Hackers Wikia
Advertisement
Scanner 19-21


"Increases stealth program detection on all nodes three steps away and closer.
Access, Wraith and Portal programs alarm the network faster."


Scanner 01 Scanner 02-03 Scanner 04-05 Scanner 06-07 Scanner 08-09
Level 1 Level 2-3 Level 4-5 Level 6-7 Level 8-9
Scanner 10-12 Scanner 13-15 Scanner 16-18 Scanner 19-21
Level 10-12 Level 13-15 Level 16-18 Level 19-21

Summary

The Scanner is a defensive Security Node. During the Stealth phase of a hack, the Scanner will increase the stealth cost of any stealth programs to nodes installed within 3 connections of the Scanner. The increase is based on the sensitivity statistic. As sometimes mentioned on the loading screen hints, if a network connection has two Scanners overlapping, the system prioritizes the Scanner with the higher level.

Statistics

Node Connections Program Slots
4 3
Core Level 1 - 3 4 5 - 9 10 - 12
Max # of
Scanners
0 1 2 3
Level Firewall Sensitivity Upgrade Cost Experience
Gained
Completion
Time
Required
Core Level
Appearance
1 180 120% $16,000 300 4 Hours 4 Scanner 01
2 200 130% $32,000 450 12 Hours 4 Scanner 02-03
3 225 140% $64,000 24 Hours 5
4 250 150% $125,000 36 Hours 5 Scanner 04-05
5 285 160% $250,000 48 Hours 6
6 320 180% $500,000 60 Hours 6 Scanner 06-07
7 360 200% $750,000 72 Hours 7
8 400 220% $1,000,000 950 92 Hours 7 Scanner 08-09
9 450 240% $1,500,000 1,000 96 Hours 8
10 500 260% $2,000,000 1,125 108 Hours 8 Scanner 10-12
11 560 280% $2,500,000 1,250 120 Hours 9
12 630 300% $3,000,000 132 Hours 9
13 700 320% $3,500,000 1,500 144 Hours 9 Scanner 13-15
14 790 340% $4,000,000 1,625 156 Hours 10
15 880 360% $4,500,000 1,750 168 Hours 10
16 990 380% $5,000,000 2,000 192 Hours 10 Scanner 16-18
17 1,100 400% $6,000,000 2,500 216 Hours 11
18 1,240 430% $7,000,000 240 Hours 11
19 1,380 460% $8,000,000 264 hours 11 Scanner 19-21
20 1,550 490% $10,000,000 288 Hours 12
21 1,740 520% $12,000,000 312 Hours 12

Tips

General

  • Defensively, Scanners have 4 connections and a low firewall relative to other nodes, while only allowing 3 programs to be installed on it. This makes it a good candidate for creating a choke point on your Network if connected to plenty of Security Nodes.
  • When attacking a Scanner that has been used as a choke point, ICE Walls will need to be installed quickly. Consider using Shocker or Protector in conjuction with ICE Walls if the node is being recaptured too quickly.
  • Placement is crucial. If the Scanner is too close to the netConnection, an attacker can disable it with Wraith then Stealth through the remaining nodes. If the Scanner is too far from the netConnection, an attacker can easily disable any defenses close to netConnections.
  • If a network has a single Scanner, the network is especially vulnerable to Stealth attacks during the upgrade of the Scanner. As a defender, upgrade the Scanner as fast as possible. As an attacker, if you notice that the target network has no working Scanner, consider using Stealth as a method of attack.
  • Security Nodes are prime targets for Wraith or Portal. Try to keep them within range of a Scanner.

Using Stealth Attacks

  • Keep an eye on the visibility bar. It will take practice and several attempts before you are able to estimate how many nodes you will able to Access and how many programs you can place before you are detected. Try to take into account the level and placement of the Scanner, and try to determine if you are able to attempt a full Stealth hack or transition into a Brute Force hack.
  • Disabling the Scanner may or may not be worth doing so depending on the level and position of the Scanner as well as if there is a second Scanner in the network.
  • Code Gates are prime nodes to have in range of a Scanner, as installation of the Access program is increased proportional to the Filter statistic, almost necessitating the use of the Wraith program to disable a Gate first.
Hackers Wikia - Nodes List
Nodes Programs Gameplay
Business Nodes

B-coin Mine 19-21B-coin Mine  B-coin Mixer 19-21B-coin Mixer  Structure ConnectionnetConnection  Core 11-12Core  Database 19-21Database  Server Farm 19-21Server Farm 

Security Nodes

Black ICE 19-21Black ICE  Code Gate 19-21Code Gate  Guardian 21Guardian  Scanner 19-21Scanner  Sentry 19-21Sentry  Turret 19-21Turret 

Hacking Nodes

Compiler 04Compiler  Evolver 11-12Evolver  Program Library 17-21Program Library 

A.I. Nodes

Beetle ImageServing A.I. Beetle  Hawk ImageServing A.I. Hawk  Squid ImageServing A.I. Squid 

Advertisement