What is an Eclipse attack?

Most attack scenarios on the public blockchain are difficult to implement. They require a large amount of computing power, which makes them infeasible. But hacking a single node or user is not a rare phenomenon.

On this page

An Eclipse attack is an attack executed within the Peer-to-Peer network. It can only be deployed in a decentralized environment, as it targets single nodes that accept incoming and outgoing connections from other nodes. 

For example, the bitcoin network, by default, has a maximum of 117 incoming and 8 outgoing TCP connections.

In an Eclipse Attack, the attacker attempts to redirect the target's connection from its neighboring nodes to the ones under the attacker's control. As a result, the victim is isolated from all honest peers, but remains connected to the attacker's node. 

In other words, an Eclipse Attack is about gaining control over access to information on a P2P network.

How do attackers eclipse nodes?

Attackers usually use a botnet to accomplish this task. For this purpose, they create a phantom network from host nodes to flood the target node with multiple IP addresses that it can synchronize with during the next connection to the blockchain. 

From this point on, the hacker simply waits for the target to connect to those nodes.

Sometimes it takes several attempts to hit the timeframe between automatic reconnections.

In essence, this attack works a lot like fishing. The hacker uses false connection addresses as bait and waits for the node to lap it up. Then he makes a quick strike and gets his “catch” to the shore, far from the native element.

What kind of “fish broth” can be made of a successful Eclipse Attack?

During an Eclipse Attack, the attacker hides the actual state of the blockchain ledger from the target and gains several options for generating criminal profits.

1. Double spending. If the attacker's nodes account for 25% of the total network hashing power, and the target node accounts for 26%, they can get the coveted 51% and a chance of double-spending by taking control of a node. That is, a hacker can send funds to a controlled node that have already been sent to other addresses. Then the compromised node receives information about a false transaction and returns all the money to the attacker's address. The fraud will be revealed only when the victim of the attack gets free and connects to the correctly working nodes. 

2. Stealing processing power of a miner. The hacker hides the information about blocks that have already been mined from the target, thereby pushing the victim to waste processing power on useless calculations. In this way, the attacker increases their personal hash power and wins the validation race (we extensively covered this case in our article about selfish mining). Or they may combine their hash rate with the target's power for more efficient mining and get all the fees.

Are there any ways to prevent an Eclipse Attack?

This is so far a purely theoretical question.

An attack can be eliminated if the peer-to-peer network design enables synchronization with the blockchain through random nodes. The network, where each node connects to the neighboring node, will always be at risk of being attacked.

Some security experts also suggest an alternative safe system, where each node connects to a large number of targets. That is, the network with an increased number of TCP connections. But this would greatly complicate the blockchain architecture and slow down transaction speed during the synchronization.

The content on The Coinomist is for informational purposes only and should not be interpreted as financial advice. While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, or reliability of any content. Neither we accept liability for any errors or omissions in the information provided or for any financial losses incurred as a result of relying on this information. Actions based on this content are at your own risk. Always do your own research and consult a professional. See our Terms, Privacy Policy, and Disclaimers for more details.

Articles by this author
Pro-Israel Hackers Leak Full Source Code of Iranian Crypto Exchange Nobitex

Pro-Israel Hackers Leak Full Source Code of Iranian Crypto Exchange Nobitex

Following the $90 million theft, Nobitex’s source code and deployment scripts have been dropped online – fully exposed and public.

Eric Hash
CZ Urges All Crypto Exchanges to Add Inheritance Features

CZ Urges All Crypto Exchanges to Add Inheritance Features

Changpeng Zhao promotes estate planning in crypto, calling on exchanges to support heirs with secure asset transfer features.

Eric Hash
KuCoin Rolls Out Off-Exchange Trading with BitGo Singapore Custody

KuCoin Rolls Out Off-Exchange Trading with BitGo Singapore Custody

Institutional clients can now trade on KuCoin without transferring assets to the exchange, thanks to BitGo Singapore’s secure custody integration.

Eric Hash
Elon Musk’s xAI Threatened With Lawsuit Over Clean Air Act Violations

Elon Musk’s xAI Threatened With Lawsuit Over Clean Air Act Violations

Civil rights group NAACP gives xAI 60 days to curb nitrogen oxide and formaldehyde emissions from its Memphis data center or face legal action.

Dmytro Psevdonimenko
From Politics to Protocols: Decoding Eric Trump’s Unexpected Crypto Headlines

From Politics to Protocols: Decoding Eric Trump’s Unexpected Crypto Headlines

Politics continues to move into crypto, and Eric Trump’s involvement sparks debate. What drives his interest?

Daryna Nesterenko
Who Is Tomasz Stańczak? Inside the New Leadership of the Ethereum Foundation

Who Is Tomasz Stańczak? Inside the New Leadership of the Ethereum Foundation

Tomasz Stańczak is one of the co-executive directors at the Ethereum Foundation, contributing to strategic planning and operational oversight to support Ethereum’s long-term growth.

Anahit Avetisyan
Robert Kiyosaki and the Debt-Fueled Prophecy

Robert Kiyosaki and the Debt-Fueled Prophecy

Robert Kiyosaki says the end is here. With $1.2B in U.S. debt and a $1M Bitcoin prediction, the Rich Dad author is turning collapse into his ultimate performance.

Elina Moskovchuk
How Military Conflict Could Impact Bitcoin Mining in Iran

How Military Conflict Could Impact Bitcoin Mining in Iran

What lies ahead for Iran’s mining market after Israel’s strikes on gas and oil facilities? An analysis of potential impacts on the energy system and global hashrate.

Yara Zornell
What Is a DDoS Attack in Crypto? A Guide to Defense in 2025

What Is a DDoS Attack in Crypto? A Guide to Defense in 2025

DDoS attacks remain one of the most serious threats to crypto infrastructure. They can disrupt websites, crypto exchanges, DeFi protocols, and blockchain nodes.

Daryna Nesterenko
Are Crypto IPOs Overhyped? A Closer Look at the Boom

Are Crypto IPOs Overhyped? A Closer Look at the Boom

Crypto IPOs are booming, driven by market optimism and clearer regulations. But are they a sign of industry maturity or just another wave of hype? We take a closer look.

Anahit Avetisyan
What Is Milady? Inside Ethereum’s Most Controversial NFT Cult 

What Is Milady? Inside Ethereum’s Most Controversial NFT Cult 

Milady is a prominent NFT collection often seen as social media profile pictures, but its complex story extends far beyond mere aesthetics.

Anahit Avetisyan
Strategic Bitcoin Reserve: What the U.S. Is Really Planning

Strategic Bitcoin Reserve: What the U.S. Is Really Planning

In March 2025, the U.S. officially announced a strategic Bitcoin reserve, becoming the first nation to incorporate a digital asset into its national reserve policy.

Vlad Vovk
What Is Aztec Network? 2025 Milestones and the Path to Mainnet

What Is Aztec Network? 2025 Milestones and the Path to Mainnet

Aztec is a privacy network on Ethereum, designed to allow developers to build privacy-focused decentralised applications without compromising transparency.

Anahit Avetisyan
Crypto and the Fed: What the Interest Rate Decision Means

Crypto and the Fed: What the Interest Rate Decision Means

Tonight, the Federal Reserve will announce its decision on the interest rate. We explain how this impacts the economy, cryptocurrencies, and why everyone is watching closely.

Iaroslava Kramarenko
While Altcoins Bleed, WhiteBIT Coin (WBT) Surges to a New ATH

While Altcoins Bleed, WhiteBIT Coin (WBT) Surges to a New ATH

WBT climbed to $50 and set a new ATH while most altcoins remain under pressure. The token’s performance reflects strong tokenomics, a long-term strategy, utility, and brand power.

Anton Kryshtal
MORE
Crypto Spam Attacks: How to Save Your Deposit and Your Nerves

Crypto Spam Attacks: How to Save Your Deposit and Your Nerves

Unexpected airdrops, shady tokens in your wallet, pushy Discord messages, and weird invites to NFT projects—let’s learn how to stay afloat in a stream of digital noise.

Iaroslava Kramarenko
Why Crypto Trading Isn’t Gambling (Even If It Feels That Way Sometimes)

Why Crypto Trading Isn’t Gambling (Even If It Feels That Way Sometimes)

Is crypto trading just digital gambling? At first glance, the line seems thin. But they’re worlds apart: one relies on analysis and strategy, the other on luck and addiction.

Iaroslava Kramarenko
MORE