Toggle menu
Toggle preferences menu
Toggle personal menu
Not logged in
Your IP address will be publicly visible if you make any edits.

Relic and data sites: Difference between revisions

From EVE University Wiki
Adding Drone Relic Sites to the wiki page, a recently added type of site, found in Drone Space. Fact-checking my own knowledge of them against this reddit post that came out when they were added - everything seems to check out: https://www.reddit.com/r/Eve/comments/1gpm75y/drone_relic_sites_are_overpowered/
Add {{Verify}}.
 
(14 intermediate revisions by 6 users not shown)
Line 1: Line 1:
{{Exploration links}}
{{Exploration links}}
'''Relic and data sites''' are types of [[cosmic signatures]] that can be found with probing. Relic and data sites can be divided into 5 categories:  
'''Relic and data sites''' are types of [[cosmic signatures]] that can be found with probing. Relic and data sites can be divided into 6 categories:  
* Pirate relic and data sites
* Pirate relic and data sites
* Drone data sites
* Drone data sites
Line 7: Line 7:
* Sleeper caches
* Sleeper caches
* Sleeper sites
* Sleeper sites
It should be noted that relic and data sites are also categorized into 5 different levels of difficulty, ranging from I to V. While a ship that is not bonus-ed to scanning can scan down a level I cosmic signature, even exploration-focused ships and fittings may struggle with level V sites.
Relic and data sites are also categorized into 5 different levels of difficulty, ranging from I to V. While a ship that is not scanning bonused can scan down a level I cosmic signature, even exploration-focused ships and fittings may struggle with level V sites.


== Pirate sites ==
== Pirate sites ==
Line 15: Line 15:
[[File:Container_data.jpg|200px|thumb|A Data Site container]]
[[File:Container_data.jpg|200px|thumb|A Data Site container]]
[[File:Container_relic.jpg|200px|thumb|A Relic Site container]]
[[File:Container_relic.jpg|200px|thumb|A Relic Site container]]
Relic and data sites use the following naming convention according to their location.
Relic and data sites use the following naming convention according to their location, except for drone relic sites.
{| class="wikitable"
{| class="wikitable"
|-
|-
Line 44: Line 44:


You'll have to hack into the containers first by playing the [[hacking|hacking minigame]]. In order to attempt a hack, you’ll need to lock on to the container and activate the corresponding hacking module. The module (Relic Analyzer in a relic site, Data Analyzer in a data site, or Integrated Analyzer for both) only works if the distance between the container and your ship is less or equal to the module's maximum activation range. Activating the module will open a new window containing the hacking minigame. Failing to hack a container twice will destroy it and its contents.
You'll have to hack into the containers first by playing the [[hacking|hacking minigame]]. In order to attempt a hack, you’ll need to lock on to the container and activate the corresponding hacking module. The module (Relic Analyzer in a relic site, Data Analyzer in a data site, or Integrated Analyzer for both) only works if the distance between the container and your ship is less or equal to the module's maximum activation range. Activating the module will open a new window containing the hacking minigame. Failing to hack a container twice will destroy it and its contents.
== Drone relic sites ==
Drone relic sites spawn only in C1–C3 wormholes and in drone regions: Cobalt Edge, Perrigen Falls, Malpais, Oasa, Kalevala Expanse, Outer Passage, Etherium Reach, and The Spire. This means that they are always {{co|wheat|Ruined}}, so Debris containers will not spawn. The naming convention for the sites remains identical to Pirate relic sites. Additionally, medium-difficulty containers are called {{co|#9ef37c|(Rogue Drone)}} Ship Remains, but they maintain the same difficulty level.
The two main differences from Pirate relic sites are:
* The site despawns very quickly, so once you enter, it is best not to warp out unless you have a bookmark on grid, or unless you are in danger.
* The loot table contains all of the faction loot for other relic sites, so it is possible to get any kind of relic site loot.


== Drone data sites ==
== Drone data sites ==
Line 68: Line 75:
* [[AEGIS Secure Capital Construction Forge]]
* [[AEGIS Secure Capital Construction Forge]]
* [[AEGIS Secure Transfer Facility]]
* [[AEGIS Secure Transfer Facility]]
* [[Overmind Nursery Groves]] - Does not feature any actual hacking and can treated more like a combat site
* [[Overmind Nursery Grove]]—Does not feature any actual hacking and can treated more like a combat site
* [[Faction_warfare#Operation_Centers|Faction Warfare Operation Center]] e.g. "Caldari Operation Center"
* [[Faction_warfare#Operation_Centers|Faction Warfare Operation Center]] e.g. "Caldari Operation Center"
* [[SCC Secure Key Storage]]
* [[SCC Secure Key Storage]]
== Detected sites ==
The Legion Expansion introduced Exploration Upgrades that can be fitted to [[Sovereignty Hub]]s. These upgrades spawn detected relic and data sites in a 5 jump radius of the system that has the Hub with the upgrade installed.
This means that they can only be found in NullSec Sovereignty space.
The detected sites that spawn have the same site name formatting as all the other [[#Pirate sites|pirate sites]], but are prefaced with “Detected": i.e.Detected <Ruined/Central> <Faction> <Site Name>
The detected sites that spawn have the same faction as the region of space in which the Sovereignty Hub that spawns them is in. This includes drone data and relic sites.
The containers in detected sites may or may not have better loot drops than those in normal sites.
Completing a detected relic site has the chance to trigger an escalation:
* [[Emergent Ruins]]
* [[Interrupted Expedition]]
Completing a detected data site has the chance to trigger an escalation specific to them.
* [[Interrupted Expedition]]
* ???


== Sleeper caches ==
== Sleeper caches ==
Line 112: Line 138:
}}
}}


[[Contested Covert Research Facilities]] are hacking sites that may or may not be in the game anymore. They contain one hackable container. The site will self destruct and deal 2000 damage 45-60 seconds after warp-in.
[[Contested Covert Research Facilities]] are hacking sites that may or may not be in the game anymore. They contain one hackable container. The site will self destruct and deal 2000 damage 45–60 seconds after warp-in.


== Combat relic sites ==
== Combat relic sites ==
Line 126: Line 152:
== Tips and tricks==
== Tips and tricks==
* The contents of containers can be scanned with [[cargo scanning|cargo scanners]] before hacking. This allows skipping containers that do not have valuable contents.
* The contents of containers can be scanned with [[cargo scanning|cargo scanners]] before hacking. This allows skipping containers that do not have valuable contents.
{{Important note box| Please check with your corp/alliance/coalition before doing this as they may have rules against cherry-picking. if so, self-destruct the cans instead by  by failing the hacks 2 times by opening and immediate closing the hacking window}}
* Emptied sites will despawn in few minutes. Sites that have been partially completed will despawn in a few hours.
* Emptied sites will despawn in few minutes. Sites that have been partially completed will despawn in a few hours.
* Once a site has despawned, the same site (sorted based on data or relic) will respawn within 2 minutes within the same region, but never within the same system.
* Once a site has despawned, the same site (sorted based on data or relic) will respawn within 2 minutes within the same region, but never within the same system.
Line 235: Line 264:
* X = possible site location
* X = possible site location
* HS = high sec; LS = low sec; NS = null sec
* HS = high sec; LS = low sec; NS = null sec
* C1 - C6 = wormhole system class
* C1–C6 = wormhole system class
}}
}}
}}
}}
Line 329: Line 358:
| style="text-align: left;" | Contaminated Lorentz Fluid || || || || || x
| style="text-align: left;" | Contaminated Lorentz Fluid || || || || || x
|}
|}
Note: Rogue Drone relic sites can contain any of the items in the above table.


Each relic site in null security space/wormholes contains three different kinds of containers: Rubble, remains and ruins. These containers always have the same loot distribution without influence from the site type.
Each relic site in null security space/wormholes contains three different kinds of containers: Rubble, remains and ruins. These containers always have the same loot distribution without influence from the site type.
Line 336: Line 367:
! Container !! T1 probability<br>(amount)!! T2 probability<br>(amount)
! Container !! T1 probability<br>(amount)!! T2 probability<br>(amount)
|-
|-
|style="text-align:right;"|Rubble&nbsp;|| 25% (3-20) || 5.5% (1-3)
|style="text-align:right;"|Rubble&nbsp;|| 25% (3–20) || 5.5% (1–3)
|-
|-
|style="text-align:right;"|Remain&nbsp;|| 50% (5-40) || 12.5% (1-5)
|style="text-align:right;"|Remain&nbsp;|| 50% (5–40) || 12.5% (1–5)
|-
|-
|style="text-align:right;"|Ruin&nbsp;|| 0% || 25% (1-15)
|style="text-align:right;"|Ruin&nbsp;|| 0% || 25% (1–15)
|}
|}


For example, in a "Rubble" container each T1 salvage has independent 25% probability to appear in a stack of 3-20 units. Stack sizes are all uniformly distributed so a stack of 1 is equally likely to a stack of 14.
For example, in a "Rubble" container each T1 salvage has independent 25% probability to appear in a stack of 3–20 units. Stack sizes are all uniformly distributed so a stack of 1 is equally likely to a stack of 14.


The amount of different container types depends on the name of the relic site. As a result, higher rank relic sites are on average more valuable.
The amount of different container types depends on the name of the relic site. As a result, higher rank relic sites are on average more valuable.
Line 475: Line 506:
* Invention skill books
* Invention skill books
* Blueprint copies for:
* Blueprint copies for:
** Target Spectrum Breakers
** Target Spectrum Breakers{{Verify|title= Do not exist anymore?}}
** Ancillary shield and armour repairers (local and remote)
** Ancillary shield and armor repairers (local and remote)
** Faction POS modules
** Faction POS modules
** 'ligature' and 'zeugma' integrated analyzers
** 'ligature' and 'zeugma' integrated analyzers