Български - Възел  简体中文 - 节点  正體中文 - 節點  Čeština - Uzly  English - Nodes  Français - Noeuds  Deutsch - Nodes(Deutsche)  Bahasa Indonesia - Node(Bahasa Indonesia)  Italiano - Nodi  日本語 - ノード  Bahasa Malayu - Nod  Polski - Węzły  Português - Nodos  Română - Noduri  Русский - Узлы  Español - Nodos(Español)  Türk - Bağlantı  Tiếng Việt - Các Nút mạng


Summary[edit | edit source]

Nodes are the building blocks of every network. Linking them into a specific structure allows each node's unique function to support and improve the network as a whole. There are four types of nodes, each of which are necessary for the success of a network.

Types[edit | edit source]

Business[edit | edit source]

B-coin Mine 19-21.png B-coin Mixer 19-21.png Core 13.png Database 19-21.png Server Farm 19-21.png
B-coin Mine B-coin Mixer Core Database Server Farm

Business nodes support the rest of the system by providing and storing resources, and allowing expansion and connections to other networks.

Security[edit | edit source]

Black ICE 19-21.png Code Gate 19-21.png Guardian 21.png Sentry 19-21.png Scanner 19-21.png Turret 19-21.png
Black ICE Code Gate Guardian Sentry Scanner Turret

Security nodes prevent intruders from stealing resources and lowering reputation.

  • Sentries are the fundamental security, spreading antivirus throughout the network as soon as an intruder is detected.
  • Turrets provide extra power to defend directly connected nodes.
  • Black ICEs have even higher strength, but take time to charge and fire.
  • Code Gates are password protected gates which significantly reduce damage and the installation time of Access programs while the filter is active.
  • Scanners increase the visibility of stealth programs on nodes within 3 links.
  • Guardians provide shields to connected nodes for added defense.

Hacking[edit | edit source]

Compiler 04.png Evolver 11-12.png Program Library 17-21.png
Compiler Evolver Program Library

Hacking nodes provide all the tools necessary to infiltrate other networks and acquire resources and reputation.

Artificial Intelligence[edit | edit source]

Beetle ImageServing.png Hawk ImageServing.png Squid ImageServing.png
AI Beetle AI Hawk AI Squid
  • The AI Beetle protects against intrusions by repairing the firewall of nearby damaged nodes.
  • The AI Hawk attacks nearby nodes that have been breached by an attacker.
  • The AI Squid performs focussed scans for stealth programs on nearby nodes.

Statistics[edit | edit source]

Each node has a specific number of connection slots available, which allow it to be linked to other nodes. Each link takes up one slot on each of the linked nodes.

Each node has a specific number of program slots, which allow programs to be installed on it during a hack. Each program takes up one slot on a node.

Each node has a certain amount of firewall depending on the node level, which must be depleted by offensive programs installed on connecting nodes before it can be captured during a hack. Each node also has a certain amount of firewall regeneration, listed as percent per second.

Business Nodes
Node Connection
Slots
Program
Slots
Firewall
Regeneration
B-coin Mine 3 3 2% per second
B-coin Mixer 4 3 2% per second
netConnection 1 3 -
Core 5 5 1% per second
Database 4 3 2% per second
Server Farm 3 3 2% per second
Security Nodes
Node Connection
Slots
Program
Slots
Firewall
Regeneration
Black ICE 4 5 1% per second
Code Gate 3 3 2% per second
Guardian 5 4 1% per second
Scanner 4 3 1% per second
Sentry 4 4 1% per second
Turret 4 4 1% per second
Hacking Nodes
Node Connection
Slots
Program
Slots
Firewall
Regeneration
Compiler 3 3 2% per second
Evolver 3 3 3% per second
Program Library 3 3 2% per second
A.I. Nodes
Node Connection
Slots
Program
Slots
Firewall
Regeneration
AI Beetle 4 4 1% per second
AI Hawk 3 4 1% per second
AI Squid 5 4 1% per second


Notes[edit | edit source]

  • netConnections do not have any firewall and cannot be reclaimed by the network during a hack
Hackers Wikia - Nodes List
Nodes Programs Gameplay
Business Nodes

B-coin Mine 19-21.pngB-coin Mine  B-coin Mixer 19-21.pngB-coin Mixer  Structure Connection.pngnetConnection  Core 11-12.pngCore  Database 19-21.pngDatabase  Server Farm 19-21.pngServer Farm 

Security Nodes

Black ICE 19-21.pngBlack ICE  Code Gate 19-21.pngCode Gate  Guardian 21.pngGuardian  Scanner 19-21.pngScanner  Sentry 19-21.pngSentry  Turret 19-21.pngTurret 

Hacking Nodes

Compiler 04.pngCompiler  Evolver 11-12.pngEvolver  Program Library 17-21.pngProgram Library 

A.I. Nodes

Beetle ImageServing.png A.I. Beetle  Hawk ImageServing.png A.I. Hawk  Squid ImageServing.png A.I. Squid 

Community content is available under CC-BY-SA unless otherwise noted.