Product Details
Place of Origin: china
Brand Name: JDY
Model Number: JDY-2000
Payment & Shipping Terms
Minimum Order Quantity: 1
Price: $35714
Packaging Details: Flight case
Delivery Time: 30days
Payment Terms: Western Union
Supply Ability: 200 per month
|
Carrying Method:
|
Portable
|
Receiver Tech:
|
LekDro 915MHz Rx ELRS
|
Interference Bandwitch:
|
900MGz, 1.5 Ghz, 2.4Ghz, 5.8GHz
|
Deception Signals:
|
GPS/Bds/Glonass/Galileo
|
Device Dimension:
|
50cm × 45cm × 27cm
|
Power Supply:
|
Rechargeable Lithium-ion Battery
|
Waterproof:
|
It Can Work In Light Rain
|
Charging Mode:
|
DC25.2V / 3A
|
Control:
|
Manual Trigger Button
|
Alerts Mode:
|
Audio/Visual Alerts
|
Distance:
|
1000-2000 M
|
Display Type:
|
OLED LCD Screen
|
Range:
|
Detection:1km / Jamming:1.5kg
|
Frequency Range:
|
2.4 GHz And 5.8 GHz
|
Input Voltage:
|
220V
|
|
Carrying Method:
|
Portable
|
|
Receiver Tech:
|
LekDro 915MHz Rx ELRS
|
|
Interference Bandwitch:
|
900MGz, 1.5 Ghz, 2.4Ghz, 5.8GHz
|
|
Deception Signals:
|
GPS/Bds/Glonass/Galileo
|
|
Device Dimension:
|
50cm × 45cm × 27cm
|
|
Power Supply:
|
Rechargeable Lithium-ion Battery
|
|
Waterproof:
|
It Can Work In Light Rain
|
|
Charging Mode:
|
DC25.2V / 3A
|
|
Control:
|
Manual Trigger Button
|
|
Alerts Mode:
|
Audio/Visual Alerts
|
|
Distance:
|
1000-2000 M
|
|
Display Type:
|
OLED LCD Screen
|
|
Range:
|
Detection:1km / Jamming:1.5kg
|
|
Frequency Range:
|
2.4 GHz And 5.8 GHz
|
|
Input Voltage:
|
220V
|
With the rapid development of drone technology, the application scope of drones is constantly expanding, but the resulting security risks are also becoming increasingly serious. To counter the threat of drones on different frequency bands, the 300MHz-6G fixed anti-drone device adopts multi-band support technology, covering a wide frequency range. This device is compatible with most drones on the market, whether consumer-grade, industrial-grade, or military-grade, and can effectively detect and jam them. Its multi-band feature allows it to perform excellent countermeasures in various scenarios, ensuring comprehensive and stable protection.
![]()
| Parameters | Descriptions |
|---|---|
| Detection Range | 300MHz-6G |
| Key Detection Frequency Bands | 2.4G/5.8G/400MHz/800MHz/900MHz/1.4GHz |
| Detection Range | 1-3KM |
| Interference Frequency Bands | 900M1.5G2.4G5.2G5.8G |
| Interference Distance | > 1-2KM |
| Response Time | ≤3s |
| Spoofing Signal System | GPS/BDS/GLONASS/Galileo |
| Spoofing Distance | 1-3KM |
| Product Dimensions | 450*450X*850mm |
| Packaging Dimensions | 960*530*455mm |
| Product Weight | 15KG |
| Total Product Weight | 42KG |
This device features a fixed design, designed to provide continuous drone protection for areas requiring long-term monitoring. Its stable, fixed installation method ensures stable operation even in harsh environments, preventing changes in equipment location from affecting countermeasures. Whether for monitoring airports, government buildings, military bases, or other critical facilities, this equipment provides long-term, stable protection, ensuring a rapid response to drone threats.
Considering the potential outdoor or extreme weather conditions, the 300MHz-6G anti-drone equipment features a waterproof design, meeting IP67 protection standards. Even in rain, snow, humidity, and dust, the equipment can still operate normally, guaranteeing 24/7 uninterrupted monitoring and protection. This waterproof design not only enhances the equipment's durability but also reduces the failure rate caused by environmental factors, adapting to various complex application scenarios.
To enhance the equipment's intelligence, the 300MHz-6G anti-drone equipment supports data recording and analysis functions. All detected drone information, including flight paths, interference events, and signal strength data, is recorded and stored in real time. Using professional data analysis software, users can perform detailed analyses of this data, helping to trace drone behavior and the source of attacks. This functionality is crucial for post-incident analysis, law enforcement investigations, and the optimization of security strategies.