Menu

πŸ“Š Dashboard πŸ’» Computers βš”οΈ Attack πŸ“œ Logs πŸ”— Cluster 🏦 Bank πŸ›’ Market πŸ† Ranks ℹ️ About

HackTheChain

Coins: 0.000000 KLV Hacker: ...

Dashboard

Computers

0

Cluster

None

Active Attacks

0

Recent Logs

-

Global Statistics

Total Players: 0
Total Computers: 0
Total Clusters: 0
Total Coins: 0.000000 KLV
Total Bank Coins: 0.000000
Game Reserve: 0.000000

My Attack Statistics

Attacks Made: 0
Successful Attacks: 0
Attacks Received: 0
Successful Defenses: 0
Total KLV Stolen: 0.000000 KLV
Total KLV Lost: 0.000000 KLV

Computers (0)

πŸ’»

NO COMPUTERS YET

Click "Buy Computer" to start!

Attack Center

Select a computer to attack:

Attackable Targets
Active Cooldown
No active cooldown
Active Bounties
No active bounties

System Logs (0)

Cluster

Cluster details
Only for private clusters

Bank

Store your KLV safely in the blockchain bank. Deposit anytime and withdraw instantly - your funds are always accessible.

Marketplace

Available Listings
Your Listings

Leaderboard

Top players in HackTheChain

Loading...

HackTheChain Tutorial

Getting Started

1. Welcome to HackTheChain

  • Manage virtual computers on the blockchain
  • Attack other players to steal their KLV
  • Defend yourself with hardware upgrades and security software
  • Earn passive generation from your hardware

2. Deposit KLV

  • Click the "Deposit" button
  • Enter amount (recommended: start with 200+ KLV for computer + first upgrades)
  • Confirm transaction in your K5 Wallet or Klever Extension

3. Set Your Name (Optional & Free)

  • Click "Set Name" button
  • Enter your player name
  • Other players will see this name

4. Buy Your First Computer

  • Click "Buy Computer" button
  • Enter a name for your computer
  • Confirm transaction
  • A basic computer costs 100 KLV

5. Hardware Upgrades

  • Go to "Your Computers" tab
  • Click on your computer card
  • View computer details below
  • Click "Upgrade" button next to any hardware component
  • Each component can be upgraded to Level 10
Example upgrade costs (Level 1 β†’ Level 2):
CPU: 75 KLV | RAM: 30 KLV | Motherboard: 45 KLV | Storage: 38 KLV | Network: 15 KLV

6. Download Software

  • Go to "Your Computers" tab
  • Click on your computer
  • In the computer details below, scroll to the software sections
  • Click "Download" on software you want
  • Wait for download to complete (time depends on CPU/Network)

7. Install Software

  • After download completes, click "Install"
  • Wait for installation (time depends on hardware)
Recommended first software:
Firewall Level 1: 10 KLV (protects against RAID attacks)
Antivirus Level 1: 12 KLV (protects against Worm attacks)

8. Collect Income

  • Your hardware automatically generates KLV
  • Click "Collect Income" button regularly
  • Income rate depends on your hardware levels

Attack Center

How Attacks Work

  • Success Condition: Your Attack Score must be higher than target's Defense Score
  • Attack Score: (Hardware levels Γƒβ€” 10) + Defense Software levels + Cluster Bonus
  • Defense Score: Same calculation as Attack Score
  • Cooldown: 3600 seconds Γ· (Network Level + 1) between attacks per computer
  • Requirements: Need Level 3+ of specific software to use each weapon

Weapon Types & Requirements

🎯 RAID (Weapon 0)
  • Requires: Ransomware Level 3+
  • Attack Condition: Your Ransomware > Target's Firewall
  • Effect: Steals random amount of KLV from target (10-100 KLV)
  • Blocked by: Firewall (if Firewall β‰₯ Ransomware)
⚑ Downgrader (Weapon 1)
  • Requires: Bomb Level 3+
  • Attack Condition: Your Bomb > Target's Encryption
  • Effect: Reduces one target software by 1 level (you choose which)
  • Blocked by: Encryption (if Encryption β‰₯ Bomb)
  • Counter: Backup software can restore after 1 hour cooldown
πŸ› Worm (Weapon 2)
  • Requires: Virus Level 3+
  • Attack Condition: Your Virus > Target's Antivirus
  • Effect: Slows target computer for 24 hours (2Γƒβ€” longer operations)
  • Blocked by: Antivirus (if Antivirus β‰₯ Virus)
  • Impact: Doubles download & installation times
πŸ’₯ DDoS (Weapon 3)
  • Requires: Trojan Level 3+
  • Attack Condition: Your Trojan > Target's Firewall
  • Effect: Disables target computer for 1 hour
  • Blocked by: Firewall (if Firewall β‰₯ Trojan)
  • Impact: Target cannot attack, upgrade, or perform operations
πŸ” Spy (Weapon 4)
  • Requires: Spyware Level 3+
  • Attack Condition: Your Spyware > Target's Firewall
  • Effect: Reveals target information (level-dependent)
  • Spyware Level 1-4: Shows Hardware levels only
  • Spyware Level 5-9: Shows Hardware + Defense Software
  • Spyware Level 10+: Shows all Hardware + all Software
  • Blocked by: Firewall (if Firewall β‰₯ Spyware)
πŸ’€ Rootkit (Weapon 5)
  • Requires: Rootkit Level 3+
  • Cost: 5000 KLV deposit (refunded on success)
  • Attack Condition: Your Rootkit > Target's Encryption
  • Effect: On success, choose one:
  •    β€’ Destroy (Action 0): Target computer permanently deleted
  •    β€’ Takeover (Action 1): You gain control of target computer
  • On Failure: 5000 KLV deposit goes to Game Reserve (lost)
  • Blocked by: Encryption (if Encryption β‰₯ Rootkit)
  • Note: Most powerful weapon, highest risk/reward

How to Attack

  • Go to "Attack Center" tab
  • Enter target IP address
  • Select attacking computer
  • Choose weapon type
  • For Downgrader: Also select which software to target
  • Click "Attack" and confirm transaction
  • Wait for attack cooldown to complete
  • For Rootkit: After cooldown, click "Claim" and choose action

Attack Restrictions

  • Cannot attack players with active protection
  • Cannot attack members of your own cluster
  • Cannot attack if target computer is disabled
  • Cannot attack if your computer is busy (downloading/installing)
  • Cannot attack if computer is listed on marketplace

Bounty System

What are Bounties?

  • Place a reward on another player's computer
  • Any player who successfully attacks the target claims the bounty
  • Great for revenge or removing threats without attacking yourself
  • Bounties are visible to all players (target IP only, not who placed it)

Placing a Bounty

  • Go to "Attack Center" tab
  • Select a target from the dropdown
  • Click "Place Bounty" button
  • Enter bounty amount (minimum: 1,000 KLV)
  • Set duration (1-168 hours)
  • Confirm transaction
Bounty Rules:
- Minimum bounty: 1,000 KLV
- Maximum duration: 168 hours (7 days)
- Bounty amount is locked until claimed or expired
- You receive a notification when your bounty is claimed

Claiming Bounties

  • View active bounties in the "Attack Center" tab
  • Bounties targeting your computers show "TARGETING YOU!" warning
  • Successfully attack a bounty target to claim the reward
  • Bounty is automatically added to your balance on successful attack
  • You'll see a toast notification when you claim a bounty

Canceling Bounties

  • Only the bounty placer can cancel their own bounty
  • Click "Cancel" button next to your bounty
  • Bounty amount is refunded to your balance
  • Cannot cancel bounties on your own computers

Bounty Strategy

  • Revenge: Place bounty on players who attacked you
  • Deterrence: Large bounties attract many attackers
  • Profit: Claim bounties on weak targets for easy KLV
  • Defense: If you see a bounty on your computer, upgrade defenses!

Defense

Defense Software

πŸ›‘οΈ Firewall
  • Blocks: RAID (vs Ransomware), DDoS (vs Trojan), Spy (vs Spyware)
  • Level 1 Cost: 10 KLV
  • Protection: Attack succeeds only if attacker's level > your Firewall
  • Priority: Essential first defense
πŸ” Encryption
  • Blocks: Downgrader (vs Bomb), Rootkit (vs Rootkit)
  • Level 1 Cost: 15 KLV
  • Protection: Attack succeeds only if attacker's level > your Encryption
  • Priority: Critical for protecting software & preventing Rootkit
🦠 Antivirus
  • Blocks: Worm (vs Virus)
  • Level 1 Cost: 12 KLV
  • Protection: Attack succeeds only if attacker's level > your Antivirus
  • Priority: Prevents 24h slowdown debuff
πŸ“Š Net Analyzer
  • Does not block attacks
  • Level 1-4: Shows attack notifications in logs
  • Level 5+: Reveals attacker's IP address in logs
  • Level 1 Cost: 18 KLV
  • Priority: Intelligence gathering for retaliation
πŸ’Ύ Backup
  • Protection: After Downgrader attack, can restore software
  • Level 1 Cost: 20 KLV
  • Cooldown: 1 hour between restores
  • Usage: Go to "Your Computers" β†’ Click "Restore Backup"
  • Priority: Insurance against Downgrader attacks

Defense Strategy Summary

Protection Matrix:
β€’ RAID β†’ Firewall blocks Ransomware
β€’ Downgrader β†’ Encryption blocks Bomb
β€’ Worm β†’ Antivirus blocks Virus
β€’ DDoS β†’ Firewall blocks Trojan
β€’ Spy β†’ Firewall blocks Spyware
β€’ Rootkit β†’ Encryption blocks Rootkit

Recommended Priority:
1. Firewall (blocks 3 weapons)
2. Encryption (blocks Downgrader & Rootkit)
3. Antivirus (prevents slowdown)
4. Net Analyzer (intelligence)
5. Backup (recovery option)

Protection Period

  • New Players: 48 hours protection when you buy first computer
  • After Attacking: Protection extends until attack cooldown ends
  • Cluster Members: No automatic time-based protection
  • While Protected: Cannot be attacked by any player

Clusters

What are Clusters?

  • Groups of players who collaborate for mutual protection
  • Provides Defense Score bonus to all members
  • Members cannot attack each other
  • Owner can customize name, description, links, daily fee

Creating a Cluster

  • Go to "Clusters" tab
  • Click "Create Cluster"
  • Enter cluster name (required)
  • Set daily fee for members (optional, default: 100 KLV)
  • Add description and social links (optional)
  • Creation Cost: 50 KLV
  • You automatically become the owner and first member

Joining a Cluster

  • Go to "Clusters" tab
  • Browse available clusters
  • Check daily fee and protection level
  • Click "Join" on desired cluster
  • Must have enough KLV to pay daily fee

Protection Levels

Level 1 (Default):
β€’ Cost: FREE
β€’ Bonus: +10 to Defense Score

Level 2:
β€’ Upgrade Cost: 1,000 KLV
β€’ Bonus: +15 to Defense Score

Level 3 (Maximum):
β€’ Upgrade Cost: 2,500 KLV
β€’ Bonus: +20 to Defense Score
  • Note: Only cluster owner can upgrade protection level
  • Protection bonus applies to ALL members
  • Higher levels make cluster more attractive to join

Cluster Management (Owner Only)

  • Change Cluster Settings: Modify name, fee, links, description
  • Upgrade Protection: Increase defense bonus for all members
  • Kick Members: Remove specific members from cluster
  • Claim Fees: Collect accumulated daily fees from members
  • Delete Cluster: Permanently removes cluster, all members leave

Leaving a Cluster

  • Go to "Clusters" tab
  • Click "Leave Cluster"
  • Confirm transaction
  • Note: Cluster owner cannot leave (must delete or transfer ownership)
  • Lose protection bonus immediately

Marketplace

Listing Your Computer

  • Go to "Your Computers" tab
  • Click on computer you want to sell
  • Click "List on Marketplace" button
  • System shows estimated value based on hardware & software
  • Enter your listing price in KLV
  • Listing Fee: 5 KLV
  • Confirm transaction
Restrictions:
β€’ Cannot list computer during active attack
β€’ Cannot list computer during download/installation
β€’ Cannot attack with listed computer
β€’ Cannot upgrade listed computer

Buying from Marketplace

  • Go to "Marketplace" tab
  • Browse available computers
  • Check hardware & software levels
  • Compare price vs estimated value
  • Green indicator = Below market value (good deal)
  • Red indicator = Above market value
  • Transaction Fee: 2% of listing price
  • Click "Buy" and confirm
Example:
Listing Price: 500 KLV
Transaction Fee (2%): 10 KLV
Total Cost: 510 KLV

Seller receives: 500 KLV
Game Reserve receives: 10 KLV

Canceling Listing

  • Go to "Your Computers" tab
  • Find listed computer
  • Click "Cancel Listing"
  • Confirm transaction
  • Note: Listing fee is NOT refunded
  • Computer becomes available for attacks/upgrades again

Marketplace Strategy

  • Selling: Price slightly below estimated value for quick sale
  • Buying: Look for deals 10%+ below estimated value
  • Caution: Computers with low defense software = easy attack target
  • Tip: High hardware + high attack software = premium price
  • Best Deals: Sort by "% below value" indicator

Banking System

What is the Bank?

  • Secure storage for your KLV
  • Protected from RAID attacks
  • Separate from your active balance
  • Withdraw anytime back to your active balance

Depositing to Bank

  • Go to "Bank" tab
  • Click "Deposit" button
  • Enter amount in KLV
  • Confirm transaction
  • KLV moves from active balance to bank
Use Case:
β€’ Protects large amounts from RAID attacks
β€’ RAID can only steal from active balance
β€’ Keep savings safe while playing

Withdrawing from Bank

  • Go to "Bank" tab
  • Click "Withdraw" button
  • Enter amount in KLV
  • Confirm transaction
  • KLV moves back to your active balance
Strategy:
β€’ Keep most KLV in bank when not actively playing
β€’ Move to active balance only when needed for upgrades
β€’ Balance risk vs convenience

Referral System

What is the Referral System?

  • Invite friends to play HackTheChain
  • Earn bonus KLV when they register
  • Your referral code is unique to your account
  • Track your referrals in the Dashboard

Generating Your Referral Code

  • Go to the Dashboard tab
  • Find the "Referral Code" section
  • Click "Generate Code" if you don't have one yet
  • Your unique code will be displayed
  • Click "Copy" to share with friends
Referral Code Format:
Your code is a unique 8-character string tied to your wallet address.

Using a Referral Code

  • New players can enter a referral code when registering
  • The code must be entered before buying the first computer
  • Both referrer and new player receive bonus KLV

Referral Rewards

  • Referrer (you): Receive bonus when your referral registers
  • New Player: Gets a welcome bonus
  • Rewards are automatically added to your balance

Advanced Tips & Strategies

Score Calculation Deep Dive

Attack/Defense Score Formula:
(CPU + RAM + Motherboard + Storage + Network) Γƒβ€” 10
+ Firewall + Antivirus + Encryption
+ Cluster Protection Bonus

Example:
Hardware: All Level 5 = (5+5+5+5+5) Γƒβ€” 10 = 250
Defense Software: FW5 + AV5 + ENC5 = 15
Cluster Level 2 = +15
Total Score: 280

Optimal Build Paths

🗑️ Aggressive Build
  • Priority: Network (reduces attack cooldown)
  • Software Focus: Ransomware, Virus, Bomb to Level 5+
  • Defense: Minimal (Firewall 3, Encryption 3)
  • Strategy: Fast attacks, steal often, bank winnings
  • Best for: Active players who can attack frequently
πŸ›‘οΈ Defensive Build
  • Priority: All hardware balanced to Level 6+
  • Software Focus: All defense to Level 7+
  • Cluster: Join Level 3 protection cluster
  • Strategy: Minimize losses, maximize defense
  • Best for: Passive players, long-term holders
βš–οΈΒ Balanced Build
  • Priority: Hardware to Level 5, then software
  • Software: Defense to 5, then attack to 5
  • Cluster: Level 2 protection
  • Strategy: Attack when profitable, defend when needed
  • Best for: Most players, flexibility

Target Selection

  • Use Spy First: Scout before committing to expensive attacks
  • Check Logs Tab: Find players who recently attacked you
  • Look for: High coins, low defense software
  • Avoid: Empty balance, maxed defense, Level 3 clusters
  • Retaliation: Net Analyzer Level 5+ reveals attacker IPs

Economic Optimization

  • Income: Scales with hardware levels
  • ROI Priority: Network > CPU > Others (for attackers)
  • Defense ROI: Firewall first (blocks 3 weapons)
  • Software Levels: Level 3 unlocks weapons, Level 5+ for serious play
  • Marketplace: Buy below value, upgrade, resell for profit

Rootkit Strategy

  • High Risk: 5000 KLV deposit lost on failure
  • High Reward: Destroy enemy or steal entire computer
  • When to Use: Against high-value targets with low Encryption
  • Takeover Value: You gain entire computer with all upgrades
  • Destroy Use Case: Eliminate persistent threats
  • Counter: Encryption is your only defense

Common Mistakes to Avoid

  • ❌ Upgrading attack software without defense (easy target)
  • ❌ Keeping all KLV active (vulnerable to RAID)
  • ❌ Attacking without checking target's cluster
  • ❌ Ignoring passive generation collection
  • ❌ Listing computer during upgrade phase
  • ❌ Not using Backup after Downgrader attack
  • ❌ Using Rootkit without proper scouting

Pro Tips

  • πŸ’‘ Attack during off-hours when fewer players are active
  • πŸ’‘ Join clusters with active, helpful members
  • πŸ’‘ Save chat logs to track profitable targets
  • πŸ’‘ Upgrade in batches during protection period
  • πŸ’‘ Use multiple computers for parallel attacks
  • πŸ’‘ Monitor marketplace for undervalued computers
  • πŸ’‘ Level defense before attacking to avoid retaliation