Toggle menu
Toggle preferences menu
Toggle personal menu
Not logged in
Your IP address will be publicly visible if you make any edits.

Relic and data sites: Difference between revisions

From EVE University Wiki
Hirmuolio Pine (talk | contribs)
m Pirate sites: some colors for site names
Start cleanup, but page needs a lot more work
Line 2: Line 2:


{{Exploration links}}
{{Exploration links}}
'''Relic and data sites''' are types of [[Cosmic Signature|cosmic signatures]] that can be found with probing. Data and relic sites can be divided to 4 categories: Pirate data and relic sites, drone data sites, ghost sites, sleeper caches and sleeper sites.
'''Relic and data sites''' are types of [[Cosmic Signature|cosmic signatures]] that can be found with probing. Data and relic sites can be divided to 4 categories:  
* Pirate data and relic sites
* Drone data sites
* Ghost sites
* Sleeper caches and Sleeper sites.


==Pirate sites==
==Pirate sites==
[[File:Container_data.jpg|200px|thumb|right|A Data Site container]]
[[File:Container_data.jpg|200px|thumb|right|A Data Site container]]
[[File:Container_relic.jpg|200px|thumb|right|A Relic Site container]]
[[File:Container_relic.jpg|200px|thumb|right|A Relic Site container]]
Pirate relic and data can be found in all normal space regions and in C1, C2 and C3 wormholes. They are considered to be normal data and relic sites.
Pirate relic and data sites can be found in all [[k-space|normal space regions]], as well as in C1, C2 and C3 class [[Wormhole Space|wormhole systems]].  


They follow simple naming conventions. Data sites in high security space they are called "{{co|wheat|Local}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}", in low "{{co|wheat|Regional}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" and in null "{{co|wheat|Central}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}". Relic sites in high security space they are called "{{co|wheat|Crumbling}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}", in low "{{co|wheat|Decayed}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" and in null "{{co|wheat|Ruined}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}". Each region spawns sites for the local pirate group.
They follow a simple naming convention:


Pirate relic and Data Sites are set up very simply. They are pockets of space populated with a variety of cosmetic structures (i.e., wrecked stations, abandoned machines) and several containers that need to be hacked before the contents can be accessed. The sites do not have any triggers or defenders.
Data sites in high security space they are called "{{co|wheat|Local}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}", in low "{{co|wheat|Regional}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" and in null "{{co|wheat|Central}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}". Relic sites in high security space they are called "{{co|wheat|Crumbling}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}", in low "{{co|wheat|Decayed}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}" and in null "{{co|wheat|Ruined}} {{co|#9ef37c|(Faction)}} {{co|#9ef37c|(site)}}". Each region spawns sites for the local pirate group.


Data Site containers look a bit like an gyroscope, and typically have names like [Faction] Info Shard or [Faction] Com Tower. Relic Site containers look like ancient shipwrecks and have names like [Faction] Debris or [Faction] Rubble. These containers hold all of the site’s valuables. You’ll have to hack into the containers first by playing the Hacking minigame. In order to attempt a hack, you’ll need to lock on to the container, fly within your hacking module range of it, and then use the correct module on it (Relic Analyzer in a Relic Site, Data Analyzer in a Data Site or integrated analyzer for both). This will pop open a new window containing the hacking minigame. Failing the hack on same container twice will destroy the container. The explosion will not deal any damage.
Pirate relic and data sites are pockets of space populated with a variety of cosmetic structures (i.e., wrecked stations, abandoned machines) and several containers that need to be [[hacking|hacked]] before the contents can be accessed. The sites do not have any triggers or NPC defenders.


Pirate relic sites contain T1 and T2 salvage materials, skillbooks and blueprint copies. Pirate data sites contain decryptors, datacores, skillbooks, blueprint copies and manufacturing materials. The contents vary by faction, for example sansha relic sites contain intact armor plates for salvage.
Data site containers look a bit like an gyroscope, and typically have names like "{{co|#9ef37c|(Faction)}} Info Shard" or "{{co|#9ef37c|(Faction)}} Com Tower". Relic Site containers look like ancient shipwrecks and have names like "{{co|#9ef37c|(Faction)}} Debris" or "{{co|#9ef37c|(Faction)}} Rubble". These containers hold all of the site's valuables. You'll have to hack into the containers first by playing the [[hacking|hacking minigame]]. In order to attempt a hack, you’ll need to lock on to the container, fly within your hacking module range of it, and then use the correct module on it (Relic Analyzer in a Relic Site, Data Analyzer in a Data Site, or Integrated Aanalyzer for both). This will pop open a new window containing the hacking minigame. Failing the hack on same container twice will destroy the container. The explosion will not deal any damage.
 
Pirate relic sites contain T1 and T2 [[Salvaging#Uses_for_salvage|salvage materials]], skillbooks and [[Blueprints#Blueprint_Copies|blueprint copies]]. Pirate data sites contain decryptors, datacores, skillbooks, blueprint copies and manufacturing materials. The contents vary by faction, for example, Sansha relic sites contain Intact Armor Plates for salvage.


==Drone data sites==
==Drone data sites==
Line 24: Line 30:
* Drone data sites can escalate into another drone data site.
* Drone data sites can escalate into another drone data site.


Drone data sites contain drone components and blueprint copies for 'Integrated' and 'Augmented' drones.
Drone data sites contain drone components and blueprint copies for [[Drones#Variants|'Integrated' and 'Augmented' drones]].


==Sleeper caches==
==Sleeper caches==
Line 31: Line 37:
Sleeper caches are gated deadspace pockets with size limits for entry. Each sleeper cache has its own set of dangers. They contain mixture of containers with damaging explosions on failed hack, timed triggers, hazardous clouds, proximity explosions and sentry guns. For details see the page for individual sleeper cache.
Sleeper caches are gated deadspace pockets with size limits for entry. Each sleeper cache has its own set of dangers. They contain mixture of containers with damaging explosions on failed hack, timed triggers, hazardous clouds, proximity explosions and sentry guns. For details see the page for individual sleeper cache.


Sleeper caches contain sleeper components, manufacaturing materials, skillbooks and blueprint copies for polarized weapons.
Sleeper caches contain sleeper components, manufacturing materials, skillbooks and blueprint copies for polarized weapons.


==Ghost sites==
==Ghost sites==
Line 42: Line 48:


==Sleeper sites==
==Sleeper sites==
{{main|Wormhole Sites}}
Sleeper data and relic sites are found in wormholes. They are not empty, instead they have strong sleepers defending the site that need to be defeated before hacking.  
Sleeper data and relic sites are found in wormholes. They are not empty, instead they have strong sleepers defending the site that need to be defeated before hacking.  


Sleeper data and relic sites can be identified from {{co|wheat|"Forgotten"}} and {{co|wheat|"Unsecured"}} at the beginning of their names. The combat in them is harder than in combat anomalies of same wormhole class and the rats drop sleeper components as they do in combat sites. They can be ran as combat sites only looting the wrecks and ignoring the hacking part.
Sleeper data and relic sites can be identified from {{co|wheat|"Forgotten"}} and {{co|wheat|"Unsecured"}} at the beginning of their names. The combat in them is harder than in combat anomalies of same wormhole class and the rats drop sleeper components as they do in combat sites. They can be ran as combat sites only looting the wrecks and ignoring the hacking part.
For list of sleeper data and relic sites and details on individual sites see [[Wormhole Sites]].


== Contested Covert Research Facilities ==
== Contested Covert Research Facilities ==
Line 52: Line 57:
{{ note box | Note that it is unclear to this author whether Contested Covert Research Facilities are still in the game; some sources seem to indicate that they were removed when the Besieged Covert Research Facilities were added. Another thing to consider is that the reward received may not be worth the effort and risk of doing them: you will almost certainly lose your ship if you attempt them in an untanked frigate, but carrying around tanking modules just for these sites may be inconvenient. }}
{{ note box | Note that it is unclear to this author whether Contested Covert Research Facilities are still in the game; some sources seem to indicate that they were removed when the Besieged Covert Research Facilities were added. Another thing to consider is that the reward received may not be worth the effort and risk of doing them: you will almost certainly lose your ship if you attempt them in an untanked frigate, but carrying around tanking modules just for these sites may be inconvenient. }}


The only known variant is the Contested Guristas Covert Research Facility<ref>[https://wiki.eveonline.com/en/wiki/Contested_guristas_covert_research_facility EVElopedia: Contested Guristas Covert Research Facility]</ref>. It contains 1 hackable can, called a Guristas Transponder Tower. If the hack fails or after about 45-60s from the first warp-in to the site (even if the can has already been emptied), the can explodes for roughly 2000 raw explosive damage. The tower has 1 Guristas Data Sequence ([https://eve-central.com/home/quicklook.html?typeid=33988 eve-central price]) as loot, 75/200/700 of which can be turned in at the [[Mordu's Legion]] headquarters in [[nullsec]] for BPCs to build the Mordu's Legion ships.
The only known variant is the Contested Guristas Covert Research Facility. It contains 1 hackable can, called a Guristas Transponder Tower. If the hack fails or after about 45-60s from the first warp-in to the site (even if the can has already been emptied), the can explodes for roughly 2000 raw explosive damage. The tower has 1 Guristas Data Sequence ([https://eve-central.com/home/quicklook.html?typeid=33988 eve-central price]) as loot, 75/200/700 of which can be turned in at the [[Mordu's Legion]] headquarters in [[nullsec]] for BPCs to build the Mordu's Legion ships.


Even an exploration frigate (Magnate, Heron, Imicus or Probe) can be fitted to survive this with 2-3 cheap T1/meta [[Tanking|tanking]] modules swapped into the regular exploration fit: for example, on the [[Imicus]]/[[Heron]]/[[Probe]] using this wiki's basic exploration/scanning fits, one could:
Even an exploration frigate (Magnate, Heron, Imicus or Probe) can be fitted to survive this with 2-3 cheap T1/meta [[Tanking|tanking]] modules swapped into the regular exploration fit: for example, on the [[Imicus]]/[[Heron]]/[[Probe]] using this wiki's basic exploration/scanning fits, one could:
Line 64: Line 69:


Note: The author of this section did model all 4 frigates in [[EFT]], using a damage control I + explosive deflection field I + small shield extender I (except for the Magnate, as noted) and with the "without skills" option, and got just over 2k (Imicus) to 2.7k (Heron with 1 EDF) shield ehp vs. explosive damage on all the above ships except the armor-tanked magnate (which had about 2.5k shield+armor ehp vs. explosive, with AEH+100mm plates+DC+EANM). However, TEST YOUR OWN FIT with a fitting tool and/or calculate your [[EHP]] vs. explosive damage before you go blow yourself up. Remember to repair any armor/hull damage you may have suffered afterwards (as noted, this should only be necessary with the Magnate).
Note: The author of this section did model all 4 frigates in [[EFT]], using a damage control I + explosive deflection field I + small shield extender I (except for the Magnate, as noted) and with the "without skills" option, and got just over 2k (Imicus) to 2.7k (Heron with 1 EDF) shield ehp vs. explosive damage on all the above ships except the armor-tanked magnate (which had about 2.5k shield+armor ehp vs. explosive, with AEH+100mm plates+DC+EANM). However, TEST YOUR OWN FIT with a fitting tool and/or calculate your [[EHP]] vs. explosive damage before you go blow yourself up. Remember to repair any armor/hull damage you may have suffered afterwards (as noted, this should only be necessary with the Magnate).


==Tips and tricks==
==Tips and tricks==
Line 73: Line 77:
* [http://community.eveonline.com/news/dev-blogs/ghastly-hotbed-of-spaceship-trauma/ Dev blog introducing Ghost Sites]
* [http://community.eveonline.com/news/dev-blogs/ghastly-hotbed-of-spaceship-trauma/ Dev blog introducing Ghost Sites]
* [http://community.eveonline.com/news/dev-blogs/sweeping-death-and-chaos/ Dev blog introducing the Contested and Besieged Covert Research Facilities]
* [http://community.eveonline.com/news/dev-blogs/sweeping-death-and-chaos/ Dev blog introducing the Contested and Besieged Covert Research Facilities]
== References ==
<references />


[[Category:Exploration]]
[[Category:Exploration]]