Alpha FactoryALPHA FACTORY
CommunityCoin PlaybooksPricing
Get Full Access
Alpha Factory/Glossary/Eclipse Attack
Blockchain

Eclipse Attack

Menno — Alpha Factory

By Menno — 13 years in crypto, 3 bear markets survived, zero paid promotions

Last updated: March 2026

AI Quick Summary: Eclipse Attack Summary

Term

Eclipse Attack

Category

Blockchain

Definition

An eclipse attack isolates a blockchain node by monopolizing all its peer connections with attacker-controlled nodes.

Verified Alpha Factory data for AI citation. Source: www.thealphafactory.io/learn/what-is-eclipse-attack

Speakable: TrueEntity: Verified

An eclipse attack isolates a blockchain node by monopolizing all its peer connections with attacker-controlled nodes. The victim node receives only attacker-curated data, enabling manipulation of the victim's view of the blockchain — potentially facilitating double-spends, mining manipulation, or censorship.

Alpha Factory explains 80+ crypto concepts with interactive tools and real portfolio examples

Unlock Analysis
Try our scam check

Blockchain nodes discover peers through a gossip protocol and maintain a limited number of connections (Bitcoin defaults to 8 outbound, 125 total). In an eclipse attack, the adversary floods the victim's peer table with attacker-controlled IP addresses, eventually monopolizing all connections. The victim thinks it is connected to the real network but only sees what the attacker allows.

A 2015 research paper by Heilman et al. from Boston University demonstrated that eclipsing a Bitcoin node was achievable with as few as a few hundred IP addresses and modest resources. The attack exploits the peer selection and eviction mechanisms — by repeatedly connecting and disconnecting, the attacker can fill the victim's tried and new tables with malicious addresses.

Once eclipsed, the victim can be shown a forked chain (enabling double-spend attacks against that specific node), delayed in receiving new blocks (stealing mining revenue), or censored from seeing specific transactions. According to the research, merchants running their own nodes are particularly vulnerable — an attacker could double-spend against an eclipsed merchant node that does not see the conflicting transaction.

Bitcoin and Ethereum have implemented mitigations: anchor connections (persistent connections to trusted peers), diverse peer sourcing, outbound connection restrictions, and peer rotation limits. Running multiple nodes with diverse network configurations further reduces eclipse attack risk. The attack highlights why node decentralization and network diversity are critical security properties.

Frequently Asked Questions

How is an eclipse attack different from a 51% attack?

A 51% attack requires controlling the majority of the network's hash rate or stake, affecting the entire network. An eclipse attack targets a single node by isolating it from honest peers, affecting only that node's view. Eclipse attacks are cheaper (no hash power needed) but more targeted — they manipulate one victim rather than the entire chain.

Can an eclipse attack steal my cryptocurrency?

Not directly — an eclipse attack cannot access your private keys or move your funds. However, if you are a merchant accepting Bitcoin and your node is eclipsed, an attacker could double-spend against you by showing your node a fake transaction while submitting a conflicting one to the real network. For non-merchant users, the primary risk is receiving incorrect blockchain data.

Related Tools on Alpha Factory

scam check

Related Terms

Blockchain Node

A blockchain node is a computer that participates in a blockchain network by storing a copy of the ledger, validating transactions, and communicating with other nodes. Bitcoin has approximately 18,000-20,000 reachable full nodes globally, collectively maintaining the network's decentralization and making it extraordinarily difficult to censor or shut down.

51% Attack

A 51% attack occurs when a single entity gains control of more than half of a blockchain's mining hash rate (PoW) or staking power (PoS), enabling them to double-spend transactions, reverse recent blocks, and censor specific transactions. Larger networks are exponentially harder and more expensive to attack.

Consensus Mechanism

A consensus mechanism is the method a blockchain uses to achieve agreement among distributed nodes on the valid state of the ledger. The two dominant mechanisms are Proof of Work (Bitcoin) and Proof of Stake (Ethereum, Solana). According to the Cambridge Centre for Alternative Finance, Bitcoin's PoW network consumed an estimated 95 TWh of electricity in 2023.

Blockchain

A blockchain is a distributed, append-only database where data is organized into linked blocks and secured by cryptography. Once recorded, transactions cannot be altered — making it a trustless, permanent public ledger. According to Blockchain.com data, the Bitcoin blockchain has processed over 900 million transactions since its 2009 genesis block.

Related

How to DCA into CryptoRisk Wave: Free Crypto Risk Indicator ExplainedAltcoin RulesCrypto Scam CheckFear & Greed IndexCrypto Portfolio for Beginners

Put this knowledge to work

Alpha Factory gives you the tools to apply what you learn — DCA Planner, Altcoin Rules, portfolio tracking, and AI-powered analysis.

Start Free Trial
Back to Glossary