Menu

Market


Analyzers

Parent groups: Market > Ship Equipment > Scanning Equipment
Sister groups: Analyzers | Cargo Scanners | Entosis Links | Scan Probe Launchers | Scanning Upgrades | Ship Scanners | Survey Probe Launchers | Survey Scanners

Market Items

Image Name Slot CPU Powergrid Market Price
Data Analyzer I
A Hacking system used to override electronic security systems, potentially providing access to valuable data or items.

Note: Due to recently discovered branch prediction vulnerabilities in certain Upwell Consortium Recursive Computing Modules this analyzer may also be used to collect sensitive information concerning reinforcement periods of Upwell Structures.

Medium 20 tf 1 MW 37.621
Data Analyzer II
A Hacking system used to override electronic security systems, potentially providing access to valuable data or items.

Note: Due to recently discovered branch prediction vulnerabilities in certain Upwell Consortium Recursive Computing Modules this analyzer may also be used to collect sensitive information concerning reinforcement periods of Upwell Structures.

Medium 25 tf 1 MW 1.428.190
Frostline 'Clavicula' Integrated Analyzer
As this multi-use analyzer has both fully integrated archaeology and hacking systems, it can be used to both analyze ancient ruins and bypass electronic security systems.

Whilst comparatively weaker than its more specialized counterparts, its combined functionality provides the user with an increased flexibility when it comes to fitting.

Note: Due to recently discovered branch prediction vulnerabilities in certain Upwell Consortium Recursive Computing Modules this analyzer may also be used to collect sensitive information concerning reinforcement periods of Upwell Structures.

Medium 25 tf 1 MW 106.564.078
Ligature Integrated Analyzer
As this multi-use analyzer has both fully integrated archaeology and hacking systems, it can be used to both analyze ancient ruins and bypass electronic security systems.

Whilst comparatively weaker than its more specialized counterparts, its combined functionality provides the user with an increased flexibility when it comes to fitting.

Note: Due to recently discovered branch prediction vulnerabilities in certain Upwell Consortium Recursive Computing Modules this analyzer may also be used to collect sensitive information concerning reinforcement periods of Upwell Structures.

Medium 25 tf 1 MW 94.433.645
Purloined Sansha Data Analyzer
CONCORD has acquired untold numbers of these devices from destroyed Sansha vessels during recent raids. The modules have the appearance of standard data analyzers, but when connected to the systems of a suitably modified ship, they exhibit significantly enhanced capabilities.

Official DED reports on the devices' internal workings cite "inconclusive results", but CONCORD has nevertheless opted to distribute these modules to capsuleers in the hope that they might be useful in the fight against Kuvakei's minions.

Note: Due to recently discovered branch prediction vulnerabilities in certain Upwell Consortium Recursive Computing Modules this analyzer may also be used to collect sensitive information concerning reinforcement periods of Upwell Structures.

Medium     7.579.724
Relic Analyzer I
An archaeology system used to analyze and search ancient ruins, potentially revealing valuable items for collection.

Note: Due to recently discovered branch prediction vulnerabilities in certain Upwell Consortium Recursive Computing Modules this analyzer may also be used to collect sensitive information concerning reinforcement periods of Upwell Structures.

Medium 20 tf 1 MW 34.905
Relic Analyzer II
An archaeology system used to analyze and search ancient ruins, potentially revealing valuable items for collection.

Note: Due to recently discovered branch prediction vulnerabilities in certain Upwell Consortium Recursive Computing Modules this analyzer may also be used to collect sensitive information concerning reinforcement periods of Upwell Structures.

Medium 25 tf 1 MW 1.466.617
Zeugma Integrated Analyzer
As this multi-use analyzer has both fully integrated archaeology and hacking systems, it can be used to both analyze ancient ruins and bypass electronic security systems.

Whilst comparatively weaker than its more specialized counterparts, its combined functionality provides the user with an increased flexibility when it comes to fitting.

Note: Due to recently discovered branch prediction vulnerabilities in certain Upwell Consortium Recursive Computing Modules this analyzer may also be used to collect sensitive information concerning reinforcement periods of Upwell Structures.

Medium 30 tf 1 MW 199.934.673


Database: Invasion 2 (2019-11-26)

User: Register | Login