Node Roles Overview

Explore the different roles your nodes can take on. Each role plays a crucial part in defining how nodes interact with networks.

Name Description Color Active Nodes Actions
Eavesdropper-v2 Passive node that listens to all traffic and logs sensitive activity. 8 View
Replay-node Resends old transactions to test replay attack resistance. 10 View
Sybil-agent Part of a Sybil attack network — used to flood with fake identities. 6 View
Interceptor Modifies or delays block propagation to analyze propagation attacks. 9 View
Rogue-validator Validator that proposes invalid blocks or double signs. 8 View
Front-runner Simulates MEV-style attacks by observing mempool and jumping transactions. 6 View
Chain-reorganizer Tries to force forks or deep reorgs for double-spending. 10 View
Fake-oracle Injects incorrect external data into smart contracts. 8 View
M-light-node Requests data inconsistently to test full nodes. 5 View
Entrypoint First node in network for new peers (can be flooded). 7 View
Exit-node Final relay node for broadcasting to outside networks. 10 View
Bridge-node Connects two different chains or subnets (vulnerable to bridge attacks). 11 View
Archive-node Stores full chain history — resource intensive and target for data attacks. 3 View
Indexer Indexes data for APIs — prone to overload or DOS attacks. 11 View
Load-balancer Distributes traffic — can be used to simulate bottlenecks. 6 View
Fuzzer Injects malformed or random inputs to detect crashes or unexpected behavior. 8 View
Dust-attacker Sends small-value transactions to trace wallet activity. 4 View
Spam-relay Floods mempool with spam transactions to simulate congestion. 8 View
Slowloris-node Keeps connections open indefinitely to exhaust peer slots. 6 View
Fork-trigger Intentionally mines conflicting blocks to simulate fork scenarios. 6 View
Consensus-splitter Creates conflicting messages to desync consensus. 6 View
Fake-time-server Messes with timestamp info to test clock drift and sync issues. 15 View
Deep-inspector Runs packet-level inspection on all P2P traffic. 6 View
Zombie-node Dormant or hijacked node reactivated for attacks. 6 View
Ghost-relay Invisible relay that hides metadata and origin. 1 View
Toxic-mirror Reflects invalid data or requests to crash other nodes. 6 View
Backdoor-node Intentionally vulnerable node for exploit testing. 6 View
Cloaked-agent Masks its traffic and identity like a normal node. 9 View
Payload-dropper Drops custom payloads into peers to exploit parsing. 8 View
Rate-limiter Throttles traffic to simulate network strain or slow peers. 9 View
Blackhole-node Receives but never forwards or responds — simulates packet loss. 7 View
Header-forger Sends blocks with crafted or forged headers. 5 View
State-corruptor Alters local state to simulate DB inconsistencies or rollback attacks. 6 View
Tx-modifier Alters transactions mid-flight to test signature checks and verification. 8 View
Log-stripper Removes logging or emits misleading logs. 10 View
Oracle-desyncer Introduces desync between multiple oracle feeds. 8 View
Fake-bootstrapper Fakes bootstrap data to seed new nodes with invalid state. 8 View
Checksum-attacker Sends corrupted packets with correct checksum to test validation layers. 7 View
Dns-poisoner Manipulates DNS responses to reroute traffic. 9 View
Sidecar-injector Injects sidecar code or plugins into target peers. 9 View
Connection-jammer Rapidly opens and closes sockets to exhaust file descriptors. 4 View