Eclipse Attack
Security● Common
An attack isolating a node from the honest network by monopolizing all its peer connections. The eclipsed node only sees attacker-controlled data, enabling double-spends, selfish mining amplification, and other attacks.
Technical Notes
Attacker floods victim with connection requests until all slots filled. Mitigations: diverse peer selection, anchor connections, Tor, multiple network interfaces. Bitcoin Core limits connections per IP range, maintains fixed outbound slots.
Metadata
Visibility: Public
Created:1/3/2026by System