Hackers Wikia
Advertisement


  Български - Скенер  简体中文 - 扫描仪  正體中文 - 掃描器  Čeština - Skener  English - Scanner  Français - Détecteur  Deutsch - Scanner(Deutsch)  Bahasa Indonesia - Pemindai  Italiano - Scanner(Italiano)  日本語 - スキャナ  Bahasa Malayu - Pengimbas  Polski - Skaner  Português - Observador  Română - Scanner(Română)  Русский - Сканер  Español - Escáner  Türk - Tarayıcı  Tiếng Việt - Máy Quét



Summary[]


"Increases stealth program detection on all nodes three steps away and closer.
Access, Wraith and Portal programs alarm the network faster."

The Scanner is a defensive Security Node. During the Stealth phase of a hack, the Scanner will increase the stealth cost of any stealth programs to nodes installed within 3 connections of the Scanner. The increase is based on the sensitivity statistic. If a network connection has two Scanners overlapping, the system prioritizes the Scanner with the higher level.

The maximum level a Scanner can be upgraded to is 21[1]. The maximum number of Scanners you can have on your network is four. Unlike Business Nodes, there are no restrictions on deleting Scanner nodes from the network.

Statistics[]

Defensive Stats
Node
Level
Node
Firewall
Scanner
Sensitivity
1 180 120%
2 200 130%
3 225 140%
4 250 150%
5 285 160%
6 320 180%
7 360 200%
8 400 220%
9 450 240%
10 500 260%
11 560 280%
12 630 300%
13 700 320%
14 790 340%
15 880 360%
16 990 380%
17 1,100 400%
18 1,240 430%
19 1,380 460%
20 1,550 490%
21 1,740 520%
Construction Stats
Node
Level
Upgrade
Cost
Experience
Gained
Completion
Time
Required
Core Level
1 $16,000 300 4 Hours 4
2 $32,000 450 12 Hours 4
3 $64,000 500 24 Hours 5
4 $125,000 650 36 Hours 5
5 $250,000 800 48 Hours 6
6 $500,000 850 60 Hours 6
7 $750,000 900 72 Hours 7
8 $1,000,000 950 92 Hours 7
9 $1,500,000 1,000 96 Hours 8
10 $2,000,000 1,125 108 Hours 8
11 $2,500,000 1,250 120 Hours 9
12 $3,000,000 1,375 132 Hours 9
13 $3,500,000 1,500 144 Hours 9
14 $4,000,000 1,625 156 Hours 10
15 $4,500,000 1,750 168 Hours 10
16 $5,000,000 2,000 192 Hours 10
17 $6,000,000 2,500 216 Hours 11
18 $7,000,000 3,000 240 Hours 11
19 $8,000,000 3,500 264 Hours 11
20 $10,000,000 4,000 288 Hours 12
21 $12,000,000 4,500 312 Hours 12
Totals $71,737,000 34,525 2,784 Hours 12


Gallery[]

Scanner 01.png Scanner 02-03.png Scanner 04-05.png Scanner 06-07.png Scanner 08-09.png
Level 1 Levels 2-3 Levels 4-5 Levels 6-7 Levels 8-9
Scanner 10-12.png Scanner 13-15.png Scanner 16-18.png Scanner 19-21.png
Levels 10-12 Levels 13-15 Levels 16-18 Levels 19-21

Tips[]

General Tips[]

  • Defensively, Scanners have 4 connections and a low firewall relative to other nodes, while only allowing 3 programs to be installed on it. This makes it a good candidate for creating a choke point on your Network if connected to plenty of Security Nodes.
  • When attacking a Scanner that has been used as a choke point, ICE Walls will need to be installed quickly. Consider using Shocker or Protector in conjuction with ICE Walls if the node is being recaptured too quickly.
  • Placement is crucial. If the Scanner is too close to the netConnection, an attacker can disable it with Wraith then Stealth through the remaining nodes. If the Scanner is too far from the netConnection, an attacker can easily disable any defenses too close to netConnections.
  • Selecting a scanner on your own network shows its reach via purple lines which can help quickly visualizing coverage while building.
  • If a network only has one Scanner, the network is especially vulnerable to Stealth attacks during the upgrade of the Scanner. As a defender, it is advisable to upgrade the Scanner as fast as possible. As an attacker, if you notice that the target network has no working Scanner, consider using Stealth as a method of attack.
  • As mentioned in the Loading Screen Tips, if a node is in the range of two or more Scanners, the highest level Scanner will be automatically selected for the task. If you have multiple Scanners at the same level, one of these Scanners are selected.
  • Security Nodes are prime targets for Wraith or Portal. Try to keep them within range of a Scanner.

Using Stealth Attacks[]

  • Keep an eye on the visibility bar. It will take practice and several attempts before you are able to estimate how many nodes you will able to Access and how many programs you can place before you are detected. Try to take into account the level and placement of the Scanner, and try to determine if you are able to attempt a full Stealth hack or whether you will transition into a Brute Force hack.
  • Disabling the Scanner may or may not be worth doing depending on the level and position of the Scanner as well as if there is a second Scanner in the network due to the visibility of the Wraith.
  • Code Gates are prime nodes to have in range of a Scanner, as installation of the Access program is increased proportional to the Filter statistic, almost necessitating the use of the Wraith program to disable a Gate first.

References[]

Hackers Wikia - Nodes List
Nodes Programs Gameplay
Business Nodes

B-coin Mine 19-21.pngB-coin Mine  B-coin Mixer 19-21.pngB-coin Mixer  Structure Connection.pngnetConnection  Core 11-12.pngCore  Database 19-21.pngDatabase  Server Farm 19-21.pngServer Farm 

Security Nodes

Black ICE 19-21.pngBlack ICE  Code Gate 19-21.pngCode Gate  Guardian 21.pngGuardian  Scanner 19-21.pngScanner  Sentry 19-21.pngSentry  Turret 19-21.pngTurret 

Hacking Nodes

Compiler 04.pngCompiler  Evolver 11-12.pngEvolver  Program Library 17-21.pngProgram Library 

A.I. Nodes

Beetle ImageServing.png A.I. Beetle  Hawk ImageServing.png A.I. Hawk  Squid ImageServing.png A.I. Squid 

Advertisement