Menu

Inventory



Show Categories | First | Previous | 16 of 42 | Next | Last
Show Groups | First | Previous | 316 of 340 | Next | Last


Scatter Container (Not Published)
Image Name Required Skill Access Difficulty Min. Equipment Max. Equipment Respawn Timer Guardless
Abandoned Sleeper Artifact
This might once have been an important piece of an engine, but now you're not getting anything out of it without the help of an analyzer.
Archaeology 1 10 2 5   1
Abandoned Talocan Battleship
It looks like this ship was gutted, then left to drift.
Archaeology 1 -10 2 5   1
Ammatar Relics
This massive hulk of debris seems to have once been a part of the outer hull of a battleship or station.
Archaeology 1 30 2 5 20 s 1
Ancient Ruins
Eons seperate you and this foreboding ruins. One can only wonder over who built it long ago and, more importantly, what they left behind. A shrewd archaeologist might be able to unearth something of interest.
Archaeology 1 -10 2 5   1
Ancient Ship Structure
This piece of floating rubble looks intriguing, but requires analyzing equipment before it yields any of its secrets.
  20 2 5 20 s 1
Angel Chemical Laboratory
This mobile laboratory can be moved and anchored with relative ease, and also tailored towards certain specialties which has led many pirate factions using them in places where creating a fully fledged static facility would be a massive liability.

This particular one is being used a chemical research laboratory and is liable to contain some useful items for the entrepreneur after a small amount of hacking.

Hacking 1 10 1 4   1
Angel Com Tower
If you have the right equipment you might be able to hack into the com tower and get some valuable information.
Hacking 1     1   1
Angel Databank
If you have the right equipment you might be able to hack into the databank and get some valuable information.
Hacking 1     1   1
Angel Debris
This piece of floating debris looks intriguing, but requires analyzing equipment before it yields any of its secrets.
Archaeology 1     1   1
Angel Info Shard
If you have the right equipment you might be able to hack into the info shard and get some valuable information.
Hacking 1     1   1
Angel Mainframe
If you have the right equipment you might be able to hack into the mainframe and get some valuable information.
Hacking 1     1   1
Angel Narcotics Storage Facility
This modified habitat module is being used as storage facility for various items that the pirate factions use for drug manufacturing. Usually heavily guarded this would undoubtedly reap a bounty with a bit of hacking once past the security.
Hacking 1 10 1 4   1
Angel Remains
This piece of floating remains look intriguing, but requires analyzing equipment before it yields any of its secrets.
Archaeology 1     1   1
Angel Rubble
This piece of floating rubble looks intriguing, but requires analyzing equipment before it yields any of its secrets.
Archaeology 1     1   1
Angel Ruins
This piece of floating ruins looks intriguing, but requires analyzing equipment before it yields any of its secrets.
Archaeology 1     1   1
Backup Array
The local pirates are actively trying to enhance the potency of their products, as well as improving other aspects of drug manufacturing. This unit stores some of their backup files and with the right equipment it might be possible to hack into it.
Hacking 1 -10 2 5   1
Basic Angel Vault
An Angel stasis security Vault . Nearly impossible to destroy but perhaps it is possible to bypass its security
Hacking 1 30 2 5 20 s 1
Basic Blood Raider Vault
A Blood Raider stasis security vault. Nearly impossible to destroy but perhaps it is possible to bypass its security.
Hacking 1 30 2 5 20 s 1
Basic Guristas Vault
A Guristas security vault. Nearly impossible to destroy but perhaps it is possible to bypass its security
Hacking 1 30 2 5 20 s 1
Basic Serpentis Vault
A Serpentis stasis security vault. Nearly impossible to destroy but perhaps it is possible to bypass its security.
Hacking 1 30 2 5 20 s 1
Blood Com Tower
If you have the right equipment you might be able to hack into the com tower and get some valuable information.
Hacking 1     1   1
Blood Databank
If you have the right equipment you might be able to hack into the databank and get some valuable information.
Hacking 1     1   1
Blood Debris
This piece of floating debris looks intriguing, but requires analyzing equipment before it yields any of its secrets.
Archaeology 1     1   1
Blood Info Shard
If you have the right equipment you might be able to hack into the info shard and get some valuable information.
Hacking 1     1   1
Blood Mainframe
If you have the right equipment you might be able to hack into the mainframe and get some valuable information.
Hacking 1     1   1
Blood Raider Chemical Laboratory
This mobile laboratory can be moved and anchored with relative ease, and also tailored towards certain specialties which has led many pirate factions using them in places where creating a fully fledged static facility would be a massive liability.

This particular one is being used a chemical research laboratory and is liable to contain some useful items for the entrepreneur after a small amount of hacking.

Hacking 1 10 1 4   1
Blood Remains
This piece of floating remains look intriguing, but requires analyzing equipment before it yields any of its secrets.
Archaeology 1     1   1
Blood Rubble
This piece of floating rubble looks intriguing, but requires analyzing equipment before it yields any of its secrets.
Archaeology 1     1   1
Blood Ruins
This piece of floating ruins looks intriguing, but requires analyzing equipment before it yields any of its secrets.
Archaeology 1     1   1
Broken Sleeper Databank
This object was severed from some larger structure in the distant past, perhaps as the result of an asteroid strike. Fortunately, a once-redundant power source has provided just enough energy to keep its databank operable. You may be able to extract something with your Data Analyzer.
Hacking 1 -10   1   1
Com Relay
The com relay is used in environments with high interference. It is used by the local pirates to chat about the booster industry. It is password protected, but probably not all that well.
Hacking 1 0 2 5   1
Component Bin
A locked storage bin containing various items used by the local pirates in their drug manufacturing. A bit of hacking might unlock it.
Hacking 1 10 2 5   1
Data Storage Device
If you have the right equipment you might be able to hack into this container and get some valuable information.
  10 2 5 20 s 1
Decrepit Sleeper Artifact
This mangled sheet of hull plating contains something of interest to your analyzer.
Archaeology 1 -10 2 5   1
Deformed Sleeper Databank
Deformed Sleeper Databank: This section of hull plating once shielded an auxiliary databank on its obverse. The databank has been exposed to space for some time now, but you may still be able to extract something with your Data Analyzer.
Hacking 1 10   1   1
Demo Kit
A locked storage bin containing various items used by the local pirates in their drug manufacturing. A bit of hacking might unlock it.
Hacking 1 10 2 5   1
Derelict Talocan Frigate
It looks like this ship was gutted, then left to drift.
Archaeology 1 30 2 5   1
Deserted Talocan Cruiser
It looks like this ship was gutted, then left to drift.
Archaeology 1 10 2 5   1
Ejected Sleeper Databank
Ejected Sleeper Databank: This modular structure was long ago subjected to some sort of emergency ejection procedure, but you can detect an intact databank concealed under its heavy plating. You may be able to extract something with your Data Analyzer.
Hacking 1 20   1   1
Floating Debris
At first glance this looks like just another piece of space debris, but on closer inspection it looks to be very old. What secrets might it unveil to proficient archaeologists?
Archaeology 1 0 2 5   1
Forgotten Sleeper Artifact
Your analyzer is picking up something of interest in this piece of twisted wreckage, though you can't for the life of you see what it is.
Archaeology 1 30 2 5   1
Forlorn Sleeper Artifact
Analysis could yield something valuable.
Archaeology 1 -15 2 5   1
Fortified Angel Vault
An Angel stasis security Vault . Nearly impossible to destroy but perhaps it is possible to bypass its security
Hacking 1 0 2 5 20 s 1
Fortified Blood Raider Vault
A Blood Raider stasis security vault. Nearly impossible to destroy but perhaps it is possible to bypass its security.
Hacking 1 0 2 5 20 s 1
Fortified Guristas Vault
A Guristas security vault. Nearly impossible to destroy but perhaps it is possible to bypass its security
Hacking 1 0 2 5 20 s 1
Fortified Serpentis Vault
A Serpentis stasis security vault. Nearly impossible to destroy but perhaps it is possible to bypass its security.
Hacking 1 0 2 5 20 s 1
Frostline Logistics Node
A logistics node used by Frostline Laboratories to co-ordinate and supply its operations in the vicinity of the ice dwarf.
Hacking 1     2 5 s 1
Gadget Casket
A locked storage bin containing various items used by the local pirates in their drug manufacturing. A bit of hacking might unlock it.
Hacking 1 10 2 5   1
Guristas Chemical Laboratory
This mobile laboratory can be moved and anchored with relative ease, and also tailored towards certain specialties which has led many pirate factions using them in places where creating a fully fledged static facility would be a massive liability.

This particular one is being used a chemical research laboratory and is liable to contain some useful items for the entrepreneur after a small amount of hacking.

Hacking 1 10 1 4   1
Guristas Com Tower
If you have the right equipment you might be able to hack into the com tower and get some valuable information.
Hacking 1     1   1
Guristas Databank
If you have the right equipment you might be able to hack into the databank and get some valuable information.
Hacking 1     1   1
Guristas Debris
This piece of floating debris looks intriguing, but requires analyzing equipment before it yields any of its secrets.
Archaeology 1     1   1
Guristas Info Shard
If you have the right equipment you might be able to hack into the info shard and get some valuable information.
Hacking 1     1   1
Guristas Mainframe
If you have the right equipment you might be able to hack into the mainframe and get some valuable information.
Hacking 1     1   1
Guristas Narcotics Storage Facility
This modified habitat module is being used as storage facility for various items that the pirate factions use for drug manufacturing. Usually heavily guarded this would undoubtedly reap a bounty with a bit of hacking once past the security.
Hacking 1 10 1 4   1
Guristas Remains
This piece of floating remains look intriguing, but requires analyzing equipment before it yields any of its secrets.
Archaeology 1     1   1
Guristas Rubble
This piece of floating rubble looks intriguing, but requires analyzing equipment before it yields any of its secrets.
Archaeology 1     1   1
Guristas Ruins
This piece of floating ruins looks intriguing, but requires analyzing equipment before it yields any of its secrets.
Archaeology 1     1   1
Info Matrix
The info matrix is used by the local pirates to learn how to become good pirates. It is password protected, but probably not all that well.
Hacking 1 0 2 5   1
Lost Sleeper Artifact
You suspect this battered hunk of metal may conceal some kind of relic.
Archaeology 1 20 2 5   1
Malfunctioning Sleeper Databank
This databank has clearly been the site of a serious impact, but it remains online. You may be able to extract something with your Data Analyzer.
Hacking 1 30   1   1
Metadrones - LM-A-1 - B
Containment facilities like this exist throughout known space, usually serving as high security prisons. This one, however, appears to have been heavily reinforced.

There are multiple breaches in the hull, but they appear to originate from within the structure rather than without. Which begs the question; what kinds of monstrosities were being held inside?

Hacking 4 10 1 2   1
Metadrones - LM-A-1 - F
This listing husk of a research station hangs in space; bodies litter the numerous breaches in the superstructure, illustrating what must have been a horrific attack.

Betrayed by the play of shadows and light, glimpses of activity can be observed, although no biological life could have possibly survived such devastation.

Hacking 4 -10 1 2   1
Metadrones - LM-A-1 - N
Containment facilities like this exist throughout known space, usually serving as high security prisons. This one, however, appears to have been heavily reinforced.

There are multiple breaches in the hull, but they appear to originate from within the structure rather than without. Which begs the question; what kinds of monstrosities were being held inside?

Hacking 4 20 2 4   1
Metadrones - LM-A-2 - B
Containment facilities like this exist throughout known space, usually serving as high security prisons. This one, however, appears to have been heavily reinforced.

There are multiple breaches in the hull, but they appear to originate from within the structure rather than without. Which begs the question; what kinds of monstrosities were being held inside?

Hacking 4 10 1 2   1
Metadrones - LM-A-2 - F
This listing husk of a research station hangs in space; bodies litter the numerous breaches in the superstructure, illustrating what must have been a horrific attack.

Betrayed by the play of shadows and light, glimpses of activity can be observed, although no biological life could have possibly survived such devastation.

Hacking 4 -10 1 2   1
Metadrones - LM-A-2 - N
Containment facilities like this exist throughout known space, usually serving as high security prisons. This one, however, appears to have been heavily reinforced.

There are multiple breaches in the hull, but they appear to originate from within the structure rather than without. Which begs the question; what kinds of monstrosities were being held inside?

Hacking 4 20 2 4   1
Metadrones - LM-C-1 - B
Containment facilities like this exist throughout known space, usually serving as high security prisons. This one, however, appears to have been heavily reinforced.

There are multiple breaches in the hull, but they appear to originate from within the structure rather than without. Which begs the question; what kinds of monstrosities were being held inside?

Hacking 4 10 1 2   1
Metadrones - LM-C-1 - F
This listing husk of a research station hangs in space; bodies litter the numerous breaches in the superstructure, illustrating what must have been a horrific attack.

Betrayed by the play of shadows and light, glimpses of activity can be observed, although no biological life could have possibly survived such devastation.

Hacking 4 -10 1 2   1
Metadrones - LM-C-1 - N
Containment facilities like this exist throughout known space, usually serving as high security prisons. This one, however, appears to have been heavily reinforced.

There are multiple breaches in the hull, but they appear to originate from within the structure rather than without. Which begs the question; what kinds of monstrosities were being held inside?

Hacking 4 20 2 4   1
Metadrones - LM-C-2 - B
Containment facilities like this exist throughout known space, usually serving as high security prisons. This one, however, appears to have been heavily reinforced.

There are multiple breaches in the hull, but they appear to originate from within the structure rather than without. Which begs the question; what kinds of monstrosities were being held inside?

Hacking 4 10 1 2   1
Metadrones - LM-C-2 - F
This listing husk of a research station hangs in space; bodies litter the numerous breaches in the superstructure, illustrating what must have been a horrific attack.

Betrayed by the play of shadows and light, glimpses of activity can be observed, although no biological life could have possibly survived such devastation.

Hacking 4 -10 1 2   1
Metadrones - LM-C-2 - N
Containment facilities like this exist throughout known space, usually serving as high security prisons. This one, however, appears to have been heavily reinforced.

There are multiple breaches in the hull, but they appear to originate from within the structure rather than without. Which begs the question; what kinds of monstrosities were being held inside?

Hacking 4 20 2 4   1
Metadrones - LM-G-1 - B
Containment facilities like this exist throughout known space, usually serving as high security prisons. This one, however, appears to have been heavily reinforced.

There are multiple breaches in the hull, but they appear to originate from within the structure rather than without. Which begs the question; what kinds of monstrosities were being held inside?

Hacking 4 10 1 2   1
Metadrones - LM-G-1 - F
This listing husk of a research station hangs in space; bodies litter the numerous breaches in the superstructure, illustrating what must have been a horrific attack.

Betrayed by the play of shadows and light, glimpses of activity can be observed, although no biological life could have possibly survived such devastation.

Hacking 4 -10 1 2   1
Metadrones - LM-G-1 - N
Containment facilities like this exist throughout known space, usually serving as high security prisons. This one, however, appears to have been heavily reinforced.

There are multiple breaches in the hull, but they appear to originate from within the structure rather than without. Which begs the question; what kinds of monstrosities were being held inside?

Hacking 4 20 2 4   1
Metadrones - LM-G-2 - N
Containment facilities like this exist throughout known space, usually serving as high security prisons. This one, however, appears to have been heavily reinforced.

There are multiple breaches in the hull, but they appear to originate from within the structure rather than without. Which begs the question; what kinds of monstrosities were being held inside?

Hacking 4 20 2 4   1
Metadrones - LM-M-1 - B
Containment facilities like this exist throughout known space, usually serving as high security prisons. This one, however, appears to have been heavily reinforced.

There are multiple breaches in the hull, but they appear to originate from within the structure rather than without. Which begs the question; what kinds of monstrosities were being held inside?

Hacking 4 10 1 2   1
Metadrones - LM-M-1 - F
This listing husk of a research station hangs in space; bodies litter the numerous breaches in the superstructure, illustrating what must have been a horrific attack.

Betrayed by the play of shadows and light, glimpses of activity can be observed, although no biological life could have possibly survived such devastation.

Hacking 4 -10 1 2   1
Metadrones - LM-M-1 - N
Containment facilities like this exist throughout known space, usually serving as high security prisons. This one, however, appears to have been heavily reinforced.

There are multiple breaches in the hull, but they appear to originate from within the structure rather than without. Which begs the question; what kinds of monstrosities were being held inside?

Hacking 4 20 2 4   1
Metadrones - LM-M-2 - N
Containment facilities like this exist throughout known space, usually serving as high security prisons. This one, however, appears to have been heavily reinforced.

There are multiple breaches in the hull, but they appear to originate from within the structure rather than without. Which begs the question; what kinds of monstrosities were being held inside?

Hacking 4 20 2 4   1
Metadrones - LMH-A-1 - B
Containment facilities like this exist throughout known space, usually serving as high security prisons. This one, however, appears to have been heavily reinforced.

There are multiple breaches in the hull, but they appear to originate from within the structure rather than without. Which begs the question; what kinds of monstrosities were being held inside?

Hacking 4 10 1 2   1
Metadrones - LMH-A-1 - F
This listing husk of a research station hangs in space; bodies litter the numerous breaches in the superstructure, illustrating what must have been a horrific attack.

Betrayed by the play of shadows and light, glimpses of activity can be observed, although no biological life could have possibly survived such devastation.

Hacking 4 -10 1 2   1
Metadrones - LMH-A-1 - N
Containment facilities like this exist throughout known space, usually serving as high security prisons. This one, however, appears to have been heavily reinforced.

There are multiple breaches in the hull, but they appear to originate from within the structure rather than without. Which begs the question; what kinds of monstrosities were being held inside?

Hacking 4 20 2 4   1
Metadrones - LMH-A-2 - B
Containment facilities like this exist throughout known space, usually serving as high security prisons. This one, however, appears to have been heavily reinforced.

There are multiple breaches in the hull, but they appear to originate from within the structure rather than without. Which begs the question; what kinds of monstrosities were being held inside?

Hacking 4 10 1 2   1
Metadrones - LMH-A-2 - F
This listing husk of a research station hangs in space; bodies litter the numerous breaches in the superstructure, illustrating what must have been a horrific attack.

Betrayed by the play of shadows and light, glimpses of activity can be observed, although no biological life could have possibly survived such devastation.

Hacking 4 -10 1 2   1
Metadrones - LMH-A-2 - N
Containment facilities like this exist throughout known space, usually serving as high security prisons. This one, however, appears to have been heavily reinforced.

There are multiple breaches in the hull, but they appear to originate from within the structure rather than without. Which begs the question; what kinds of monstrosities were being held inside?

Hacking 4 20 2 4   1
Metadrones - LMH-C-1 - B
Containment facilities like this exist throughout known space, usually serving as high security prisons. This one, however, appears to have been heavily reinforced.

There are multiple breaches in the hull, but they appear to originate from within the structure rather than without. Which begs the question; what kinds of monstrosities were being held inside?

Hacking 4 10 1 2   1
Metadrones - LMH-C-1 - F
This listing husk of a research station hangs in space; bodies litter the numerous breaches in the superstructure, illustrating what must have been a horrific attack.

Betrayed by the play of shadows and light, glimpses of activity can be observed, although no biological life could have possibly survived such devastation.

Hacking 4 -10 1 2   1
Metadrones - LMH-C-1 - N
Containment facilities like this exist throughout known space, usually serving as high security prisons. This one, however, appears to have been heavily reinforced.

There are multiple breaches in the hull, but they appear to originate from within the structure rather than without. Which begs the question; what kinds of monstrosities were being held inside?

Hacking 4 20 2 4   1
Metadrones - LMH-C-2 - B
Containment facilities like this exist throughout known space, usually serving as high security prisons. This one, however, appears to have been heavily reinforced.

There are multiple breaches in the hull, but they appear to originate from within the structure rather than without. Which begs the question; what kinds of monstrosities were being held inside?

Hacking 4 10 1 2   1
Metadrones - LMH-C-2 - F
This listing husk of a research station hangs in space; bodies litter the numerous breaches in the superstructure, illustrating what must have been a horrific attack.

Betrayed by the play of shadows and light, glimpses of activity can be observed, although no biological life could have possibly survived such devastation.

Hacking 4 -10 1 2   1
Metadrones - LMH-C-2 - N
Containment facilities like this exist throughout known space, usually serving as high security prisons. This one, however, appears to have been heavily reinforced.

There are multiple breaches in the hull, but they appear to originate from within the structure rather than without. Which begs the question; what kinds of monstrosities were being held inside?

Hacking 4 20 2 4   1
Metadrones - LMH-G-1 - B
Containment facilities like this exist throughout known space, usually serving as high security prisons. This one, however, appears to have been heavily reinforced.

There are multiple breaches in the hull, but they appear to originate from within the structure rather than without. Which begs the question; what kinds of monstrosities were being held inside?

Hacking 4 10 1 2   1
Metadrones - LMH-G-1 - F
This listing husk of a research station hangs in space; bodies litter the numerous breaches in the superstructure, illustrating what must have been a horrific attack.

Betrayed by the play of shadows and light, glimpses of activity can be observed, although no biological life could have possibly survived such devastation.

Hacking 4 -10 1 2   1
Metadrones - LMH-G-1 - N
Containment facilities like this exist throughout known space, usually serving as high security prisons. This one, however, appears to have been heavily reinforced.

There are multiple breaches in the hull, but they appear to originate from within the structure rather than without. Which begs the question; what kinds of monstrosities were being held inside?

Hacking 4 20 2 4   1
Metadrones - LMH-G-2 - B
Containment facilities like this exist throughout known space, usually serving as high security prisons. This one, however, appears to have been heavily reinforced.

There are multiple breaches in the hull, but they appear to originate from within the structure rather than without. Which begs the question; what kinds of monstrosities were being held inside?

Hacking 4 10 1 2   1
Metadrones - LMH-G-2 - F
This listing husk of a research station hangs in space; bodies litter the numerous breaches in the superstructure, illustrating what must have been a horrific attack.

Betrayed by the play of shadows and light, glimpses of activity can be observed, although no biological life could have possibly survived such devastation.

Hacking 4 -10 1 2   1
Metadrones - LMH-G-2 - N
Containment facilities like this exist throughout known space, usually serving as high security prisons. This one, however, appears to have been heavily reinforced.

There are multiple breaches in the hull, but they appear to originate from within the structure rather than without. Which begs the question; what kinds of monstrosities were being held inside?

Hacking 4 20 2 4   1
Metadrones - LMH-M-1 - B
Containment facilities like this exist throughout known space, usually serving as high security prisons. This one, however, appears to have been heavily reinforced.

There are multiple breaches in the hull, but they appear to originate from within the structure rather than without. Which begs the question; what kinds of monstrosities were being held inside?

Hacking 4 10 1 2   1
Metadrones - LMH-M-1 - F
This listing husk of a research station hangs in space; bodies litter the numerous breaches in the superstructure, illustrating what must have been a horrific attack.

Betrayed by the play of shadows and light, glimpses of activity can be observed, although no biological life could have possibly survived such devastation.

Hacking 4 -10 1 2   1
Metadrones - LMH-M-1 - N
Containment facilities like this exist throughout known space, usually serving as high security prisons. This one, however, appears to have been heavily reinforced.

There are multiple breaches in the hull, but they appear to originate from within the structure rather than without. Which begs the question; what kinds of monstrosities were being held inside?

Hacking 4 20 2 4   1
Metadrones - LMH-M-2 - B
Containment facilities like this exist throughout known space, usually serving as high security prisons. This one, however, appears to have been heavily reinforced.

There are multiple breaches in the hull, but they appear to originate from within the structure rather than without. Which begs the question; what kinds of monstrosities were being held inside?

Hacking 4 10 1 2   1
Metadrones - LMH-M-2 - F
This listing husk of a research station hangs in space; bodies litter the numerous breaches in the superstructure, illustrating what must have been a horrific attack.

Betrayed by the play of shadows and light, glimpses of activity can be observed, although no biological life could have possibly survived such devastation.

Hacking 4 -10 1 2   1
Metadrones - LMH-M-2 - N
Containment facilities like this exist throughout known space, usually serving as high security prisons. This one, however, appears to have been heavily reinforced.

There are multiple breaches in the hull, but they appear to originate from within the structure rather than without. Which begs the question; what kinds of monstrosities were being held inside?

Hacking 4 20 2 4   1
Metadrones - MH-A-1 - B
Containment facilities like this exist throughout known space, usually serving as high security prisons. This one, however, appears to have been heavily reinforced.

There are multiple breaches in the hull, but they appear to originate from within the structure rather than without. Which begs the question; what kinds of monstrosities were being held inside?

Hacking 4 10 1 2   1
Metadrones - MH-A-1 - F
This listing husk of a research station hangs in space; bodies litter the numerous breaches in the superstructure, illustrating what must have been a horrific attack.

Betrayed by the play of shadows and light, glimpses of activity can be observed, although no biological life could have possibly survived such devastation.

Hacking 4 -10 1 2   1
Metadrones - MH-A-1 - N
Containment facilities like this exist throughout known space, usually serving as high security prisons. This one, however, appears to have been heavily reinforced.

There are multiple breaches in the hull, but they appear to originate from within the structure rather than without. Which begs the question; what kinds of monstrosities were being held inside?

Hacking 4 20 2 4   1
Metadrones - MH-A-2 - B
Containment facilities like this exist throughout known space, usually serving as high security prisons. This one, however, appears to have been heavily reinforced.

There are multiple breaches in the hull, but they appear to originate from within the structure rather than without. Which begs the question; what kinds of monstrosities were being held inside?

Hacking 4 10 1 2   1
Metadrones - MH-A-2 - F
This listing husk of a research station hangs in space; bodies litter the numerous breaches in the superstructure, illustrating what must have been a horrific attack.

Betrayed by the play of shadows and light, glimpses of activity can be observed, although no biological life could have possibly survived such devastation.

Hacking 4 -10 1 2   1
Metadrones - MH-A-2 - N
Containment facilities like this exist throughout known space, usually serving as high security prisons. This one, however, appears to have been heavily reinforced.

There are multiple breaches in the hull, but they appear to originate from within the structure rather than without. Which begs the question; what kinds of monstrosities were being held inside?

Hacking 4 20 2 4   1
Metadrones - MH-C-1 - B
Containment facilities like this exist throughout known space, usually serving as high security prisons. This one, however, appears to have been heavily reinforced.

There are multiple breaches in the hull, but they appear to originate from within the structure rather than without. Which begs the question; what kinds of monstrosities were being held inside?

Hacking 4 10 1 2   1
Metadrones - MH-C-1 - F
This listing husk of a research station hangs in space; bodies litter the numerous breaches in the superstructure, illustrating what must have been a horrific attack.

Betrayed by the play of shadows and light, glimpses of activity can be observed, although no biological life could have possibly survived such devastation.

Hacking 4 -10 1 2   1
Metadrones - MH-C-1 - N
Containment facilities like this exist throughout known space, usually serving as high security prisons. This one, however, appears to have been heavily reinforced.

There are multiple breaches in the hull, but they appear to originate from within the structure rather than without. Which begs the question; what kinds of monstrosities were being held inside?

Hacking 4 20 2 4   1
Metadrones - MH-C-2 - B
Containment facilities like this exist throughout known space, usually serving as high security prisons. This one, however, appears to have been heavily reinforced.

There are multiple breaches in the hull, but they appear to originate from within the structure rather than without. Which begs the question; what kinds of monstrosities were being held inside?

Hacking 4 10 1 2   1
Metadrones - MH-C-2 - F
This listing husk of a research station hangs in space; bodies litter the numerous breaches in the superstructure, illustrating what must have been a horrific attack.

Betrayed by the play of shadows and light, glimpses of activity can be observed, although no biological life could have possibly survived such devastation.

Hacking 4 -10 1 2   1
Metadrones - MH-C-2 - N
Containment facilities like this exist throughout known space, usually serving as high security prisons. This one, however, appears to have been heavily reinforced.

There are multiple breaches in the hull, but they appear to originate from within the structure rather than without. Which begs the question; what kinds of monstrosities were being held inside?

Hacking 4 20 2 4   1
Metadrones - MH-G-1 - B
Containment facilities like this exist throughout known space, usually serving as high security prisons. This one, however, appears to have been heavily reinforced.

There are multiple breaches in the hull, but they appear to originate from within the structure rather than without. Which begs the question; what kinds of monstrosities were being held inside?

Hacking 4 10 1 2   1
Metadrones - MH-G-1 - F
This listing husk of a research station hangs in space; bodies litter the numerous breaches in the superstructure, illustrating what must have been a horrific attack.

Betrayed by the play of shadows and light, glimpses of activity can be observed, although no biological life could have possibly survived such devastation.

Hacking 4 -10 1 2   1
Metadrones - MH-G-1 - N
Containment facilities like this exist throughout known space, usually serving as high security prisons. This one, however, appears to have been heavily reinforced.

There are multiple breaches in the hull, but they appear to originate from within the structure rather than without. Which begs the question; what kinds of monstrosities were being held inside?

Hacking 4 20 2 4   1
Metadrones - MH-G-2 - B
Containment facilities like this exist throughout known space, usually serving as high security prisons. This one, however, appears to have been heavily reinforced.

There are multiple breaches in the hull, but they appear to originate from within the structure rather than without. Which begs the question; what kinds of monstrosities were being held inside?

Hacking 4 10 1 2   1
Metadrones - MH-G-2 - F
This listing husk of a research station hangs in space; bodies litter the numerous breaches in the superstructure, illustrating what must have been a horrific attack.

Betrayed by the play of shadows and light, glimpses of activity can be observed, although no biological life could have possibly survived such devastation.

Hacking 4 -10 1 2   1
Metadrones - MH-G-2 - N
Containment facilities like this exist throughout known space, usually serving as high security prisons. This one, however, appears to have been heavily reinforced.

There are multiple breaches in the hull, but they appear to originate from within the structure rather than without. Which begs the question; what kinds of monstrosities were being held inside?

Hacking 4 20 2 4   1
Metadrones - MH-M-1 - B
Containment facilities like this exist throughout known space, usually serving as high security prisons. This one, however, appears to have been heavily reinforced.

There are multiple breaches in the hull, but they appear to originate from within the structure rather than without. Which begs the question; what kinds of monstrosities were being held inside?

Hacking 4 10 1 2   1
Metadrones - MH-M-1 - F
This listing husk of a research station hangs in space; bodies litter the numerous breaches in the superstructure, illustrating what must have been a horrific attack.

Betrayed by the play of shadows and light, glimpses of activity can be observed, although no biological life could have possibly survived such devastation.

Hacking 4 -10 1 2   1
Metadrones - MH-M-1 - N
Containment facilities like this exist throughout known space, usually serving as high security prisons. This one, however, appears to have been heavily reinforced.

There are multiple breaches in the hull, but they appear to originate from within the structure rather than without. Which begs the question; what kinds of monstrosities were being held inside?

Hacking 4 20 2 4   1
Metadrones - MH-M-2 - B
Containment facilities like this exist throughout known space, usually serving as high security prisons. This one, however, appears to have been heavily reinforced.

There are multiple breaches in the hull, but they appear to originate from within the structure rather than without. Which begs the question; what kinds of monstrosities were being held inside?

Hacking 4 10 1 2   1
Metadrones - MH-M-2 - F
This listing husk of a research station hangs in space; bodies litter the numerous breaches in the superstructure, illustrating what must have been a horrific attack.

Betrayed by the play of shadows and light, glimpses of activity can be observed, although no biological life could have possibly survived such devastation.

Hacking 4 -10 1 2   1
Metadrones - MH-M-2 - N
Containment facilities like this exist throughout known space, usually serving as high security prisons. This one, however, appears to have been heavily reinforced.

There are multiple breaches in the hull, but they appear to originate from within the structure rather than without. Which begs the question; what kinds of monstrosities were being held inside?

Hacking 4 20 2 4   1
Novelty Box
The local pirates are searching for ways to enhance their products. They collect their findings in these boxes. Those skilled in hacking might be able to bypass the security measures and access the contents of the box.
Hacking 1 -10 2 5   1
Obsolete Sleeper Databank
Obsolete Sleeper Databank: This could once have been an airlock. Or an essential component of a ventilation system. Or some kind of stasis pod. Whatever it was, the only thing of value that remains is the databank you can detect concealed within.
Hacking 1 -10   1   1
Outbound Freight
A locked storage bin containing various items used by the local pirates in their drug manufacturing. A bit of hacking might unlock it.
Hacking 1 10 2 5   1
Product Sample Case
The local pirates are actively trying to enhance the potency of their products, as well as improving other aspects of drug manufacturing. This case contains their latest discoveries and avenues of research. It has an advanced password protection, but very skillful hackers should be able to break through.
Hacking 1 -10 2 5   1
Production Cache
A locked storage bin containing various items used by the local pirates in their drug manufacturing. A bit of hacking might unlock it.
Hacking 1 10 2 5   1
Prototype Crate
The local pirates are actively trying to enhance the potency of their products, as well as improving other aspects of drug manufacturing. This crate contains some of their latest efforts and might be accessible with the right equipment.
Hacking 1 -10 2 5   1
Research Lab
The local pirates are actively trying to enhance the potency of their products, as well as improving other aspects of drug manufacturing. With the right equipment it might be possible to hack into the lab's mainframe and get something of interest.
Hacking 1 -10 2 5   1
Restricted Punch Bowl
Guests of honor are allowed to dip into whatever treasures and secrets the hosts have in their possession. It is password protected to keep not-so-VIP guests out, but a bit of hacking should suffice to get to the goods inside.
Hacking 1 -10 2 5   1
Sansha Com Tower
If you have the right equipment you might be able to hack into the com tower and get some valuable information.
Hacking 1     1   1
Sansha Databank
If you have the right equipment you might be able to hack into the databank and get some valuable information.
Hacking 1     1   1
Sansha Debris
This piece of floating debris looks intriguing, but requires analyzing equipment before it yields any of its secrets.
Archaeology 1     1   1
Sansha Info Shard
If you have the right equipment you might be able to hack into the info shard and get some valuable information.
Hacking 1     1   1
Sansha Mainframe
If you have the right equipment you might be able to hack into the mainframe and get some valuable information.
Hacking 1     1   1
Sansha Narcotics Storage Facility
This modified habitat module is being used as storage facility for various items that the pirate factions use for drug manufacturing. Usually heavily guarded this would undoubtedly reap a bounty with a bit of hacking once past the security.
Hacking 1 10 1 4   1
Sansha Remains
This piece of floating remains look intriguing, but requires analyzing equipment before it yields any of its secrets.
Archaeology 1     1   1
Sansha Rubble
This piece of floating rubble looks intriguing, but requires analyzing equipment before it yields any of its secrets.
Archaeology 1     1   1
Sansha Ruins
This piece of floating ruins looks intriguing, but requires analyzing equipment before it yields any of its secrets.
Archaeology 1     1   1
Science Lab
The local pirates are actively trying to enhance the potency of their products, as well as improving other aspects of drug manufacturing. With the right equipment it might be possible to hack into the lab's mainframe and get something of interest.
Hacking 1 -10 2 5   1
Secure Angel Vault
An Angel stasis security Vault . Nearly impossible to destroy but perhaps it is possible to bypass its security
Hacking 1 -10 2 5 20 s 1
Secure Blood Raider Vault
A Blood Raider stasis security vault. Nearly impossible to destroy but perhaps it is possible to bypass its security.
Hacking 1 -10 2 5 20 s 1
Secure Guristas Vault
A Guristas security vault. Nearly impossible to destroy but perhaps it is possible to bypass its security
Hacking 1 -10 2 5 20 s 1
Secure Serpentis Vault
A Serpentis stasis security vault. Nearly impossible to destroy but perhaps it is possible to bypass its security.
Hacking 1 -10 2 5 20 s 1
Secured Guristas Cache

Archaeology 1   1 1   1
Serpentis Chemical Laboratory
This mobile laboratory can be moved and anchored with relative ease, and also tailored towards certain specialties which has led many pirate factions using them in places where creating a fully fledged static facility would be a massive liability.

This particular one is being used a chemical research laboratory and is liable to contain some useful items for the entrepreneur after a small amount of hacking.

Hacking 1 10 1 4   1
Serpentis Com Tower
If you have the right equipment you might be able to hack into the com tower and get some valuable information.
Hacking 1     1   1
Serpentis Databank
If you have the right equipment you might be able to hack into the databank and get some valuable information.
Hacking 1     1   1
Serpentis Debris
This piece of floating debris looks intriguing, but requires analyzing equipment before it yields any of its secrets.
Archaeology 1     1   1
Serpentis Info Shard
If you have the right equipment you might be able to hack into the info shard and get some valuable information.
Hacking 1     1   1
Serpentis Mainframe
If you have the right equipment you might be able to hack into the mainframe and get some valuable information.
Hacking 1     1   1
Serpentis Narcotics Storage Facility
This modified habitat module is being used as storage facility for various items that the pirate factions use for drug manufacturing. Usually heavily guarded this would undoubtedly reap a bounty with a bit of hacking once past the security.
Hacking 1 10 1 4   1
Serpentis Remains
This piece of floating remains look intriguing, but requires analyzing equipment before it yields any of its secrets.
Archaeology 1     1   1
Serpentis Rubble
This piece of floating rubble looks intriguing, but requires analyzing equipment before it yields any of its secrets.
Archaeology 1     1   1
Serpentis Ruins
This piece of floating ruins looks intriguing, but requires analyzing equipment before it yields any of its secrets.
Archaeology 1     1   1
Shipping Crate
A locked storage bin containing various items used by the local pirates in their drug distribution. A bit of hacking might unlock it.
Hacking 1 10 2 5   1
Sleeper Artifact
You think there might be something concealed here that an analyzer could discover.
Archaeology 1 -10 2 5   1
Sleeper Data Log
This look like a ancient data storage device of unknown origin. Detailed analysis might reveal more
Archaeology 1 30 2 5 20 s 1
Sleeper Data Records
This look like a ancient data storage device of unknown origin. Detailed analysis might reveal more
Archaeology 1 -10 2 5 20 s 1
Sleeper Data Registry
This look like a ancient data storage device of unknown origin. Detailed analysis might reveal more
Archaeology 1 10 2 5 20 s 1
Sleeper Data Storage
This look like a ancient data storage device of unknown origin. Detailed analysis might reveal more
Archaeology 1 10 2 5 20 s 1
Sleeper Data Transcript
This look like a ancient data storage device of unknown origin. Detailed analysis might reveal more
Archaeology 1 0 2 5 20 s 1
Sleeper Databank
This hull plate still has an unobstructed access point for the databank it holds. You may be able to extract something with your Data Analyzer.
Hacking 1 -15   1 20 s 1
Sleeper Debris Fragment
This Floating piece of debris looks like it might be of some value to the right person. Detailed analysis might reveal more
Archaeology 1 30 2 5 20 s 1
Sleeper Debris Heap
This Floating piece of debris looks like it might be of some value to the right person. Detailed analysis might reveal more
Archaeology 1 -10 2 5 20 s 1
Sleeper Debris Part
This Floating piece of debris looks like it might be of some value to the right person. Detailed analysis might reveal more
Archaeology 1 10 2 5 20 s 1
Sleeper Debris Piece
This floating piece of debris looks like it might be of some value to the right person. Detailed analysis might reveal more.
Archaeology 1 10 2 5 20 s 1
Sleeper Debris Segment
This Floating piece of debris looks like it might be of some value to the right person. Detailed analysis might reveal more
Archaeology 1 0 2 5 20 s 1
Spavined Sleeper Databank
This hull plate still has an unobstructed access point for the databank it holds. You may be able to extract something with your Data Analyzer.
Hacking 1 -15   1   1
Standard Angel Vault
An Angel stasis security Vault . Nearly impossible to destroy but perhaps it is possible to bypass its security
Hacking 1 10 2 5 20 s 1
Standard Blood Raider Vault
A Blood Raider stasis security vault. Nearly impossible to destroy but perhaps it is possible to bypass its security.
Hacking 1 10 2 5 20 s 1
Standard Guristas Vault
A Guristas security vault. Nearly impossible to destroy but perhaps it is possible to bypass its security
Hacking 1 10 2 5 20 s 1
Standard Serpentis Vault
A Serpentis stasis security vault. Nearly impossible to destroy but perhaps it is possible to bypass its security.
Hacking 1 10 2 5 20 s 1
Supply Cache

           
Takmahl Data Log
This look like a ancient data storage device of unknown origin. Detailed analysis might reveal more
Archaeology 1 30 2 5 20 s 1
Takmahl Data Records
This look like a ancient data storage device of unknown origin. Detailed analysis might reveal more
Archaeology 1 -10 2 5 20 s 1
Takmahl Data Registry
This look like a ancient data storage device of unknown origin. Detailed analysis might reveal more
Archaeology 1 10 2 5 20 s 1
Takmahl Data Transcript
This look like a ancient data storage device of unknown origin. Detailed analysis might reveal more
Archaeology 1 0 2 5 20 s 1
Takmahl Debris Fragment
This floating piece of debris looks like it might be of some value to the right person. Detailed analysis might reveal more.
Archaeology 1 30 2 5 20 s 1
Takmahl Debris Heap
This floating piece of debris looks like it might be of some value to the right person. Detailed analysis might reveal more.
Archaeology 1 -10 2 5 20 s 1
Takmahl Debris Part
This floating piece of debris looks like it might be of some value to the right person. Detailed analysis might reveal more.
Archaeology 1 10 2 5 20 s 1
Takmahl Debris Segment
This floating piece of debris looks like it might be of some value to the right person. Detailed analysis might reveal more.
Archaeology 1 0 2 5 20 s 1
Talocan Data Log
This look like a ancient data storage device of unknown origin. Detailed analysis might reveal more
Archaeology 1 30 2 5 20 s 1
Talocan Data Records
This look like a ancient data storage device of unknown origin. Detailed analysis might reveal more
Archaeology 1 -10 2 5 20 s 1
Talocan Data Registry
This look like a ancient data storage device of unknown origin. Detailed analysis might reveal more
Archaeology 1 10 2 5 20 s 1
Talocan Data Storage
This look like a ancient data storage device of unknown origin. Detailed analysis might reveal more
Archaeology 1 10 2 5 20 s 1
Talocan Data Transcript
This look like a ancient data storage device of unknown origin. Detailed analysis might reveal more
Archaeology 1 0 2 5 20 s 1
Talocan Debris Fragment
This Floating piece of debris looks like it might be of some value to the right person
Archaeology 1 30 2 5 20 s 1
Talocan Debris Heap
This Floating piece of debris looks like it might be of some value to the right person
Archaeology 1 -10 2 5 20 s 1
Talocan Debris Part
This Floating piece of debris looks like it might be of some value to the right person
Archaeology 1 10 2 5 20 s 1
Talocan Debris Piece
This Floating piece of debris looks like it might be of some value to the right person
Archaeology 1 10 2 5 20 s 1
Talocan Debris Segment
This Floating piece of debris looks like it might be of some value to the right person
Archaeology 1 0 2 5 20 s 1
Test Crate
A locked storage bin containing various items used by the local pirates in their drug manufacturing. A bit of hacking might unlock it.
Hacking 1 10 2 5   1
Think Tank
The local pirates are actively trying to enhance the potency of their products, as well as improving other aspects of drug manufacturing. With the right equipment it might be possible to hack into the tank's mainframe and get something of interest.
Hacking 1 -10 2 5   1
Training Container - Data
This container must be accessed using a Civilian Data Analyzer. As soon as a successful hacking attempt is detected, it will unlock. Inside, the “Proof of Discovery: Data” document can be retrieved.

If at first the container appears empty, please wait a few minutes for a new document to be provided.

  75 1 1 0 s 1
Training Container - Relic
This container must be accessed using a Civilian Relic Analyzer. As soon as a successful attempt is detected, it will unlock. Inside, the “Proof of Discovery: Relic” document can be retrieved.

If at first the container appears empty, please wait a few minutes for a new document to be provided.

  75 1 1 0 s 1
Training Cube
The training cube is used by the local pirates to learn how to become good pirates. It is password protected, but probably not all that well.
Hacking 1 0 2 5   1
Trial of Skill
This is an old data crystal. Only those proficient in decyphering ancient information centrals stand a chance of unraveling its mysteries.
Archaeology 1 10 2 5 20 s 1
Tutorial Archaeology
The wrecked container drifts silently amongst the stars, giving no hint to what treasures it may hide.
      1 0 s 1
Tutorial Hacking
The wrecked container drifts silently amongst the stars, giving no hint to what treasures it may hide.
      1 0 s 1
Victim's Stash
Leftovers from some unfortunate pirate overconfidant in his abilities. A bit of hacking might unlock it.
Hacking 1 10 2 5   1
Yan Jung Data Log
This look like a ancient data storage device of unknown origin. Detailed analysis might reveal more
Archaeology 1 30 2 5 20 s 1
Yan Jung Data Records
This look like a ancient data storage device of unknown origin. Detailed analysis might reveal more
Archaeology 1 -10 2 5 20 s 1
Yan Jung Data Registry
This look like a ancient data storage device of unknown origin. Detailed analysis might reveal more
Archaeology 1 10 2 5 20 s 1
Yan Jung Data Transcript
This look like a ancient data storage device of unknown origin. Detailed analysis might reveal more
Archaeology 1 0 2 5 20 s 1
Yan Jung Debris Fragment
This floating piece of debris looks like it might be of some value to the right person. Detailed analysis might reveal more.
Archaeology 1 30 2 5 20 s 1
Yan Jung Debris Heap
This floating piece of debris looks like it might be of some value to the right person. Detailed analysis might reveal more.
Archaeology 1 -10 2 5 20 s 1
Yan Jung Debris Part
This floating piece of debris looks like it might be of some value to the right person. Detailed analysis might reveal more.
Archaeology 1 10 2 5 20 s 1
Yan Jung Debris Segment
This floating piece of debris looks like it might be of some value to the right person. Detailed analysis might reveal more.
Archaeology 1 0 2 5 20 s 1

Show Groups | First | Previous | 316 of 340 | Next | Last
Show Categories | First | Previous | 16 of 42 | Next | Last


Database: Invasion 2 (2019-11-26)

User: Register | Login