en:guide:exploration

Exploration

Exploration is a good way of making isk and acquiring rare materials used in research and building. Some sites have PVE ships or Detonations which can destroy your ship, so it is important to know what site you are entering and what dangers await. As part of this guide, we will be covering the following:

* Coalition Rules for Exploration

* Scanning for Signatures

* Pirate Relic and Data Sites

Coalition rules for exploration are quite simple and can be found here.

The general consensus is that you should only run scanned sites in systems that your alliance is allowed to do so in.

Lorem Ipsum Dolor Sit Amet etc

Pirate relic and data sites can be found in all Known Space, in C1, C2 and C3 class Wormhole Space, as well as in shattered wormhole systems. There are pockets of space populated with a variety of cosmic structures (i.e., wrecked stations, abandoned machines) and several containers that need to be hacked before the contents can be accessed. The sites do not have any triggers or NPC defenders. Pirate relic sites contain T1 and T2 salvage materials, skill books and blueprint copies. Pirate data sites contain decryptors, data cores, skill books, blueprint copies and manufacturing materials. The contents may vary by faction.

Data and relic sites use the following naming convention according to their location.

Data site name Relic site name Location
Local Crumbling High-security systems
Regional Decayed Low-security systems
Central Ruined Null-security and wormhole systems

Data site containers have a physical appearance that resembles a gyroscope while relic site containers resemble ancient shipwrecks. The containers are named as follows.

Data site containers Relic site containers Difficulty
Info Shard Debris Very easy
Com Tower Rubble Easy
Mainframe Remains Medium
Databank Ruins Hard

The Faction in the above site and container names will be the local pirate group for each region. For a list of site names, see: List of data and relic sites.

You'll have to hack into the containers first by playing the hacking minigame. In order to attempt a hack, you’ll need to lock on to the container and activate the corresponding hacking module. The module (Relic Analyzer in a Relic Site, Data Analyzer in a Data Site, or Integrated Aanalyzer for both) only works if the distance between the container and your ship is less or equal to the module's maximum activation range. Activating the module will open a new window containing the hacking minigame. Failing to hack a container twice will destroy it and its contents.

  • Last modified: 2022/09/13 21:09
  • by Ledeanio