Toggle menu
Toggle preferences menu
Toggle personal menu
Not logged in
Your IP address will be publicly visible if you make any edits.

Relic and data sites: Difference between revisions

From EVE University Wiki
m Detected Sites: Fixing my mistakes - I’ve got no clue what the one for data sites is called, but I intend to find out.
Sivaira Chen (talk | contribs)
No edit summary
 
(11 intermediate revisions by 6 users not shown)
Line 7: Line 7:
* Sleeper caches
* Sleeper caches
* Sleeper sites
* Sleeper sites
It should be noted that relic and data sites are also categorized into 5 different levels of difficulty, ranging from I to V. While a ship that is not bonus-ed to scanning can scan down a level I cosmic signature, even exploration-focused ships and fittings may struggle with level V sites.
Relic and data sites are also categorized into 5 different levels of difficulty, ranging from I to V. While a ship that is not scanning bonused can scan down a level I cosmic signature, even exploration-focused ships and fittings may struggle with level V sites.


== Pirate sites ==
== Pirate sites ==
{{See also|List of data and relic sites}}
{{See also|List of data and relic sites}}
Pirate relic and data sites can be found in all [[known space|normal space regions]], in C1, C2 and C3 class [[Wormhole space|wormhole systems]], as well as in [[shattered wormhole systems]]. There are pockets of space populated with a variety of cosmic structures (i.e., wrecked stations, abandoned machines) and several containers that need to be [[hacking|hacked]] before the contents can be accessed. The sites do not have any triggers or NPC defenders. Pirate relic sites contain T1 and T2 [[Salvaging#Uses_for_salvage|salvage materials]], skill books and [[Blueprints#Blueprint_Copies|blueprint copies]]. Pirate data sites contain decryptors, data cores, skill books, blueprint copies and manufacturing materials. The contents may vary by faction.
Pirate relic and data sites can be found in all [[known space|normal space regions]], in C1-, C2-, and C3 class [[Wormhole space|wormhole systems]], as well as in [[shattered wormhole systems]]. There are pockets of space populated with a variety of cosmic structures (i.e., wrecked stations, abandoned machines) and several containers that need to be [[hacking|hacked]] before the contents can be accessed. The sites do not have any triggers or NPC defenders. Pirate relic sites contain T1 and T2 [[Salvaging#Uses for salvage|salvage materials]], skill books, and [[Blueprints#Blueprint_Copies|blueprint copies]]. Pirate data sites contain decryptors, data cores, skill books, blueprint copies, and manufacturing materials. The contents may vary by faction.


[[File:Container_data.jpg|200px|thumb|A Data Site container]]
[[File:Container_data.jpg|200px|thumb|A Data Site container]]
Line 46: Line 46:


== Drone relic sites ==
== Drone relic sites ==
Drone relic sites spawn only in C1 - C3 wormholes and in drone regions: Cobalt Edge, Perrigen Falls, Malpais, Oasa, Kalevala Expanse, Outer Passage, Etherium Reach, and The Spire. This means that they are always {{co|wheat|Ruined}}, so Debris containers will not spawn. The naming convention for the sites remains identical to Pirate relic sites. Additionally, medium-difficulty containers are called {{co|#9ef37c|(Rogue Drone)}} Ship Remains, but they maintain the same difficulty level.
Drone relic sites spawn only in C1–C3 wormholes and in drone regions: Cobalt Edge, Perrigen Falls, Malpais, Oasa, Kalevala Expanse, Outer Passage, Etherium Reach, and The Spire. This means that they are always {{co|wheat|Ruined}}, so Debris containers will not spawn. The naming convention for the sites remains identical to Pirate relic sites. Additionally, medium-difficulty containers are called {{co|#9ef37c|(Rogue Drone)}} Ship Remains, but they maintain the same difficulty level.


The two main differences from Pirate relic sites are:
The two main differences from Pirate relic sites are:
Line 69: Line 69:
Drone data sites contain three hackable containers: Two "High-Security Containment Facility" and one "Research and Development Laboratories". Most of the time the lone research container is empty but leaving it unhacked misses possibility for data site escalation.
Drone data sites contain three hackable containers: Two "High-Security Containment Facility" and one "Research and Development Laboratories". Most of the time the lone research container is empty but leaving it unhacked misses possibility for data site escalation.


Drone data sites contain drone components and blueprint copies for [[Drones#Variants|' Integrated' and 'Augmented' drones]]. Each drone region drop blueprint copies for different racial drones: Kalevala Expanse and The Spire for Minmatar, Malpais and Oasa for Caldari, Etherium Reach and Perrigen Falls for Gallente and finally Outer Passage and Cobalt Edge for Amarr.
Drone data sites contain drone components and blueprint copies for [[Drones#Variants|'Integrated' and 'Augmented' drones]]. Each drone region drops blueprint copies for different racial drones: Kalevala Expanse and The Spire for Minmatar, Malpais and Oasa for Caldari, Etherium Reach and Perrigen Falls for Gallente, and Outer Passage and Cobalt Edge for Amarr.


== Other data sites ==
== Other data sites ==
* [[AEGIS Capital Ship Security Facility]]
* [[AEGIS Capital Ship Security Facility]]
* [[AEGIS Secure Capital Construction Forge]]
* [[AEGIS Secure Capital Construction Forge]]
* [[AEGIS Secure Transfer Facility]]
* [[AEGIS Secure Transfer Facility]]—mostly a combat site with a little data hacking
* [[Overmind Nursery Groves]] - Does not feature any actual hacking and can treated more like a combat site
* [[Overmind Nursery Grove]]—Does not feature any actual hacking and can treated more like a combat site
* [[Faction_warfare#Operation_Centers|Faction Warfare Operation Center]] e.g. "Caldari Operation Center"
* [[Faction warfare#Operation Centers|Faction Warfare Operation Center]] e.g. "Caldari Operation Center"
* [[SCC Secure Key Storage]]
* [[SCC Secure Key Storage]]
* [[Observatory Infiltration]]


== Detected Sites ==
== Detected sites ==
 
The Legion Expansion introduced Exploration Upgrades that can be fitted to [[Sovereignty Hub]]s. These upgrades spawn detected relic and data sites in a 5 jump radius of the system that has the Hub with the upgrade installed.
The Legion Expansion introduced Exploration Upgrades that can be fitted to Sovereignty Hubs. These upgrades spawn detected relic and data sites in a 5 jump radius of the system that has the Hub with the upgrade installed.


This means that they can only be found in NullSec Sovereignty space.
This means that they can only be found in NullSec Sovereignty space.


The detected sites that spawn have the same site name formatting as all the other pirate sites, but are prefaced with “Detected": Detected <Ruined/Central> <Faction> <Site Name>
The detected sites that spawn have the same site name formatting as all the other [[#Pirate sites|pirate sites]], but are prefaced with "Detected" (i.e. Detected <Ruined/Central> <Faction> <Site Name>).


The detected sites that spawn have the same faction as the region of space in which they spawn. This includes drone data and relic sites.
The detected sites that spawn have the same faction as the region of space in which the Sovereignty Hub that spawns them is in. This includes drone data and relic sites.


The containers in detected sites may or may not have better loot drops than those in normal sites.
The containers in detected sites may or may not have better loot drops than those in normal sites.


Completing a detected relic site has the chance to trigger an [[Emergent Ruins]] escalation. Completing a detected data site has the chance to trigger an escalation specific to them.
Completing a detected relic site has the chance to trigger an escalation:
* [[Emergent Ruins]]
* [[Interrupted Expedition]]
 
Completing a detected data site has the chance to trigger an escalation specific to them.
* [[Interrupted Expedition]]
* ???


== Sleeper caches ==
== Sleeper caches ==
Line 102: Line 108:
* [[Superior Sleeper Cache]] Level V scanning difficulty
* [[Superior Sleeper Cache]] Level V scanning difficulty


Sleeper caches are gated deadspace pockets with size limits for entry. Each sleeper cache has its own set of dangers. They contain a mixture of containers with damaging explosions on a failed hack, timed triggers, hazardous clouds, proximity explosions and sentry guns. For details see the page for individual sleeper cache.
Sleeper caches are gated deadspace pockets with size limits for entry. Each sleeper cache has its own set of dangers. They contain a mixture of containers with damaging explosions on a failed hack, timed triggers, hazardous clouds, proximity explosions, and sentry guns. For details see the page for individual sleeper cache.


Sleeper caches contain sleeper components, manufacturing materials, skill books and blueprint copies for polarized weapons.
Sleeper caches contain sleeper blue loot, manufacturing materials for Tech 2 and capital ships, skill books and blueprint copies for Polarized weapons and storyline modules.


== Ghost sites ==
== Ghost sites ==
Line 112: Line 118:
The sites have an invisible time limit after which a strong NPC force will arrive, blow up the remaining containers and attack the pilot on-site. The hacks are also riskier as a single failure will cause the container to explode dealing 4000–6000 raw explosive damage to a 10 km radius.
The sites have an invisible time limit after which a strong NPC force will arrive, blow up the remaining containers and attack the pilot on-site. The hacks are also riskier as a single failure will cause the container to explode dealing 4000–6000 raw explosive damage to a 10 km radius.


Ghost sites contain Covert Research Tools, Villard Wheels, blueprint copies for 'Packrat' and 'Magpie' Mobile Tractor Units, ‘Wetu’ and ‘Yurt’ Mobile Depots and Ascendancy implants.
Ghost sites contain Covert Research Tools, Shattered Villard Wheels, blueprint copies for 'Packrat' and 'Magpie' Mobile Tractor Units, 'Wetu' and 'Yurt' Mobile Depots, and Ascendancy implant blueprint copies.


== Sleeper sites ==
== Sleeper sites ==
{{main|Wormhole sites}}
{{main|Wormhole sites}}
Sleeper relic and data sites are found in wormholes. They are not empty, instead, they have strong sleepers defending the site that need to be defeated before hacking.  
Sleeper relic and data sites are found in wormholes. They are not empty, instead, they have strong sleepers defending the site that need to be tanked or defeated before safe hacking.  


Sleeper relic and data sites can be identified from {{co|wheat|"Forgotten"}} and {{co|wheat|"Unsecured"}} at the beginning of their names. The combat in them is harder than in combat anomalies of same wormhole class and the rats drop sleeper components as they do in combat sites. They can be run as combat sites only looting the wrecks and ignoring the hacking part.
Sleeper relic and data sites can be identified from {{co|wheat|"Forgotten"}} and {{co|wheat|"Unsecured"}} at the beginning of their names. The combat in them is harder than in combat anomalies of same wormhole class and the rats drop Sleeper blue loot just like in combat sites. They can be run as combat sites, only looting the wrecks and ignoring the hacking part. (They only appear to despawn once the containers have been hacked, or after enough time has passed.)


== Silent Battleground ==
== Silent Battleground ==
Line 124: Line 130:
Silent Battleground is a very rare data site found in [[Shattered Wormhole Space|shattered wormholes]].
Silent Battleground is a very rare data site found in [[Shattered Wormhole Space|shattered wormholes]].


The silent battleground contains 20 relic and data cans scattered in 60 km radius, with no Sleeper rats present. It must be scanned down and requires decent skills to do so. Failing the hack twice does not blow up the can. The data cans contain data cores, and the relic cans contain T3 manufacturing components such as Intact Power Cores. Early reports suggest that this site operates on a timer and will explosively despawn after some time, though dealing no damage. This timer should be longer than 30 minutes. 3 hacking ships should be able to clear the entire site before this happens, however.
The silent battleground contains 20 relic and data cans scattered in 60-km radius, with no Sleeper rats present. It must be scanned down and requires decent skills to do so. Failing the hack twice does not blow up the can. The data cans contain data cores, and the relic cans contain T3 manufacturing components such as Intact Power Cores. Early reports suggest that this site operates on a timer and will explosively despawn after some time, though dealing no damage. This timer should be longer than 30 minutes. 3 hacking ships should be able to clear the entire site before this happens, however.


At the centre of the silent battleground is a wrecked [[Revenant]], suggesting an unexpected historical [[Sansha's Nation]] presence in these shattered wormholes. The wreck cannot be salvaged.
At the center of the silent battleground is a wrecked [[Revenant]], suggesting an unexpected historical [[Sansha's Nation]] presence in these shattered wormholes. The wreck cannot be salvaged.


== Contested Covert Research Facilities ==
== Contested Covert Research Facilities ==
Line 133: Line 139:
}}
}}


[[Contested Covert Research Facilities]] are hacking sites that may or may not be in the game anymore. They contain one hackable container. The site will self destruct and deal 2000 damage 45-60 seconds after warp-in.
[[Contested Covert Research Facilities]] are hacking sites that may or may not be in the game anymore. They contain one hackable container. The site will self destruct and deal 2000 damage 45–60 seconds after warp-in.


== Combat relic sites ==
== Combat relic sites ==
Line 147: Line 153:
== Tips and tricks==
== Tips and tricks==
* The contents of containers can be scanned with [[cargo scanning|cargo scanners]] before hacking. This allows skipping containers that do not have valuable contents.
* The contents of containers can be scanned with [[cargo scanning|cargo scanners]] before hacking. This allows skipping containers that do not have valuable contents.
* Emptied sites will despawn in few minutes. Sites that have been partially completed will despawn in a few hours.
 
{{Important note box|Please check with your corp/alliance/coalition before doing this as they may have rules against cherry-picking. if so, self-destruct the cans instead by failing the hacks 2 times by opening and immediate closing the hacking window.}}
 
* Emptied sites will despawn a few seconds after the last container has been successfully hacked or destroyed. Sites that have been partially completed will despawn in a few hours.
* Once a site has despawned, the same site (sorted based on data or relic) will respawn within 2 minutes within the same region, but never within the same system.
* Once a site has despawned, the same site (sorted based on data or relic) will respawn within 2 minutes within the same region, but never within the same system.
* Sites with difficulty levels I and II should be scannable for any ship fitted with a core probe launcher, and a set of Sister's core probe scanners. However, as the difficulty level of the site increases, the minimum scanning strength required also increases.  
* Sites with difficulty levels I and II should be scannable for any ship fitted with a core probe launcher, and a set of core scanner probes. However, as the difficulty level of the site increases, the minimum scanning strength required also increases.  
* Sites with difficulty levels III and higher normally need to be scanned by a scanning-bonused ship. However, some level III sites may still be scanned by any ship if it is fitted with a Sisters core probe launcher.
* Sites with difficulty levels III and higher normally need to be scanned by a scanning-bonused ship. However, some level III sites may still be scanned by any ship if it is fitted with a Sisters core probe launcher, or if the pilot has high enough scanning skills.
* The recommended scan strength for level IV sites is around 90, while the recommended scan strength for level V sites is 100 and above.
* The recommended scan strength for level IV sites is around 90, while the recommended scan strength for level V sites is 100 and above.
* After the daily [[Server downtime|downtime]] (DT) all Relic and Data sites update their containers. For example, you hack 5/6 containers and leave 1. After DT all these containers will be updated and you can hack them again.
* After the daily [[Server downtime|downtime]] (DT) all Relic and Data sites update their containers. For example, you hack 5/6 containers and leave 1. After DT all these containers will be updated and you can hack them again.
Line 195: Line 204:


Exceptions and details for [[Shattered wormhole systems]]:
Exceptions and details for [[Shattered wormhole systems]]:
* Shattered systems can spawn sites of their own class and also one class higher or lower. This technically allows Ruined and Central sites to exist in a C4 system, since it can spawn sites usually only found in C3 space. However, shattered systems are rare, and all other C4 systems do not spawn these sites.
* Shattered systems can spawn sites of their own class and also one class higher or lower. This technically allows Ruined and Central sites to exist in a C4 system, since it can spawn sites usually only found in C3 space. However, shattered systems are rare, and no other C4 systems spawn these sites.
* C13 or "small ship" shattered systems contain sites only found in C1, C2, or C3 systems. This includes Ruined and Central sites.
* C13 or "small ship" shattered systems contain sites only found in C1, C2, or C3 systems. This includes Ruined and Central sites.
* [[#Silent Battleground|Silent Battleground]] (a very rare Data Site) in Shattered systems is SAFE.</small>
* [[#Silent Battleground|Silent Battleground]] (a very rare Data Site) in Shattered systems is SAFE.</small>
Line 256: Line 265:
* X = possible site location
* X = possible site location
* HS = high sec; LS = low sec; NS = null sec
* HS = high sec; LS = low sec; NS = null sec
* C1 - C6 = wormhole system class
* C1–C6 = wormhole system class
}}
}}
}}
}}
Line 262: Line 271:
== Pirate relic site loot ==
== Pirate relic site loot ==
Pirate faction relic sites contain the following items:
Pirate faction relic sites contain the following items:
* Salvage. Type of salvage is based on the faction.
* Salvage—Type of salvage is based on the faction
* Carbon
* Carbon
* Spatial attunement units
* Spatial attunement units
Line 353: Line 362:
Note: Rogue Drone relic sites can contain any of the items in the above table.
Note: Rogue Drone relic sites can contain any of the items in the above table.


Each relic site in null security space/wormholes contains three different kinds of containers: Rubble, remains and ruins. These containers always have the same loot distribution without influence from the site type.
Each relic site in null security space/wormholes contains three different kinds of containers: Rubble, remains, and ruins. These containers always have the same loot distribution without influence from the site type.


{| class="wikitable" style="text-align: center;padding:10px;"
{| class="wikitable" style="text-align: center;padding:10px;"
Line 359: Line 368:
! Container !! T1 probability<br>(amount)!! T2 probability<br>(amount)
! Container !! T1 probability<br>(amount)!! T2 probability<br>(amount)
|-
|-
|style="text-align:right;"|Rubble&nbsp;|| 25% (3-20) || 5.5% (1-3)
|style="text-align:right;"|Rubble|| 25% (3–20) || 5.5% (1–3)
|-
|-
|style="text-align:right;"|Remain&nbsp;|| 50% (5-40) || 12.5% (1-5)
|style="text-align:right;"|Remains|| 50% (5–40) || 12.5% (1–5)
|-
|-
|style="text-align:right;"|Ruin&nbsp;|| 0% || 25% (1-15)
|style="text-align:right;"|Ruins|| 0% || 25% (1–15)
|}
|}


For example, in a "Rubble" container each T1 salvage has independent 25% probability to appear in a stack of 3-20 units. Stack sizes are all uniformly distributed so a stack of 1 is equally likely to a stack of 14.
For example, in a "Rubble" container each T1 salvage has independent 25% probability to appear in a stack of 3–20 units. Stack sizes are all uniformly distributed so a stack of 1 is equally likely to a stack of 14.


The amount of different container types depends on the name of the relic site. As a result, higher rank relic sites are on average more valuable.
The amount of different container types depends on the name of the relic site. As a result, higher rank relic sites are on average more valuable.
Line 498: Line 507:
* Invention skill books
* Invention skill books
* Blueprint copies for:
* Blueprint copies for:
** Target Spectrum Breakers
** Ancillary shield and armor repairers (local and remote)
** Ancillary shield and armour repairers (local and remote)
** Faction POS modules
** Faction POS modules
** 'ligature' and 'zeugma' integrated analyzers
** 'Ligature' and 'Zeugma' integrated analyzers
** Medium and large micro jump drives
** Medium and large micro jump drives
** Reactive armour hardeners
** Reactive armor hardeners
* Storyline materials. Not fully limited to only own faction materials.
* Storyline materials. Not fully limited to only own faction materials.
* Datacores. See the table below to see which faction has what.
* Datacores. See the table below to see which faction has what.