10 km Drone Direction Finding Drone Detector
Introduce
The 10km Drone Direction Finding Drone Detector is a fully integrated solution that combines advanced detection and countermeasure capabilities to quickly identify drone communication links and collect real-time intelligence, including precise location, flight status and trajectory data. Equipped with “Surveillance Data Streaming” functionality, the system enables users to make quick and informed decisions, ensuring an effective and timely response to potential airborne threats.
Parameters
Function |
Description |
||
UAV detection |
Detection spectrum bandwidth |
70 MHZ - 6GHZ |
detection focus on the 433Mhz/ 900Mhz/2.4Ghz/5.2Ghz/5.8Ghz |
Simultaneous screening number of UAV |
≧ 150pcs |
can be customize with 1Ghz -1.4Ghz & 5.1Ghz - 5.9Ghz FPV Bands |
|
The lowest detection height |
≦0 meters |
||
Detection rate: |
≧ 99.99 % |
||
White and Blacklist |
Number of identifiable models |
≧ 400 |
including DJI series drones,and it has the autonomous learning ability |
the accurate identification of target |
Available |
for different targets of the same position, same frequency band, same manufacturer, same type of UAV respectively. |
|
in-depth analysis of UAV signal |
|||
the identification of unique ID |
|||
the black and whitelist to distinguish |
|||
Defensive Interference |
Interferable frequency bands |
900MHz,433Mhz;1.5ghz, 2.4ghz, 5.8ghz; 5.2Ghz |
|
other customized frequency bands |
|||
Remote OAM |
Unattended Mode |
Automatic detection and strike |
|
A variety of OAM features |
Firmware updating |
used with the remote server |
|
Reset, status inquiry |
|||
Self-testing |
|||
Parameter configuration |
|||
Networking |
Multi-device networking |
observe the online/abnormal status of each device |
|
Remote control through mobile terminals |
viewing the operating interface of the device system |
||
receiving alarm information |
|||
viewing the black and whitelist |
|||
turning on defense function |
|||
Data security |
High reliability and security |
certificate management and data encryption |
|
Detail Pictures
Below the device, there are a total of five interfaces, each corresponding to: