Eclipse Attack
Security● Common

An attack isolating a node from the honest network by monopolizing all its peer connections. The eclipsed node only sees attacker-controlled data, enabling double-spends, selfish mining amplification, and other attacks.

Technical Notes

Attacker floods victim with connection requests until all slots filled. Mitigations: diverse peer selection, anchor connections, Tor, multiple network interfaces. Bitcoin Core limits connections per IP range, maintains fixed outbound slots.

Metadata

Visibility: Public
Created:1/3/2026by System

Actions