | &nbsp;
+
|  
| style="text-align: center;" | x
+
| x
| style="text-align: center;" | &nbsp;
+
|  
| style="text-align: center;" | &nbsp;
+
|  
 
|-
 
|-
| Caldari Starship Engineering
+
| style="text-align: left;" | Caldari Starship Engineering
| style="text-align: center;" | &nbsp;
+
|  
| style="text-align: center;" | &nbsp;
+
|  
| style="text-align: center;" | x
+
| x
| style="text-align: center;" | &nbsp;
+
|  
| style="text-align: center;" | &nbsp;
+
|  
 
|-
 
|-
| Gallentean Starship Engineering
+
| style="text-align: left;" | Gallentean Starship Engineering
| style="text-align: center;" | &nbsp;
+
|  
| style="text-align: center;" | &nbsp;
+
|  
| style="text-align: center;" | &nbsp;
+
|  
| style="text-align: center;" | &nbsp;
+
|  
| style="text-align: center;" | x
+
| x
 
|-
 
|-
| Minmatar Starship Engineering
+
| style="text-align: left;" | Minmatar Starship Engineering
| style="text-align: center;" | x
+
| x
| style="text-align: center;" | &nbsp;
+
|  
| style="text-align: center;" | &nbsp;
+
|  
| style="text-align: center;" | &nbsp;
+
|  
| style="text-align: center;" | &nbsp;
+
|  
 
|-
 
|-
| Nuclear Physics
+
| style="text-align: left;" | Nuclear Physics
| style="text-align: center;" | x
+
| x
| style="text-align: center;" | &nbsp;
+
|  
| style="text-align: center;" | &nbsp;
+
|  
| style="text-align: center;" | &nbsp;
+
|  
| style="text-align: center;" | &nbsp;
+
|  
 
|-
 
|-
| Plasma Physics
+
| style="text-align: left;" | Plasma Physics
| style="text-align: center;" | &nbsp;
+
|  
| style="text-align: center;" | &nbsp;
+
|  
| style="text-align: center;" | &nbsp;
+
|  
| style="text-align: center;" | &nbsp;
+
|  
| style="text-align: center;" | x
+
| x
 
|}
 
|}
  
==See also==
+
== See also ==
* [http://community.eveonline.com/news/dev-blogs/ghastly-hotbed-of-spaceship-trauma/ Dev blog introducing Ghost Sites]
+
* Dev blog: [https://www.eveonline.com/news/view/ghastly-hotbed-of-spaceship-trauma Ghastly Hotbed Of Spaceship Trauma - Ghost Sites in Rubicon] - Introducing Ghost Sites
* [http://community.eveonline.com/news/dev-blogs/sweeping-death-and-chaos/ Dev blog introducing the Contested and Besieged Covert Research Facilities]
+
* Dev blog: [https://www.eveonline.com/news/view/sweeping-death-and-chaos Sweeping Death and Chaos: New Exploration Sites in Kronos] - Introducing the Contested and Besieged Covert Research Facilities
 
* [[List of data and relic sites]]
 
* [[List of data and relic sites]]
 +
 
== References ==
 
== References ==
 
<references/>
 
<references/>

Latest revision as of 17:28, 4 April 2024

Relic and data sites are types of cosmic signatures that can be found with probing. Relic and data sites can be divided into 5 categories:

  • Pirate relic and data sites
  • Drone data sites
  • Ghost sites
  • Sleeper caches
  • Sleeper sites

It should be noted that relic and data sites are also categorized into 5 different levels of difficulty, ranging from I to V. While a ship that is not bonus-ed to scanning can scan down a level I cosmic signature, even exploration-focused ships and fittings may struggle with level V sites.

Pirate sites

See also: List of data and relic sites

Pirate relic and data sites can be found in all normal space regions, in C1, C2 and C3 class wormhole systems, as well as in shattered wormhole systems. There are pockets of space populated with a variety of cosmic structures (i.e., wrecked stations, abandoned machines) and several containers that need to be hacked before the contents can be accessed. The sites do not have any triggers or NPC defenders. Pirate relic sites contain T1 and T2 salvage materials, skill books and blueprint copies. Pirate data sites contain decryptors, data cores, skill books, blueprint copies and manufacturing materials. The contents may vary by faction.

A Data Site container
A Relic Site container

Relic and data sites use the following naming convention according to their location.

Data site names Relic site names Location
Local (Faction) (site) Crumbling (Faction) (site) High-security systems
Regional (Faction) (site) Decayed (Faction) (site) Low-security systems
Central (Faction) (site) Ruined (Faction) (site) Null-security and wormhole systems

Data site containers have a physical appearance that resembles a gyroscope while relic site containers resemble ancient shipwrecks. The containers are named as follows.

Data site containers Relic site containers Difficulty
(Faction) Info Shard (Faction) Debris Very easy
(Faction) Com Tower (Faction) Rubble Easy
(Faction) Mainframe (Faction) Remains Medium
(Faction) Databank (Faction) Ruins Hard

The (Faction) in the above site and container names will be the local pirate group for each region. For a list of (site) names, see List of data and relic sites.

You'll have to hack into the containers first by playing the hacking minigame. In order to attempt a hack, you’ll need to lock on to the container and activate the corresponding hacking module. The module (Relic Analyzer in a relic site, Data Analyzer in a data site, or Integrated Analyzer for both) only works if the distance between the container and your ship is less or equal to the module's maximum activation range. Activating the module will open a new window containing the hacking minigame. Failing to hack a container twice will destroy it and its contents.

Drone data sites

Drone data sites spawn only in drone regions: Cobalt Edge, Perrigen Falls, Malpais, Oasa, Kalevala Expanse, Outer Passage, Etherium Reach, and The Spire. Drone data sites have two main differences from pirate data sites:

  • Failing the hack twice in drone data site will not destroy the container. Instead, there is a chance that failure spawns hostile frigates. These rogue drones can be easily handled by the drones of T1 explorer and do not pose a serious threat. These frigates need to be destroyed before you can hack again.
  • Drone data sites can escalate into another drone data site.

Drone data sites contain three hackable containers: Two "High-Security Containment Facility" and one "Research and Development Laboratories". Most of the time the lone research container is empty but leaving it unhacked misses possibility for data site escalation.

Drone data sites contain drone components and blueprint copies for ' Integrated' and 'Augmented' drones. Each drone region drop blueprint copies for different racial drones: Kalevala Expanse and The Spire for Minmatar, Malpais and Oasa for Caldari, Etherium Reach and Perrigen Falls for Gallente and finally Outer Passage and Cobalt Edge for Amarr.

Other data sites

Sleeper caches

Main article: Sleeper Cache

Sleeper caches are data sites with various triggers and dangers. They are significantly more difficult than pirate data sites. Sleeper caches spawn in normal space and do not spawn in wormholes even though the sleeper connection would imply the opposite; they are not to be confused with the Forgotten Sleeper sites, which function more like combat sites.

The Sleeper Caches from easiest to hardest are:

Sleeper caches are gated deadspace pockets with size limits for entry. Each sleeper cache has its own set of dangers. They contain a mixture of containers with damaging explosions on a failed hack, timed triggers, hazardous clouds, proximity explosions and sentry guns. For details see the page for individual sleeper cache.

Sleeper caches contain sleeper components, manufacturing materials, skill books and blueprint copies for polarized weapons.

Ghost sites

Main article: Ghost Site

Ghost sites are data sites with limited time and riskier failures. They can be identified from "Covert Research Facility" on their name.

The sites have an invisible time limit after which a strong NPC force will arrive, blow up the remaining containers and attack the pilot on-site. The hacks are also riskier as a single failure will cause the container to explode dealing 4000–6000 raw explosive damage to a 10 km radius.

Ghost sites contain Covert Research Tools, Villard Wheels, blueprint copies for 'Packrat' and 'Magpie' Mobile Tractor Units, ‘Wetu’ and ‘Yurt’ Mobile Depots and Ascendancy implants.

Sleeper sites

Main article: Wormhole sites

Sleeper relic and data sites are found in wormholes. They are not empty, instead, they have strong sleepers defending the site that need to be defeated before hacking.

Sleeper relic and data sites can be identified from "Forgotten" and "Unsecured" at the beginning of their names. The combat in them is harder than in combat anomalies of same wormhole class and the rats drop sleeper components as they do in combat sites. They can be run as combat sites only looting the wrecks and ignoring the hacking part.

Silent Battleground

The Silent Battleground

Silent Battleground is a very rare data site found in shattered wormholes.

The silent battleground contains 20 relic and data cans scattered in 60 km radius, with no Sleeper rats present. It must be scanned down and requires decent skills to do so. Failing the hack twice does not blow up the can. The data cans contain data cores, and the relic cans contain T3 manufacturing components such as Intact Power Cores. Early reports suggest that this site operates on a timer and will explosively despawn after some time, though dealing no damage. This timer should be longer than 30 minutes. 3 hacking ships should be able to clear the entire site before this happens, however.

At the centre of the silent battleground is a wrecked Revenant, suggesting an unexpected historical Sansha's Nation presence in these shattered wormholes. The wreck cannot be salvaged.

Contested Covert Research Facilities

Note that it is unclear to this author whether Contested Covert Research Facilities are still in the game; some sources seem to indicate that they were removed when the Besieged Covert Research Facilities were added. Another thing to consider is that the reward received may not be worth the effort and risk of doing them: you will almost certainly lose your ship if you attempt them in an untanked frigate, but carrying around tanking modules just for these sites may be inconvenient. -- 5 April 2017 Hirmuolio Pine

Contested Covert Research Facilities are hacking sites that may or may not be in the game anymore. They contain one hackable container. The site will self destruct and deal 2000 damage 45-60 seconds after warp-in.

Combat relic sites

Combat relic sites are very rare relic sites that spawn only in certain areas of Nullsec. They feature rats from many different pirate factions in large numbers. These sites are hard to run and should only be attempted by high-skill players.

Tips and tricks

  • The contents of containers can be scanned with cargo scanners before hacking. This allows skipping containers that do not have valuable contents.
  • Emptied sites will despawn in few minutes. Sites that have been partially completed will despawn in a few hours.
  • Once a site has despawned, the same site (sorted based on data or relic) will respawn within 2 minutes within the same region, but never within the same system.
  • Sites with difficulty levels I and II should be scannable for any ship fitted with a core probe launcher, and a set of Sister's core probe scanners. However, as the difficulty level of the site increases, the minimum scanning strength required also increases.
  • Sites with difficulty levels III and higher normally need to be scanned by a scanning-bonused ship. However, some level III sites may still be scanned by any ship if it is fitted with a Sisters core probe launcher.
  • The recommended scan strength for level IV sites is around 90, while the recommended scan strength for level V sites is 100 and above.
  • After the daily downtime (DT) all Relic and Data sites update their containers. For example, you hack 5/6 containers and leave 1. After DT all these containers will be updated and you can hack them again.

Is this site "safe" to warp to?

The following are quick reference tables for evaluating PvE exploration site dangers[1] (such as hostile NPCs and/or exploding cans) based on the cosmic signature name. Thank you to David Louis for the original, but now out of date forum post

Note: "SAFE" does not mean you are safe from PvP. Always assume you are being hunted by other players. Be forever vigilant dear explorers!


Relic Sites Site Safety Security Wormholes
High Low Null C1 C2 C3 C4 C5 C6
Crumbling <> Safe x
Decayed <> Safe x
Ruined <> Safe x x x x *
Forgotten <> NOT Safe x x x x x x
Data Sites Site Safety Security Wormholes
High Low Null C1 C2 C3 C4 C5 C6
Local <> Safe x
Regional <> Safe x
Central <> Safe x x x x *
Unsecured <> NOT Safe x x x x x x
AEGIS <> NOT Safe x x x x
SCC <> NOT Safe x x x x

Exceptions and details for Shattered wormhole systems:

  • Shattered systems can spawn sites of their own class and also one class higher or lower. This technically allows Ruined and Central sites to exist in a C4 system, since it can spawn sites usually only found in C3 space. However, shattered systems are rare, and all other C4 systems do not spawn these sites.
  • C13 or "small ship" shattered systems contain sites only found in C1, C2, or C3 systems. This includes Ruined and Central sites.
  • Silent Battleground (a very rare Data Site) in Shattered systems is SAFE.
Drone Data Sites Site Safety Security Wormholes
High Low Null C1 C2 C3 C4 C5 C6
Abandoned Research Complex <> NOT safe x
Ghost Data Sites Site Safety Security Wormholes
High Low Null C1 C2 C3 C4 C5 C6
Lesser <> Covert Research Facility NOT Safe x
Standard <> Covert Research Facility NOT Safe x
Improved <> Covert Research Facility NOT Safe x
Superior <> Covert Research Facility NOT safe x x x x x x
Sleeper Cache Data Sites Site Safety Security Wormholes
High Low Null C1 C2 C3 C4 C5 C6
Limited Sleeper Cache NOT Safe x x x
Standard Sleeper Cache NOT Safe x x x
Superior Sleeper Cache NOT Safe x x x
Gas Sites Site Safety Security Wormholes
High Low Null C1 C2 C3 C4 C5 C6
<> Nebula Safe x x
NOT Safe x
<> Reservoir NOT Safe x x x x x x

With one exception, the sleeper NPCs in wormhole gas sites appear according to a timer after the first capsuleer initiates warp to the site. This allows for what is commonly called 'ninja-huffing', i.e. gas harvesting during the "safe" period before they spawn. Some gas sites in null-sec do not have NPCs spawn; for detailed info, refer to the full list of sites.

Table Legend
  • <> = wildcard
  • SAFE = no NPCs; no Timers; nothing bad you can activate
  • X = possible site location
  • HS = high sec; LS = low sec; NS = null sec
  • C1 - C6 = wormhole system class

Pirate relic site loot

Pirate faction relic sites contain the following items:

  • Salvage. Type of salvage is based on the faction.
  • Carbon
  • Spatial attunement units
  • T2 rig blueprint copies
  • POS blueprint copies

Based on research done by MacrophageNT the relic site contents follow certain simple rules[2]. The following information is for sites in null security space, the distribution of materials in other areas is likely identical but with lower drop rates.

Salvage Angel Cartel Blood Raiders Guristas Sansha's nation Serpentis
Artificial Neural Network x x x x x
Damaged Artificial Neural Network x x x x x
Interface Circuit x x x x x
Fried Interface Circuit x x x x x
Logic Circuit x x x x x
Burned Logic Circuit x x x x x
Micro Circuit x x x x x
Charred Micro Circuit x x x x x
Power Circuit x x x x x
Tripped Power Circuit x x x x x
Impetus Console x
Thruster Console x
Single-crystal Superalloy I-beam x
Alloyed Tritanium Bar x
Trigger Unit x
Smashed Trigger Unit x
Capacitor Console x
Melted Capacitor Console x
Power Conduit x
Tangled Power Conduit x
Enhanced Ward Console x
Ward Console x
Intact Shield Emitter x
Malfunctioning Shield Emitter x x
Telemetry Processor x
Scorched Telemetry Processor x
Current Pump x
Defective Current Pump x
Intact Armor Plates x
Armor Plates x
Nanite Compound x
Contaminated Nanite Compound x
Conductive Thermoplastic x
Conductive Polymer x
Drone Transceiver x
Broken Drone Transceiver x
Lorentz Fluid x
Contaminated Lorentz Fluid x

Each relic site in null security space/wormholes contains three different kinds of containers: Rubble, remains and ruins. These containers always have the same loot distribution without influence from the site type.

Container T1 probability
(amount)
T2 probability
(amount)
Rubble  25% (3-20) 5.5% (1-3)
Remain  50% (5-40) 12.5% (1-5)
Ruin  0% 25% (1-15)

For example, in a "Rubble" container each T1 salvage has independent 25% probability to appear in a stack of 3-20 units. Stack sizes are all uniformly distributed so a stack of 1 is equally likely to a stack of 14.

The amount of different container types depends on the name of the relic site. As a result, higher rank relic sites are on average more valuable.

Site
(sec, level, % of sites)
Rubble Remains Ruins
Monument Site (null, 1, 40%) 2 3 1
Temple Site (null, 2, 30%) 1 3 2
Science outpost (null, 3, 20%) 0 4 2
Crystal Quarry (null, 4, 10%) 1 3 3

Based on the above information it is possible to calculate the expected value for each faction's null security sites.

Expected average site value
Paste this to appraisal, divide the result by 100 and you get the expected value per site for that faction.

Angel Cartel: https://janice.e-351.com/a/ypaCO6

   Artificial Neural Network 472
   Interface Circuit 472
   Logic Circuit 472
   Micro Circuit 472
   Power Circuit 472
   Impetus Console 472
   Single-crystal Superalloy I-beam 472
   Trigger Unit 472
   Damaged Artificial Neural Network 3945
   Fried Interface Circuit 3945
   Burned Logic Circuit 3945
   Charred Micro Circuit 3945
   Tripped Power Circuit 3945
   Thruster Console 3945
   Alloyed Tritanium Bar 3945
   Smashed Trigger Unit 3945
   

Blood Raider Covenant: https://janice.e-351.com/a/bjz3kc

   Artificial Neural Network 472
   Interface Circuit 472
   Logic Circuit 472
   Micro Circuit 472
   Power Circuit 472
   Capacitor Console 472
   Power Conduit 472
   Damaged Artificial Neural Network 3945
   Fried Interface Circuit 3945
   Burned Logic Circuit 3945
   Charred Micro Circuit 3945
   Tripped Power Circuit 3945
   Melted Capacitor Console 3945
   Tangled Power Conduit 3945
   

Guristas Pirates: https://janice.e-351.com/a/7YKOpP

   Artificial Neural Network 472
   Interface Circuit 472
   Logic Circuit 472
   Micro Circuit 472
   Power Circuit 472
   Enhanced Ward Console 472
   Intact Shield Emitter 472
   Telemetry Processor 472
   Damaged Artificial Neural Network 3945
   Fried Interface Circuit 3945
   Burned Logic Circuit 3945
   Charred Micro Circuit 3945
   Tripped Power Circuit 3945
   Ward Console 3945
   Malfunctioning Shield Emitter 3945
   Scorched Telemetry Processor 3945
   

Sansha's Nation: https://janice.e-351.com/a/pXC4r5

   Artificial Neural Network 472
   Interface Circuit 472
   Logic Circuit 472
   Micro Circuit 472
   Power Circuit 472
   Current Pump 472
   Intact Armor Plates 472
   Nanite Compound 472
   Damaged Artificial Neural Network 3945
   Fried Interface Circuit 3945
   Burned Logic Circuit 3945
   Charred Micro Circuit 3945
   Tripped Power Circuit 3945
   Defective Current Pump 3945
   Armor Plates 3945
   Contaminated Nanite Compound 3945
   

Serpentis Corporation: https://janice.e-351.com/a/LbsFmu

   Artificial Neural Network 472
   Interface Circuit 472
   Logic Circuit 472
   Micro Circuit 472
   Power Circuit 472
   Conductive Thermoplastic 472
   Drone Transceiver 472
   Lorentz Fluid 472
   Damaged Artificial Neural Network 3945
   Fried Interface Circuit 3945
   Burned Logic Circuit 3945
   Charred Micro Circuit 3945
   Tripped Power Circuit 3945
   Malfunctioning Shield Emitter 3945
   Conductive Polymer 3945
   Broken Drone Transceiver 3945
   Contaminated Lorentz Fluid 3945

Pirate data site loot

Data sites of pirate factions contain the following items:

  • Decryptors of all types
  • High-Tech Manufacturing Tools
  • High-Tech Data Chips
  • Carbon
  • Calm Abyssal filaments
  • Invention skill books
  • Blueprint copies for:
    • Target Spectrum Breakers
    • Ancillary shield and armour repairers (local and remote)
    • Faction POS modules
    • 'ligature' and 'zeugma' integrated analyzers
    • Medium and large micro jump drives
    • Reactive armour hardeners
  • Storyline materials. Not fully limited to only own faction materials.
  • Datacores. See the table below to see which faction has what.
Datacore Angel Cartel Blood Raider Guristas Sansha's Nation Serpentis
Mechanical Engineering x x x x x
Hydromagnetic Physics x x x
Molecular Engineering x x x
Nanite Engineering x x x
Quantum Physics x x x
Amarrian Starship Engineering x x
Electromagnetic Physics x x
Electronic Engineering x x
Graviton Physics x x
High Energy Physics x x
Laser Physics x x
Rocket Science x x
Caldari Starship Engineering x
Gallentean Starship Engineering x
Minmatar Starship Engineering x
Nuclear Physics x
Plasma Physics x

See also

References