Difference between revisions of "Relic and data sites"
Line 88: | Line 88: | ||
== Is this site "safe"? == | == Is this site "safe"? == | ||
− | The following tables give a quick overview whether a site is "safe" or not. This only relates to PVE hazards (like rats or exploding cans) | + | The following tables give a quick overview whether a site is "safe" or not. This only relates to PVE hazards (like rats or exploding cans) NOT to other people hunting you down! |
{| class="wikitable" | {| class="wikitable" |
Revision as of 01:47, 2 August 2018
Exploration |
---|
Site types |
Guides |
Relic and data sites are types of cosmic signatures that can be found with probing. Data and relic sites can be divided to 4 categories:
- Pirate data and relic sites
- Drone data sites
- Ghost sites
- Sleeper caches
- Sleeper sites
It should be noted that relic and data sites are also categorized into 5 different levels of difficulty, ranging from I to V. While a ship that is not bonus-ed to scanning can scan down a level I cosmic signature, even exploration-focused ships and fittings may struggle with level V sites.
Pirate sites
Pirate relic and data sites can be found in all normal space regions, as well as in C1, C2 and C3 class wormhole systems. They are pockets of space populated with a variety of cosmetic structures (i.e., wrecked stations, abandoned machines) and several containers that need to be hacked before the contents can be accessed. The sites do not have any triggers or NPC defenders. Pirate relic sites contain T1 and T2 salvage materials, skillbooks and blueprint copies. Pirate data sites contain decryptors, datacores, skillbooks, blueprint copies and manufacturing materials. The contents may vary by faction.
Data sites use the following naming convention according to their location: "Local (Faction) (site)" in high-security systems; "Regional (Faction) (site)" in low-security systems; and "Central (Faction) (site)" in null-security and wormhole systems. Relic sites follow a similar convention: "Crumbling (Faction) (site)" in high-security systems; "Decayed (Faction) (site)" in low-security systems; and "Ruined (Faction) (site)" in null-security and wormhole systems. Each region spawns sites for the local pirate group.
Data site containers have a physical appearance that resembles a gyroscope, and are usually named "(Faction) Info Shard", "(Faction) Com Tower", "(Faction) Mainframe", "(Faction) Data Processing Center", "(Faction) Shattered Life-Support Unit", "(Faction) Virus Test Site", "(Faction) Minor Shipyard", "(Faction) Production Installer" or "(Faction) Backup Server". Relic Site containers resemble ancient shipwrecks and are named "(Faction) Debris", "(Faction) Rubble", "(Faction) Crystal Quarry", "(Faction) Antiquated Outpost" or "(Faction) Stone Formation". You'll have to hack into the containers first by playing the hacking minigame. In order to attempt a hack, you’ll need to lock on to the container and activate the corresponding hacking module. The module (Relic Analyzer in a Relic Site, Data Analyzer in a Data Site, or Integrated Aanalyzer for both) only works if the distance between the container and your ship is less or equal to the module's maximum activation range. Activating the module will open a new window containing the hacking minigame. Failing to hack a container twice will destroy it and its contents.
Drone data sites
- Abandoned Research Complex DA005
- Abandoned Research Complex DA015
- Abandoned Research Complex DA025
- Abandoned Research Complex DG003
- Abandoned Research Complex DG018
- Abandoned Research Complex DC007
Drone data sites spawn only in drone regions: Cobalt Edge, Perrigen Falls, Malpais, Oasa, Kalevala Expanse, Outer Passage, Etherium Reach, and The Spire. Drone data sites have two main differences from pirate data sites:
- Failing the hack twice in drone data site will not destroy the container. Instead there is a chance that failure spawns hostile frigates. These rogue drones can be easily handled by the drones of T1 explorer and do not pose serious threat. These frigates need to be destroyed before you can hack again.
- Drone data sites can escalate into another drone data site.
Drone data sites contain three hackable containers: Two "High Security Containment Facility" and one "Research and Development Laboratories". Most of the time the lone research container is empty but leaving it unhacked misses possibility for data site escalation.
Drone data sites contain drone components and blueprint copies for 'Integrated' and 'Augmented' drones. Each drone region drop blueprint copies for different racial drones: Kalevala Expanse and The Spire for Minmatar, Malpais and Oasa for Caldari, Etherium Reach and Perrigen Falls for Gallente and finally Outer Passage and Cobalt Edge for Amarr.
Sleeper caches
- Main article: Sleeper Cache
Sleeper caches are data sites with various triggers and dangers. They are significantly more difficult than pirate data sites. Sleeper caches spawn in normal space and do not spawn in wormholes even though the sleeper connection would imply the opposite; they are not to be confused with the Forgotten Sleeper sites, which function more like combat sites.
The Sleeper Caches from easiest to hardest are:
- Limited Sleeper Cache Level IV scanning difficulty
- Standard Sleeper Cache Level IV scanning difficulty
- Superior Sleeper Cache Level V scanning difficulty
Sleeper caches are gated deadspace pockets with size limits for entry. Each sleeper cache has its own set of dangers. They contain mixture of containers with damaging explosions on failed hack, timed triggers, hazardous clouds, proximity explosions and sentry guns. For details see the page for individual sleeper cache.
Sleeper caches contain sleeper components, manufacturing materials, skillbooks and blueprint copies for polarized weapons.
Ghost sites
- Main article: Ghost Site
Ghost sites are data sites with limited time and riskier failures. They can be identified from "Covert Research Facility" on their name.
The sites have invisible time limit after which strong NPC force will arrive, blow up remaining containers and attack the pilot on site. The hacks are also riskier as single failure will cause the container to explode dealing 4000–6000 raw explosive damage to 10 km radius.
Ghost sites contain Covert Research Tools, Villard Wheels, blueprint copies for 'Packrat' and 'Magpie' Mobile Tractor Units, ‘Wetu’ and ‘Yurt’ Mobile Depots and Ascendancy implants.
Sleeper sites
- Main article: Wormhole sites
Sleeper data and relic sites are found in wormholes. They are not empty, instead they have strong sleepers defending the site that need to be defeated before hacking.
Sleeper data and relic sites can be identified from "Forgotten" and "Unsecured" at the beginning of their names. The combat in them is harder than in combat anomalies of same wormhole class and the rats drop sleeper components as they do in combat sites. They can be ran as combat sites only looting the wrecks and ignoring the hacking part.
Silent Battleground
Silent Battleground is a very rare data site found in shattered wormholes.
The silent battleground contains 20 data and relic cans scattered in 60 km radius, with no Sleeper rats present. It must be scanned down, and requires decent skills to do so. Failing the hack twice does not blow up the can. The data cans contain datacores, and the relic cans contain T3 manufacturing components such as Intact Power Cores. Early reports suggest that this site operates on a timer and will explosively despawn after some time, though dealing no damage. This timer should be longer than 30 minutes. 3 hacking ships should be able to clear the entire site before this happens, however.
At the center of the silent battleground is a wrecked Revenant, suggesting an unexpected historical Sansha's Nation presence in these shattered wormholes. The wreck cannot be salvaged.
Contested Covert Research Facilities
Contested Covert Research Facilities are hacking sites that may or may not be in the game anymore. They contain one hackable container. The site will self destruct and deal 2000 damage 45-60 seconds after warpin.
Tips and tricks
- The contents of containers can be scanned with cargo scanners before hacking. This allows skipping containers that do not have valuable contents.
- Emptied sites will despawn in few minutes. Sites that have been warped to or partially completed will despawn in few hours.
- Once a site has despawned, the same site (sorted based on data or relic) will respawn within 2 minutes within the same region, but never within the same system.
- Sites with difficulty levels I and II should be scannable for any ship fitted with a core probe launcher, and a set of Sisters core probe scanners. However, as the difficulty level of the site increases, the minimum scanning strength required also increases.
- Sites with difficulty levels III and higher normally need to be scanned by a scanning-bonused ship. However, some level III sites may still be scanned by any ship if it is fitted with a Sisters core probe launcher.
- The recommended scan strength for level IV sites is around 90, while the recommended scan strength for level V sites is 100 and above.
Is this site "safe"?
The following tables give a quick overview whether a site is "safe" or not. This only relates to PVE hazards (like rats or exploding cans) NOT to other people hunting you down!
Relic Sites | Is it "Safe"? | Hic Sec | Low Sec | Null Sec | C1 WH | C2 WH | C3 WH | C4 WH | C5 WH | C6 WH |
---|---|---|---|---|---|---|---|---|---|---|
Crumbing <> | Safe | x | ||||||||
Decayed <> | Safe | x | ||||||||
Ruined <> | Safe | x | x | x | x | |||||
Forgotten <> | NOT Safe | x | x | x | x | x | x |
Data Sites | Is it "Safe"? | Hic Sec | Low Sec | Null Sec | C1 WH | C2 WH | C3 WH | C4 WH | C5 WH | C6 WH |
---|---|---|---|---|---|---|---|---|---|---|
Local <> | Safe | x | ||||||||
Regional <> | Safe | x | ||||||||
Central <> | Safe | x | x | x | x | |||||
Unsecured <> | NOT safe | x | x | x | x | x | x |
Drone Data Sites | Is it "Safe"? | Hic Sec | Low Sec | Null Sec | C1 WH | C2 WH | C3 WH | C4 WH | C5 WH | C6 WH |
---|---|---|---|---|---|---|---|---|---|---|
Abandoned Research Complex <> | NOT safe | x |
Ghoste Data Sites | Is it "Safe"? | Hic Sec | Low Sec | Null Sec | C1 WH | C2 WH | C3 WH | C4 WH | C5 WH | C6 WH |
---|---|---|---|---|---|---|---|---|---|---|
Lesser <> Covert Research Facility | NOT Safe | x | ||||||||
Standard <> Covert Research Facility | NOT Safe | x | ||||||||
Improved <> Covert Research Facility | NOT Safe | x | ||||||||
Superior <> Covert Research Facility | NOT safe | x | x | x | x | x | x |
Sleeper Cache Data Sites | Is it "Safe"? | Hic Sec | Low Sec | Null Sec | C1 WH | C2 WH | C3 WH | C4 WH | C5 WH | C6 WH |
---|---|---|---|---|---|---|---|---|---|---|
Limited Sleeper Cache | NOT Safe | x | x | x | ||||||
Standard Sleeper Cache | NOT Safe | x | x | x | ||||||
Superior Sleeper Cache | NOT Safe | x | x | x |
Gas Sites | Is it "Safe"? | Hic Sec | Low Sec | Null Sec | C1 WH | C2 WH | C3 WH | C4 WH | C5 WH | C6 WH |
---|---|---|---|---|---|---|---|---|---|---|
<> | NOT safe | x | x | x | x | x | x | x | x | x |