Name | Bounty($) | orb. | vel. | ||||||||||||||||||
Abandoned Sleeper Artifact This might once have been an important piece of an engine, but now you're not getting anything o… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Abandoned Talocan Battleship It looks like this ship was gutted, then left to drift.… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Ammatar Relics This massive hulk of debris seems to have once been a part of the outer hull of a battleship or … |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Ancient Ruins Eons seperate you and this foreboding ruins. One can only wonder over who built it long ago and,… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Ancient Ship Structure This piece of floating rubble looks intriguing, but requires analyzing equipment before it yield… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Angel Chemical Laboratory This mobile laboratory can be moved and anchored with relative ease, and also tailored towards c… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Angel Com Tower If you have the right equipment you might be able to hack into the com tower and get some valuab… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Angel Databank If you have the right equipment you might be able to hack into the databank and get some valuabl… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Angel Debris This piece of floating debris looks intriguing, but requires analyzing equipment before it yield… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Angel Info Shard If you have the right equipment you might be able to hack into the info shard and get some valua… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Angel Mainframe If you have the right equipment you might be able to hack into the mainframe and get some valuab… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Angel Narcotics Storage Facility This modified habitat module is being used as storage facility for various items that the pirate… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Angel Remains This piece of floating remains look intriguing, but requires analyzing equipment before it yield… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Angel Rubble This piece of floating rubble looks intriguing, but requires analyzing equipment before it yield… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Angel Ruins This piece of floating ruins looks intriguing, but requires analyzing equipment before it yields… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Backup Array The local pirates are actively trying to enhance the potency of their products, as well as impro… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Basic Angel Vault An Angel stasis security Vault . Nearly impossible to destroy but perhaps it is possible to byp… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Basic Blood Raider Vault A Blood Raider stasis security vault. Nearly impossible to destroy but perhaps it is possible to… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Basic Guristas Vault A Guristas security vault. Nearly impossible to destroy but perhaps it is possible to bypass its… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Basic Serpentis Vault A Serpentis stasis security vault. Nearly impossible to destroy but perhaps it is possible to by… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Blood Com Tower If you have the right equipment you might be able to hack into the com tower and get some valuab… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Blood Databank If you have the right equipment you might be able to hack into the databank and get some valuabl… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Blood Debris This piece of floating debris looks intriguing, but requires analyzing equipment before it yield… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Blood Info Shard If you have the right equipment you might be able to hack into the info shard and get some valua… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Blood Mainframe If you have the right equipment you might be able to hack into the mainframe and get some valuab… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Blood Raider Chemical Laboratory This mobile laboratory can be moved and anchored with relative ease, and also tailored towards c… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Blood Remains This piece of floating remains look intriguing, but requires analyzing equipment before it yield… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Blood Rubble This piece of floating rubble looks intriguing, but requires analyzing equipment before it yield… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Blood Ruins This piece of floating ruins looks intriguing, but requires analyzing equipment before it yields… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Broken Sleeper Databank This object was severed from some larger structure in the distant past, perhaps as the result of… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Com Relay The com relay is used in environments with high interference. It is used by the local pirates to… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Component Bin A locked storage bin containing various items used by the local pirates in their drug manufactur… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Data Storage Device If you have the right equipment you might be able to hack into this container and get some valua… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Decrepit Sleeper Artifact This mangled sheet of hull plating contains something of interest to your analyzer.… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Deformed Sleeper Databank Deformed Sleeper Databank: This section of hull plating once shielded an auxiliary databank on i… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Demo Kit A locked storage bin containing various items used by the local pirates in their drug manufactur… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Derelict Talocan Frigate It looks like this ship was gutted, then left to drift.… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Deserted Talocan Cruiser It looks like this ship was gutted, then left to drift.… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Ejected Sleeper Databank Ejected Sleeper Databank: This modular structure was long ago subjected to some sort of emergenc… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Floating Debris At first glance this looks like just another piece of space debris, but on closer inspection it … |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Forgotten Sleeper Artifact Your analyzer is picking up something of interest in this piece of twisted wreckage, though you … |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Forlorn Sleeper Artifact Analysis could yield something valuable.… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Fortified Angel Vault An Angel stasis security Vault . Nearly impossible to destroy but perhaps it is possible to byp… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Fortified Blood Raider Vault A Blood Raider stasis security vault. Nearly impossible to destroy but perhaps it is possible to… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Fortified Guristas Vault A Guristas security vault. Nearly impossible to destroy but perhaps it is possible to bypass its… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Fortified Serpentis Vault A Serpentis stasis security vault. Nearly impossible to destroy but perhaps it is possible to by… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Gadget Casket A locked storage bin containing various items used by the local pirates in their drug manufactur… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Guristas Chemical Laboratory This mobile laboratory can be moved and anchored with relative ease, and also tailored towards c… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Guristas Com Tower If you have the right equipment you might be able to hack into the com tower and get some valuab… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Guristas Databank If you have the right equipment you might be able to hack into the databank and get some valuabl… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Guristas Debris This piece of floating debris looks intriguing, but requires analyzing equipment before it yield… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Guristas Info Shard If you have the right equipment you might be able to hack into the info shard and get some valua… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Guristas Mainframe If you have the right equipment you might be able to hack into the mainframe and get some valuab… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Guristas Narcotics Storage Facility This modified habitat module is being used as storage facility for various items that the pirate… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Guristas Remains This piece of floating remains look intriguing, but requires analyzing equipment before it yield… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Guristas Rubble This piece of floating rubble looks intriguing, but requires analyzing equipment before it yield… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Guristas Ruins This piece of floating ruins looks intriguing, but requires analyzing equipment before it yields… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Info Matrix The info matrix is used by the local pirates to learn how to become good pirates. It is password… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Lost Sleeper Artifact You suspect this battered hunk of metal may conceal some kind of relic.… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Malfunctioning Sleeper Databank This databank has clearly been the site of a serious impact, but it remains online. You may be a… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - LM-A-1 - B Containment facilities like this exist throughout known space, usually serving as high security … |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - LM-A-1 - F This listing husk of a research station hangs in space; bodies litter the numerous breaches in t… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - LM-A-1 - N Containment facilities like this exist throughout known space, usually serving as high security … |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - LM-A-2 - B Containment facilities like this exist throughout known space, usually serving as high security … |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - LM-A-2 - F This listing husk of a research station hangs in space; bodies litter the numerous breaches in t… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - LM-A-2 - N Containment facilities like this exist throughout known space, usually serving as high security … |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - LM-C-1 - B Containment facilities like this exist throughout known space, usually serving as high security … |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - LM-C-1 - F This listing husk of a research station hangs in space; bodies litter the numerous breaches in t… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - LM-C-1 - N Containment facilities like this exist throughout known space, usually serving as high security … |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - LM-C-2 - B Containment facilities like this exist throughout known space, usually serving as high security … |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - LM-C-2 - F This listing husk of a research station hangs in space; bodies litter the numerous breaches in t… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - LM-C-2 - N Containment facilities like this exist throughout known space, usually serving as high security … |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - LM-G-1 - B Containment facilities like this exist throughout known space, usually serving as high security … |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - LM-G-1 - F This listing husk of a research station hangs in space; bodies litter the numerous breaches in t… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - LM-G-1 - N Containment facilities like this exist throughout known space, usually serving as high security … |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - LM-G-2 - N Containment facilities like this exist throughout known space, usually serving as high security … |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - LM-M-1 - B Containment facilities like this exist throughout known space, usually serving as high security … |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - LM-M-1 - F This listing husk of a research station hangs in space; bodies litter the numerous breaches in t… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - LM-M-1 - N Containment facilities like this exist throughout known space, usually serving as high security … |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - LM-M-2 - N Containment facilities like this exist throughout known space, usually serving as high security … |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - LMH-A-1 - B Containment facilities like this exist throughout known space, usually serving as high security … |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - LMH-A-1 - F This listing husk of a research station hangs in space; bodies litter the numerous breaches in t… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - LMH-A-1 - N Containment facilities like this exist throughout known space, usually serving as high security … |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - LMH-A-2 - B Containment facilities like this exist throughout known space, usually serving as high security … |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - LMH-A-2 - F This listing husk of a research station hangs in space; bodies litter the numerous breaches in t… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - LMH-A-2 - N Containment facilities like this exist throughout known space, usually serving as high security … |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - LMH-C-1 - B Containment facilities like this exist throughout known space, usually serving as high security … |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - LMH-C-1 - F This listing husk of a research station hangs in space; bodies litter the numerous breaches in t… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - LMH-C-1 - N Containment facilities like this exist throughout known space, usually serving as high security … |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - LMH-C-2 - B Containment facilities like this exist throughout known space, usually serving as high security … |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - LMH-C-2 - F This listing husk of a research station hangs in space; bodies litter the numerous breaches in t… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - LMH-C-2 - N Containment facilities like this exist throughout known space, usually serving as high security … |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - LMH-G-1 - B Containment facilities like this exist throughout known space, usually serving as high security … |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - LMH-G-1 - F This listing husk of a research station hangs in space; bodies litter the numerous breaches in t… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - LMH-G-1 - N Containment facilities like this exist throughout known space, usually serving as high security … |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - LMH-G-2 - B Containment facilities like this exist throughout known space, usually serving as high security … |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - LMH-G-2 - F This listing husk of a research station hangs in space; bodies litter the numerous breaches in t… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - LMH-G-2 - N Containment facilities like this exist throughout known space, usually serving as high security … |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - LMH-M-1 - B Containment facilities like this exist throughout known space, usually serving as high security … |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - LMH-M-1 - F This listing husk of a research station hangs in space; bodies litter the numerous breaches in t… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - LMH-M-1 - N Containment facilities like this exist throughout known space, usually serving as high security … |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - LMH-M-2 - B Containment facilities like this exist throughout known space, usually serving as high security … |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - LMH-M-2 - F This listing husk of a research station hangs in space; bodies litter the numerous breaches in t… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - LMH-M-2 - N Containment facilities like this exist throughout known space, usually serving as high security … |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - MH-A-1 - B Containment facilities like this exist throughout known space, usually serving as high security … |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - MH-A-1 - F This listing husk of a research station hangs in space; bodies litter the numerous breaches in t… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - MH-A-1 - N Containment facilities like this exist throughout known space, usually serving as high security … |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - MH-A-2 - B Containment facilities like this exist throughout known space, usually serving as high security … |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - MH-A-2 - F This listing husk of a research station hangs in space; bodies litter the numerous breaches in t… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - MH-A-2 - N Containment facilities like this exist throughout known space, usually serving as high security … |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - MH-C-1 - B Containment facilities like this exist throughout known space, usually serving as high security … |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - MH-C-1 - F This listing husk of a research station hangs in space; bodies litter the numerous breaches in t… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - MH-C-1 - N Containment facilities like this exist throughout known space, usually serving as high security … |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - MH-C-2 - B Containment facilities like this exist throughout known space, usually serving as high security … |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - MH-C-2 - F This listing husk of a research station hangs in space; bodies litter the numerous breaches in t… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - MH-C-2 - N Containment facilities like this exist throughout known space, usually serving as high security … |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - MH-G-1 - B Containment facilities like this exist throughout known space, usually serving as high security … |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - MH-G-1 - F This listing husk of a research station hangs in space; bodies litter the numerous breaches in t… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - MH-G-1 - N Containment facilities like this exist throughout known space, usually serving as high security … |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - MH-G-2 - B Containment facilities like this exist throughout known space, usually serving as high security … |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - MH-G-2 - F This listing husk of a research station hangs in space; bodies litter the numerous breaches in t… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - MH-G-2 - N Containment facilities like this exist throughout known space, usually serving as high security … |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - MH-M-1 - B Containment facilities like this exist throughout known space, usually serving as high security … |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - MH-M-1 - F This listing husk of a research station hangs in space; bodies litter the numerous breaches in t… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - MH-M-1 - N Containment facilities like this exist throughout known space, usually serving as high security … |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - MH-M-2 - B Containment facilities like this exist throughout known space, usually serving as high security … |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - MH-M-2 - F This listing husk of a research station hangs in space; bodies litter the numerous breaches in t… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Metadrones - MH-M-2 - N Containment facilities like this exist throughout known space, usually serving as high security … |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Novelty Box The local pirates are searching for ways to enhance their products. They collect their findings … |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Obsolete Sleeper Databank Obsolete Sleeper Databank: This could once have been an airlock. Or an essential component of a … |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Outbound Freight A locked storage bin containing various items used by the local pirates in their drug manufactur… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Product Sample Case The local pirates are actively trying to enhance the potency of their products, as well as impro… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Production Cache A locked storage bin containing various items used by the local pirates in their drug manufactur… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Prototype Crate The local pirates are actively trying to enhance the potency of their products, as well as impro… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Research Lab The local pirates are actively trying to enhance the potency of their products, as well as impro… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Restricted Punch Bowl Guests of honor are allowed to dip into whatever treasures and secrets the hosts have in their p… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Sansha Com Tower If you have the right equipment you might be able to hack into the com tower and get some valuab… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Sansha Databank If you have the right equipment you might be able to hack into the databank and get some valuabl… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Sansha Debris This piece of floating debris looks intriguing, but requires analyzing equipment before it yield… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Sansha Info Shard If you have the right equipment you might be able to hack into the info shard and get some valua… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Sansha Mainframe If you have the right equipment you might be able to hack into the mainframe and get some valuab… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Sansha Narcotics Storage Facility This modified habitat module is being used as storage facility for various items that the pirate… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Sansha Remains This piece of floating remains look intriguing, but requires analyzing equipment before it yield… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Sansha Rubble This piece of floating rubble looks intriguing, but requires analyzing equipment before it yield… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Sansha Ruins This piece of floating ruins looks intriguing, but requires analyzing equipment before it yields… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Science Lab The local pirates are actively trying to enhance the potency of their products, as well as impro… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Secure Angel Vault An Angel stasis security Vault . Nearly impossible to destroy but perhaps it is possible to bypa… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Secure Blood Raider Vault A Blood Raider stasis security vault. Nearly impossible to destroy but perhaps it is possible to… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Secure Guristas Vault A Guristas security vault. Nearly impossible to destroy but perhaps it is possible to bypass its… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Secure Serpentis Vault A Serpentis stasis security vault. Nearly impossible to destroy but perhaps it is possible to by… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Serpentis Chemical Laboratory This mobile laboratory can be moved and anchored with relative ease, and also tailored towards c… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Serpentis Com Tower If you have the right equipment you might be able to hack into the com tower and get some valuab… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Serpentis Databank If you have the right equipment you might be able to hack into the databank and get some valuabl… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Serpentis Debris This piece of floating debris looks intriguing, but requires analyzing equipment before it yield… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Serpentis Info Shard If you have the right equipment you might be able to hack into the info shard and get some valua… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Serpentis Mainframe If you have the right equipment you might be able to hack into the mainframe and get some valuab… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Serpentis Narcotics Storage Facility This modified habitat module is being used as storage facility for various items that the pirate… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Serpentis Remains This piece of floating remains look intriguing, but requires analyzing equipment before it yield… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Serpentis Rubble This piece of floating rubble looks intriguing, but requires analyzing equipment before it yield… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Serpentis Ruins This piece of floating ruins looks intriguing, but requires analyzing equipment before it yields… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Shipping Crate A locked storage bin containing various items used by the local pirates in their drug distributi… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Sleeper Artifact You think there might be something concealed here that an analyzer could discover.… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Sleeper Data Log This look like a ancient data storage device of unknown origin. Detailed analysis might reveal m… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Sleeper Data Records This look like a ancient data storage device of unknown origin. Detailed analysis might reveal m… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Sleeper Data Registry This look like a ancient data storage device of unknown origin. Detailed analysis might reveal m… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Sleeper Data Storage This look like a ancient data storage device of unknown origin. Detailed analysis might reveal m… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Sleeper Data Transcript This look like a ancient data storage device of unknown origin. Detailed analysis might reveal m… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Sleeper Databank This hull plate still has an unobstructed access point for the databank it holds. You may be abl… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Sleeper Debris Fragment This Floating piece of debris looks like it might be of some value to the right person. Detailed… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Sleeper Debris Heap This Floating piece of debris looks like it might be of some value to the right person. Detailed… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Sleeper Debris Part This Floating piece of debris looks like it might be of some value to the right person. Detailed… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Sleeper Debris Piece This floating piece of debris looks like it might be of some value to the right person. Detailed… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Sleeper Debris Segment This Floating piece of debris looks like it might be of some value to the right person. Detailed… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Spavined Sleeper Databank This hull plate still has an unobstructed access point for the databank it holds. You may be abl… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Standard Angel Vault An Angel stasis security Vault . Nearly impossible to destroy but perhaps it is possible to byp… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Standard Blood Raider Vault A Blood Raider stasis security vault. Nearly impossible to destroy but perhaps it is possible to… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Standard Guristas Vault A Guristas security vault. Nearly impossible to destroy but perhaps it is possible to bypass its… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Standard Serpentis Vault A Serpentis stasis security vault. Nearly impossible to destroy but perhaps it is possible to by… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Takmahl Data Log This look like a ancient data storage device of unknown origin. Detailed analysis might reveal m… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Takmahl Data Records This look like a ancient data storage device of unknown origin. Detailed analysis might reveal m… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Takmahl Data Registry This look like a ancient data storage device of unknown origin. Detailed analysis might reveal m… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Takmahl Data Transcript This look like a ancient data storage device of unknown origin. Detailed analysis might reveal m… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Takmahl Debris Fragment This floating piece of debris looks like it might be of some value to the right person. Detailed… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Takmahl Debris Heap This floating piece of debris looks like it might be of some value to the right person. Detailed… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Takmahl Debris Part This floating piece of debris looks like it might be of some value to the right person. Detailed… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Takmahl Debris Segment This floating piece of debris looks like it might be of some value to the right person. Detailed… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Talocan Data Log This look like a ancient data storage device of unknown origin. Detailed analysis might reveal m… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Talocan Data Records This look like a ancient data storage device of unknown origin. Detailed analysis might reveal m… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Talocan Data Registry This look like a ancient data storage device of unknown origin. Detailed analysis might reveal m… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Talocan Data Storage This look like a ancient data storage device of unknown origin. Detailed analysis might reveal m… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Talocan Data Transcript This look like a ancient data storage device of unknown origin. Detailed analysis might reveal m… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Talocan Debris Fragment This Floating piece of debris looks like it might be of some value to the right person … |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Talocan Debris Heap This Floating piece of debris looks like it might be of some value to the right person … |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Talocan Debris Part This Floating piece of debris looks like it might be of some value to the right person … |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Talocan Debris Piece This Floating piece of debris looks like it might be of some value to the right person … |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Talocan Debris Segment This Floating piece of debris looks like it might be of some value to the right person … |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Test Crate A locked storage bin containing various items used by the local pirates in their drug manufactur… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Think Tank The local pirates are actively trying to enhance the potency of their products, as well as impro… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Training Container - Data This container must be accessed using a Civilian Data Analyzer. As soon as a successful hacking … |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Training Container - Relic This container must be accessed using a Civilian Relic Analyzer. As soon as a successful attempt… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Training Cube The training cube is used by the local pirates to learn how to become good pirates. It is passwo… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Trial of Skill This is an old data crystal. Only those proficient in decyphering ancient information centrals s… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Tutorial Archaeology The wrecked container drifts silently amongst the stars, giving no hint to what treasures it may… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Tutorial Hacking The wrecked container drifts silently amongst the stars, giving no hint to what treasures it may… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Victim's Stash Leftovers from some unfortunate pirate overconfidant in his abilities. A bit of hacking might un… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Yan Jung Data Log This look like a ancient data storage device of unknown origin. Detailed analysis might reveal m… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Yan Jung Data Records This look like a ancient data storage device of unknown origin. Detailed analysis might reveal m… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Yan Jung Data Registry This look like a ancient data storage device of unknown origin. Detailed analysis might reveal m… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Yan Jung Data Transcript This look like a ancient data storage device of unknown origin. Detailed analysis might reveal m… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Yan Jung Debris Fragment This floating piece of debris looks like it might be of some value to the right person. Detailed… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Yan Jung Debris Heap This floating piece of debris looks like it might be of some value to the right person. Detailed… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Yan Jung Debris Part This floating piece of debris looks like it might be of some value to the right person. Detailed… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Yan Jung Debris Segment This floating piece of debris looks like it might be of some value to the right person. Detailed… |
0 | 0 | 0 | 0 | 0 | — | 0 | 0 | 0 | 0 | 0 | — | — | — | — | — | — | — | |||
— | — | 0 | 0 | 0 | 0 | ||||||||||||||||
Name | Bounty($) | orb. | vel. |