Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
public:dojo:wiki:exploration-guide [2019/11/03 02:35] Aernir Ridley |
public:dojo:wiki:exploration-guide [2023/07/21 20:14] (current) Tian Khamez [Selling Loot] |
||
---|---|---|---|
Line 33: | Line 33: | ||
It is vital to know that there are certain systems that are off-limits for members of Brave to explore in. | It is vital to know that there are certain systems that are off-limits for members of Brave to explore in. | ||
- | <fs large> | + | <fs large> |
=====TL; | =====TL; | ||
Line 57: | Line 57: | ||
* Astrometric Rangefinding (+5%/lvl scan probe strength) | * Astrometric Rangefinding (+5%/lvl scan probe strength) | ||
* Astrometric Aquisition (+5/lvl scan prob duration) | * Astrometric Aquisition (+5/lvl scan prob duration) | ||
- | * Astrometrice | + | * Astrometrics |
Line 79: | Line 79: | ||
The slot layout on the heron makes it the most recommended T1 explo frigate. Being able to fit two rangefinding arrays will make life easier for scanning with low sp characters. Alpha characters who are unable to fit a cloak can just remove it. The ship remains quite cost effective (especially considering dojo hands them out for free). | The slot layout on the heron makes it the most recommended T1 explo frigate. Being able to fit two rangefinding arrays will make life easier for scanning with low sp characters. Alpha characters who are unable to fit a cloak can just remove it. The ship remains quite cost effective (especially considering dojo hands them out for free). | ||
+ | |||
+ | It should be noted that Sisters Core Probes can be used with any launcher including the basic one. These probes should be the first upgrade you make on your Exploratory vessel. | ||
^ Low Skill T1 Explo^ | ^ Low Skill T1 Explo^ | ||
Line 104: | Line 106: | ||
</ | </ | ||
====T2 / CovOps==== | ====T2 / CovOps==== | ||
- | Unless you want to scare off other explorers or want some additional safety, the T2 Exploration Frigates are the next logical steps after the T1 frigate. They offer the huge advantage of a Covops | + | Unless you want to scare off other explorers or want some additional safety, the T2 Exploration Frigates are the next logical steps after the T1 frigate. They offer the huge advantage of a CovOps |
These fits are meant to work for the majority of players who are flying CovOps for exploration. There are upgrades you could make but they generally come at increased SP or ISK requirements. If you can run T2 Relic or Data analyzers, T2 scanning rigs or are willing to put out isk for a Sister’s Core Probe Launcher, it can boost your explo returns. | These fits are meant to work for the majority of players who are flying CovOps for exploration. There are upgrades you could make but they generally come at increased SP or ISK requirements. If you can run T2 Relic or Data analyzers, T2 scanning rigs or are willing to put out isk for a Sister’s Core Probe Launcher, it can boost your explo returns. | ||
Line 111: | Line 113: | ||
| < | | < | ||
Nanofiber Internal Structure II | Nanofiber Internal Structure II | ||
- | ' | + | Inertial Stabilizers II |
- | ' | + | Type-D Restrained Overdrive Injector |
' | ' | ||
Line 126: | Line 128: | ||
Small Polycarbon Engine Housing I | Small Polycarbon Engine Housing I | ||
Small Emission Scope Sharpener I | Small Emission Scope Sharpener I | ||
+ | |||
+ | |||
Hornet EC-300 x15 | Hornet EC-300 x15 | ||
- | Sisters Core Scanner Probe x16</ | + | Sisters Core Scanner Probe x16 |
- | Nanofiber Internal Structure II | + | |
+ | |||
+ | </ | ||
Nanofiber Internal Structure II | Nanofiber Internal Structure II | ||
- | Warp Core Stabilizer | + | Inertial Stabilizers II |
+ | Damage Control | ||
Warp Core Stabilizer II | Warp Core Stabilizer II | ||
Line 144: | Line 151: | ||
Small Hyperspatial Velocity Optimizer II | Small Hyperspatial Velocity Optimizer II | ||
- | Small Hyperspatial Velocity Optimizer | + | Small Low Friction Nozzle Joints |
Small Gravity Capacitor Upgrade I | Small Gravity Capacitor Upgrade I | ||
+ | |||
+ | |||
Hornet EC-300 x15 | Hornet EC-300 x15 | ||
+ | Sisters Core Scanner Probe x16 | ||
Nanite Repair Paste x85 | Nanite Repair Paste x85 | ||
- | Sisters Core Scanner Probe x16 </ | + | |
- | | The Astero, according to many, is the quintessential explo frigate. It is certainly one of the purposes for which CCP created it. With boosts to scanning, hacking and, of course, CovOps cloak, it's easy to see why. You can swap one of the mids (cargo scanner or a rangefinder array) with a data analyzer if you would like.|| | + | </ |
+ | | | ||
+ | The Astero, according to many, is the quintessential explo frigate. It is certainly one of the purposes for which CCP created it. With boosts to scanning, hacking and, of course, CovOps cloak, it's easy to see why. You can swap one of the mids (cargo scanner or a rangefinder array) with a data analyzer if you would like. | ||
^ Buzzard | ^ Buzzard | ||
|< | |< | ||
- | Nanofiber Internal Structure | + | Inertial Stabilizers |
Micro Auxiliary Power Core II | Micro Auxiliary Power Core II | ||
+ | Inertial Stabilizers II | ||
5MN Microwarpdrive II | 5MN Microwarpdrive II | ||
Line 166: | Line 179: | ||
Core Probe Launcher I | Core Probe Launcher I | ||
Covert Ops Cloaking Device II | Covert Ops Cloaking Device II | ||
- | Salvager | + | Interdiction Nullifier |
Small Gravity Capacitor Upgrade I | Small Gravity Capacitor Upgrade I | ||
Small Gravity Capacitor Upgrade I | Small Gravity Capacitor Upgrade I | ||
- | Sisters Core Scanner Probe x16</ | + | |
- | Warp Core Stabilizer | + | |
+ | |||
+ | Sisters Core Scanner Probe x16 | ||
+ | |||
+ | </ | ||
+ | Inertial Stabilizers | ||
Warp Core Stabilizer II | Warp Core Stabilizer II | ||
+ | Nanofiber Internal Structure II | ||
Nanofiber Internal Structure II | Nanofiber Internal Structure II | ||
Line 183: | Line 202: | ||
Core Probe Launcher I | Core Probe Launcher I | ||
Covert Ops Cloaking Device II | Covert Ops Cloaking Device II | ||
- | Salvager | + | Interdiction Nullifier |
Small Gravity Capacitor Upgrade I | Small Gravity Capacitor Upgrade I | ||
Small Gravity Capacitor Upgrade I | Small Gravity Capacitor Upgrade I | ||
+ | |||
+ | |||
+ | |||
Sisters Core Scanner Probe x16 | Sisters Core Scanner Probe x16 | ||
+ | |||
+ | |||
</ | </ | ||
^ Cheetah | ^ Cheetah | ||
|< | |< | ||
- | Warp Core Stabilizer II | ||
- | Warp Core Stabilizer II | ||
Micro Auxiliary Power Core I | Micro Auxiliary Power Core I | ||
+ | Warp Core Stabilizer II | ||
+ | Inertial Stabilizers II | ||
+ | Inertial Stabilizers II | ||
5MN Y-T8 Compact Microwarpdrive | 5MN Y-T8 Compact Microwarpdrive | ||
Line 204: | Line 229: | ||
Core Probe Launcher I | Core Probe Launcher I | ||
Covert Ops Cloaking Device II | Covert Ops Cloaking Device II | ||
- | Salvager | + | Interdiction Nullifier |
Small Gravity Capacitor Upgrade I | Small Gravity Capacitor Upgrade I | ||
Small Gravity Capacitor Upgrade I | Small Gravity Capacitor Upgrade I | ||
- | Sisters Core Scanner Probe x16</ | + | |
- | Warp Core Stabilizer | + | |
+ | |||
+ | Sisters Core Scanner Probe x16 | ||
+ | |||
+ | </ | ||
+ | Inertial Stabilizers | ||
Warp Core Stabilizer II | Warp Core Stabilizer II | ||
Nanofiber Internal Structure II | Nanofiber Internal Structure II | ||
Line 222: | Line 252: | ||
Core Probe Launcher I | Core Probe Launcher I | ||
Covert Ops Cloaking Device II | Covert Ops Cloaking Device II | ||
+ | Interdiction Nullifier I | ||
Small Gravity Capacitor Upgrade I | Small Gravity Capacitor Upgrade I | ||
Small Emission Scope Sharpener I | Small Emission Scope Sharpener I | ||
+ | |||
+ | |||
Hornet EC-300 x1 | Hornet EC-300 x1 | ||
- | Sisters Core Scanner Probe x16</ | + | Sisters Core Scanner Probe x16 |
+ | |||
+ | </ | ||
Another option when it comes to T2 frigates are Interceptors. They don't have a bonus towards exploration, | Another option when it comes to T2 frigates are Interceptors. They don't have a bonus towards exploration, | ||
+ | |||
+ | |||
+ | **Note: Interceptors are not inherently immune to warp bubbles after the May 2021 nullification changes, they need Interdiction Nulifier module equipped. Brave Dojo has a good YouTube video on this topic [[https:// | ||
Line 280: | Line 318: | ||
==NULL SEC== | ==NULL SEC== | ||
Null Sec has again more risk (bubbles!) and payout, but since many systems have next to no activity, once you get away from High/Low Sec you will be mostly undisturbed (unless you jump into someone' | Null Sec has again more risk (bubbles!) and payout, but since many systems have next to no activity, once you get away from High/Low Sec you will be mostly undisturbed (unless you jump into someone' | ||
- | |||
- | ==BRAVE SPACE== | ||
- | |||
- | The best places to explore are Catch itself (not in GE since at any given time there may be hunters) and Stain. Stain is more dangerous as an NPC null sec area but the rewards can be great. | ||
==NPC NULL SPACE== | ==NPC NULL SPACE== | ||
Line 329: | Line 363: | ||
In Wormhole Systems, you will find an entirely different type of sites (sometimes in addition to standard sites). Those have rats in them and require more than a T1 frigate to run. | In Wormhole Systems, you will find an entirely different type of sites (sometimes in addition to standard sites). Those have rats in them and require more than a T1 frigate to run. | ||
- | In Drone Regions you won't find Relic sites. The Data Sites have loot that is completely different from all other space. While they can drop valuable Items, in general you won't find enough of them to make up for thir rarity. | + | In Drone Regions you won't find Relic sites. The Data Sites have loot that is completely different from all other space. While they can drop valuable Items, in general you won't find enough of them to make up for their rarity. |
====Planning a Route==== | ====Planning a Route==== | ||
Line 362: | Line 396: | ||
====Standing Fleet==== | ====Standing Fleet==== | ||
- | If you're exploring in Catch it's a good idea to join standing fleet. This way if you're pointed, you may increase your chances of survival by calling out xxx's to standing. | + | If you're exploring in our space it's a good idea to join regional |
- | Make sure to include your ship type and what's attacking you. A difficult | + | Make sure to include your ship type and what's attacking you. A difficult |
====Comms==== | ====Comms==== | ||
Line 372: | Line 406: | ||
====Intel Chat Channels==== | ====Intel Chat Channels==== | ||
- | Sign in to the intel chat channel for the region. We have 2: Int.Catch & Int.Impass. | + | Sign in to the intel chat channel for the region. We have 1 currently: <fc #00ff00>Int.PureBlind</ |
* Look around the channel to see if a system is trouble. | * Look around the channel to see if a system is trouble. | ||
* You can report neut and hostile sightings | * You can report neut and hostile sightings | ||
* Drag the name from local | * Drag the name from local | ||
- | * Drag the system from the system name on the top left of your clie | + | * Drag the system from the system name on the top left of your client |
* Drag the ship type from D-scan. | * Drag the ship type from D-scan. | ||
* If your D-scan does not pick up the ship, put NV for No Visual | * If your D-scan does not pick up the ship, put NV for No Visual | ||
Line 424: | Line 458: | ||
In order to help you save time and enable you to help other explorers, there are tools that provide intel on the various signatures in a system. | In order to help you save time and enable you to help other explorers, there are tools that provide intel on the various signatures in a system. | ||
- | ====Deepsafe==== | ||
- | **https:// | ||
- | |||
- | * Log in with Eve CREST (login). Deepsafe will follow you, loading to your current system when you jump. | ||
- | * To the right of the map is a list of the signatures in the system that people have logged and a description of what they are. Be advised the list may not be current. | ||
- | * To remove a signature that no longer exists, click the delete button for that line item (x). | ||
- | * To add a signature, scan it to 75%, copy it from your probe scanner panel (CTRL-C), paste in the form (CTRL-V) and click submit. | ||
====Pathfinder==== | ====Pathfinder==== | ||
Line 494: | Line 521: | ||
* Drag the probes closer to the signature individually. You will need to move 7 probes (5 around, 1 on top & 1 on bottom). | * Drag the probes closer to the signature individually. You will need to move 7 probes (5 around, 1 on top & 1 on bottom). | ||
* Do not move them too close, or you will create a void pocket where no scan signal will reach. | * Do not move them too close, or you will create a void pocket where no scan signal will reach. | ||
+ | |||
+ | More experienced explorers should be aware that no signature will ever spawn further than 4 AU from a celestial object, which is coincidentally the default positioning of probes when you launch them. | ||
+ | |||
+ | To utilise this, in your system map (default key is F9), in top left corner open options and deselect everything. After that you will see that there are white dots on that map, those are celestials like planets and moons. Position your probes centered on celestial that is either inside or in close proximity to Signature bubble. This will shorten your scan time for usually 2 scans. | ||
=====Warping to Sites==== | =====Warping to Sites==== | ||
Line 526: | Line 557: | ||
On activating the appropriate module on the can, the hacking interface will come up. | On activating the appropriate module on the can, the hacking interface will come up. | ||
- | {{http://imgur.com/ | + | {{https://raw.githubusercontent.com/ |
- | At the bottom left is your hacking virus status. The bottom number & the meter to the left is your virus strength - the amount of damage you do with each click on a hostile node or system core. The top number & the meter on the right is your coherence (health). This can be hurt by hostile nodes & the system core. | + | At the bottom left is your hacking virus status. The bottom number & the meter to the right is your virus strength - the amount of damage you do with each click on a hostile node or system core. The top number & the meter on the left is your coherence (health). This can be hurt by hostile nodes & the system core. |
Your starting point is the empty orange circle - shown here on the top left. You can proceed by clicking on empty green nodes that are adjacent to your starting point & the ones you've already selected. | Your starting point is the empty orange circle - shown here on the top left. You can proceed by clicking on empty green nodes that are adjacent to your starting point & the ones you've already selected. | ||
- | {{https://i.imgur.com/ | + | {{https://raw.githubusercontent.com/ |
As you click on nodes, you'll see a number in the node ranging from 5 to 1. The lower the number, the closer you are to a utility subsystem, data cache or the system core. | As you click on nodes, you'll see a number in the node ranging from 5 to 1. The lower the number, the closer you are to a utility subsystem, data cache or the system core. | ||
Line 541: | Line 572: | ||
All of the Core nodes function in the same way, with an increasing health as the difficulty of the hack increases. These are the nodes found in the sites. | All of the Core nodes function in the same way, with an increasing health as the difficulty of the hack increases. These are the nodes found in the sites. | ||
- | ^ {{http://imgur.com/ | + | ^ {{https://raw.githubusercontent.com/ |
- | ^ {{http://imgur.com/ | + | ^ {{https://raw.githubusercontent.com/ |
- | ^ {{http://imgur.com/ | + | ^ {{https://raw.githubusercontent.com/ |
==HOSTILE NODES== | ==HOSTILE NODES== | ||
- | ^ {{http://imgur.com/ | + | ^ {{https://raw.githubusercontent.com/ |
- | ^ {{http://imgur.com/ | + | ^ {{https://raw.githubusercontent.com/ |
- | ^ {{http://imgur.com/ | + | ^ {{https://raw.githubusercontent.com/ |
- | ^ {{http://imgur.com/ | + | ^ {{https://raw.githubusercontent.com/ |
==UTILITY SUBSYSTEMS== | ==UTILITY SUBSYSTEMS== | ||
Line 557: | Line 588: | ||
The following hacking tools, and how you use them, can make or break a hack. The tools will show up when you uncover a node on the grid, and once you click that same node they will be added to your utility toolbar (the row of slots in the bottom of the above image of the hacking interface). To activate one of the tools, simply click on it. | The following hacking tools, and how you use them, can make or break a hack. The tools will show up when you uncover a node on the grid, and once you click that same node they will be added to your utility toolbar (the row of slots in the bottom of the above image of the hacking interface). To activate one of the tools, simply click on it. | ||
- | ^ {{http://imgur.com/ | + | ^ {{https://raw.githubusercontent.com/ |
- | ^ {{http://imgur.com/ | + | ^ {{https://raw.githubusercontent.com/ |
- | ^ {{http://imgur.com/ | + | ^ {{https://raw.githubusercontent.com/ |
^ | This is the **Polymorphic Shield utility**. It prevents damage from any hostile node for 2 clicks | | ^ | This is the **Polymorphic Shield utility**. It prevents damage from any hostile node for 2 clicks | | ||
==DATA CACHES== | ==DATA CACHES== | ||
- | ^ {{http://imgur.com/ | + | ^ {{https://raw.githubusercontent.com/ |
==SYSTEM CORE LOCATION== | ==SYSTEM CORE LOCATION== | ||
- | The system core can be anywhere - in the middle of nowhere blocked by layers of hostile nodes or even right next to your starting point! Often, however, it is located | + | The system core can be anywhere - but there is still some logic behind it. If your starting point is in the corner |
+ | However, if you spawn in the middle, there is no logic used, the core can be anywhere. | ||
==THE RULE OF 6== | ==THE RULE OF 6== | ||
Line 575: | Line 607: | ||
You will sometimes find a node surrounded by 6 other nodes (as can be seen in the hacking interface above among the as-of-yet unavailable nodes). It is **very likely, though by no means guaranteed** that the center node is safe. You may even find a path made by nodes surrounded by 6 other nodes that provide you (probably) safe passage to where you want to go in the hack. If you do encounter a defensive subsystem in a center node (like a firewall), then the system core will always be adjacent to that subsystem. | You will sometimes find a node surrounded by 6 other nodes (as can be seen in the hacking interface above among the as-of-yet unavailable nodes). It is **very likely, though by no means guaranteed** that the center node is safe. You may even find a path made by nodes surrounded by 6 other nodes that provide you (probably) safe passage to where you want to go in the hack. If you do encounter a defensive subsystem in a center node (like a firewall), then the system core will always be adjacent to that subsystem. | ||
+ | |||
+ | A small side note, if you ever encounter Secondary Vector Utility, it means you have a Virus Suppressor somewhere. Try to save it for that nasty thing. | ||
+ | |||
+ | It should also be mentioned that, after using Secondary Vector Utility you don't have to click on that node second or third time for it to apply damage. You can simply click on other nodes. | ||
====Failing a Can==== | ====Failing a Can==== | ||
Line 610: | Line 646: | ||
====Selling Loot==== | ====Selling Loot==== | ||
- | You can contract your loot to one of the buybacks we feature. Although they buy at a percentage of Jita buy, you are essentially paying a little for convenience and the ability to avoid market trading activities if you do not enjoy that. Learn more and find buybacks at /member/alliance/programs/buybacks? | + | You can contract your loot to one of the buybacks we feature. Although they buy at a percentage of Jita buy, you are essentially paying a little for convenience and the ability to avoid market trading activities if you do not enjoy that. Learn more and find buybacks at [[/public/alliance/industry/buyback]]. |
- | If you do like to have fun with spreadsheets and economic charts for some reason, you can ship your loot to markets like Amarr and Jita and manage orders. Learn more and find freight services at / | + | If you do like to have fun with spreadsheets and economic charts for some reason, you can ship your loot to markets like Amarr and Jita and manage orders. Learn more and find freight services at [[/ |
=====Site Respawn===== | =====Site Respawn===== | ||
Line 638: | Line 674: | ||
==LIMITED== | ==LIMITED== | ||
- | After you scan out the site, you will warp to the first room. Here you will see a can and an acceleration gate. Hack the can. | + | After you scan out the site, you will warp to the first room. Here you will see a can and an acceleration gate. Hack the can. (if you fail this hack, a 2 minute timer will start, after which the can will explode) |
\\ | \\ | ||
\\ | \\ | ||
Line 656: | Line 692: | ||
* Apply as you would any other signature | * Apply as you would any other signature | ||
* Once you enter the wormhole, you can apply the system designation by clicking on " | * Once you enter the wormhole, you can apply the system designation by clicking on " | ||
- | |||
- | ==DEEPSAFE== | ||
- | |||
- | Apply as you would any other signature | ||
- | |||
- | ==BRAVE HOLE SCOUTS SCANNING REWARD== | ||
- | |||
- | Brave Hole Scouts offers a **10 million ISK reward** for C5 holes in Catch submitted to Pathfinder. | ||
- | |||
- | This is to encourage reporting of C5 wormholes. This is important as hostiles can send a significant force against us through via the wormhole. It also alerts people who want to form wormhole krabbing fleets of the availability of the wormhole. | ||
- | |||
- | * Join the Brave Hole Scouts mailing list | ||
- | * On the bottom left of your mail panel click "Add Mailing List" | ||
- | * Enter "Brave Hole Scouts" | ||
- | * Apply the wormhole signature to Pathfinder | ||
- | * Enter hole, apply system, scan down all anomalies in the system & apply them to Pathfinder | ||
- | * Send an Eve-mail to Brave Hole Scouts with the wormhole information | ||
- | |||
- | You are entitled to payouts whether or not the wormhole is used. | ||
- | |||
- | Wormholes in the 9KOE-A -> HED-GP pipe are not accepted. | ||
====Wormhole Safety==== | ====Wormhole Safety==== | ||
Line 706: | Line 721: | ||
This chart was borrowed and adapted from an [[https:// | This chart was borrowed and adapted from an [[https:// | ||
- | {{https://i.imgur.com/ | + | {{https://raw.githubusercontent.com/ |
=====Related Activities===== | =====Related Activities===== |