Produktdetails
Herkunftsort: China
Markenname: JDY
Modellnummer: JDY-2000
Zahlungs-u. Verschiffen-Ausdrücke
Min Bestellmenge: 1
Preis: $35714
Verpackung Informationen: Flightcase
Lieferzeit: 30 Tage
Zahlungsbedingungen: Western Union
Versorgungsmaterial-Fähigkeit: 200 pro Monat
|
Beförderungsart:
|
Tragbar
|
Empfängertechnik:
|
LekDro 915 MHz Rx ELRS
|
Interferenzbande:
|
900 MGz, 1,5 GHz, 2,4 GHz, 5,8 GHz
|
Täuschungssignale:
|
GPS/BDS/Glonass/Galileo
|
Gerätedimension:
|
50 cm × 45 cm × 27 cm
|
Stromversorgung:
|
Wiederaufladbare Lithium-Ionen-Batterie
|
Wasserdicht:
|
Es kann bei leichtem Regen funktionieren
|
Lademodus:
|
DC25,2V / 3A
|
Kontrolle:
|
Manuelle Auslösetaste
|
Alarmmodus:
|
Audiovisuelle Warnungen
|
Distanz:
|
1000-2000 M
|
Anzeigetyp:
|
OLED-LCD-Bildschirm
|
Reichweite:
|
Erkennung: 1 km / Blockierung: 1,5 kg
|
Frequenzbereich:
|
2,4 GHz und 5,8 GHz
|
Eingangsspannung:
|
220V
|
|
Beförderungsart:
|
Tragbar
|
|
Empfängertechnik:
|
LekDro 915 MHz Rx ELRS
|
|
Interferenzbande:
|
900 MGz, 1,5 GHz, 2,4 GHz, 5,8 GHz
|
|
Täuschungssignale:
|
GPS/BDS/Glonass/Galileo
|
|
Gerätedimension:
|
50 cm × 45 cm × 27 cm
|
|
Stromversorgung:
|
Wiederaufladbare Lithium-Ionen-Batterie
|
|
Wasserdicht:
|
Es kann bei leichtem Regen funktionieren
|
|
Lademodus:
|
DC25,2V / 3A
|
|
Kontrolle:
|
Manuelle Auslösetaste
|
|
Alarmmodus:
|
Audiovisuelle Warnungen
|
|
Distanz:
|
1000-2000 M
|
|
Anzeigetyp:
|
OLED-LCD-Bildschirm
|
|
Reichweite:
|
Erkennung: 1 km / Blockierung: 1,5 kg
|
|
Frequenzbereich:
|
2,4 GHz und 5,8 GHz
|
|
Eingangsspannung:
|
220V
|
With the rapid development of drone technology, the application scope of drones is constantly expanding, but the resulting security risks are also becoming increasingly serious. To counter the threat of drones on different frequency bands, the 300MHz-6G fixed anti-drone device adopts multi-band support technology, covering a wide frequency range. This device is compatible with most drones on the market, whether consumer-grade, industrial-grade, or military-grade, and can effectively detect and jam them. Its multi-band feature allows it to perform excellent countermeasures in various scenarios, ensuring comprehensive and stable protection.
![]()
| Parameters | Descriptions |
|---|---|
| Detection Range | 300MHz-6G |
| Key Detection Frequency Bands | 2.4G/5.8G/400MHz/800MHz/900MHz/1.4GHz |
| Detection Range | 1-3KM |
| Interference Frequency Bands | 900M1.5G2.4G5.2G5.8G |
| Interference Distance | > 1-2KM |
| Response Time | ≤3s |
| Spoofing Signal System | GPS/BDS/GLONASS/Galileo |
| Spoofing Distance | 1-3KM |
| Product Dimensions | 450*450X*850mm |
| Packaging Dimensions | 960*530*455mm |
| Product Weight | 15KG |
| Total Product Weight | 42KG |
This device features a fixed design, designed to provide continuous drone protection for areas requiring long-term monitoring. Its stable, fixed installation method ensures stable operation even in harsh environments, preventing changes in equipment location from affecting countermeasures. Whether for monitoring airports, government buildings, military bases, or other critical facilities, this equipment provides long-term, stable protection, ensuring a rapid response to drone threats.
Considering the potential outdoor or extreme weather conditions, the 300MHz-6G anti-drone equipment features a waterproof design, meeting IP67 protection standards. Even in rain, snow, humidity, and dust, the equipment can still operate normally, guaranteeing 24/7 uninterrupted monitoring and protection. This waterproof design not only enhances the equipment's durability but also reduces the failure rate caused by environmental factors, adapting to various complex application scenarios.
To enhance the equipment's intelligence, the 300MHz-6G anti-drone equipment supports data recording and analysis functions. All detected drone information, including flight paths, interference events, and signal strength data, is recorded and stored in real time. Using professional data analysis software, users can perform detailed analyses of this data, helping to trace drone behavior and the source of attacks. This functionality is crucial for post-incident analysis, law enforcement investigations, and the optimization of security strategies.