Eclipse Attack
In an eclipse attack, an adversary surrounds a target node with malicious peers, blocking all genuine connections. Since the node has no contact with honest participants, the attacker can feed it false information: for instance, an outdated or forked chain. This can lead to double spends, as the victim node accepts invalid blocks or transactions.
Nodes reduce eclipse attack risk by diversifying their peer connections, limiting inbound slots from unknown IP ranges, or using Tor for randomized addresses. Bitcoin Core also employs asmap features to spread peers across different network routes. Although challenging to execute on well-connected nodes, eclipse attacks remain a real threat for isolated or poorly configured setups.