Shenzhen Polaris Security Technology Co., Ltd.

Manufacturer from China
Verified Supplier
1 Years
Home / Products / Fixed Drone Detector /

5-10km Range Fixed Drone Detection Equipment With Full Band Coverage

Contact Now
Shenzhen Polaris Security Technology Co., Ltd.
Visit Website
City:shenzhen
Province/State:guangdong
Country/Region:china
Contact Person:MrLeo
Contact Now

5-10km Range Fixed Drone Detection Equipment With Full Band Coverage

Ask Latest Price
Video Channel
Brand Name :Polaris
Model Number :Hobit N2
Certification :CE,ISO9002
Place of Origin :Shenzhen,China
MOQ :1
Price :31999-45999 USD
Payment Terms :T/T, Paypal , Etc.
Supply Ability :50 Pcs/month
Delivery Time :In 7 -14 works day
Packaging Details :Durable case or box
Detect Range :5-10km
Detection Spectrum :70 MHz-6MHz
Size :500*500*680mm
Protection Level :IP65
FPV Detection :300MHz-6.2GHz
Focus Spetrum :433MHz, 868MHz, 915MHz, 2.4GHz, 5.2GHz, 5.8Ghz
more
Contact Now

Add to Cart

Find Similar Videos
View Product Description

Fixed Drone Detector With Full-Band Coverage And Direction Finding Accuracy Of ≤3°

Introduction

This high-precision detection system integrates full-band RF spectrum monitoring​​ (70MHz–6GHz) and multi-sensor fusion to achieve comprehensive drone identification and localization across critical airspace. Combining multi-static interferometry antennas , it delivers 360° azimuth coverage and vertical scanning (-30° to +70°), enabling ≤3° directional accuracy for UAVs as small as 0.01m² RCS. The system employs AI-driven signal fingerprinting to decode drone protocols (e.g., DJI OcuSync, Autel AES), while correlating radar micro-Doppler signatures with optical thermal imaging data to suppress false alarms from birds or environmental clutter with 98.5% reliability Operational capabilities include adaptive full-band jamming targeting GNSS (GPS L1/L2/L5) and control links (2.4GHz/5.8GHz), synchronized with cognitive waveform synthesis to disrupt unauthorized drones while preserving authorized communications. A neuromorphic processing core leverages spiking neural networks (SNNs) to analyze 20TB/hour of multi-sensor data in real time, achieving <1.5-second threat classification and automated countermeasure activation.

Parameters

Function

Descriptions

Drone detection

Detection spectrum bandwidth: 70 MHZ - 6GHZ, detection focus on the 433Mhz, 868Mhz, 915Mhz, 2.4Ghz, 5.2Ghz, 5.8Ghz

FPV Detection:300Mhz-6.2Ghz Analog Signal of FPV Drones

Simultaneous screening number of UAV: 150pcs

The lowest detection height: ≤0 meters

Detection rate: 99.99 %s

Drones Location

For UAVs with Remote ID (China GB42590-2023, US ASTM F3411-22a, EU ASD-STAN PrEN4709-002) and Drone ID (such as DJI Mavic2, Mavic3, air3s, Matrice4, etc., some require network decryption), it can parse detailed information such as drone location and pilot location.

White and Blacklist

The Systemcan identify 400 different model UAV including DJI series drones,and it has the autonomous learning ability.

The Systemcan carry on the accurate identification of target, in-depth analysis of UAV signal, the identification of unique ID, and the black and whitelist to distinguish.

Whitelist and a blacklist can be set for different targets of the same position, same frequency band, same manufacturer, same type of UAV respectively.

Defensive Interference

PS The Systemhas interference capabilities of 900MHz, 433Mhz; 1.5ghz, 2.4ghz, 5.8ghz; 5.2Ghz and other customized frequency bands, and covers most of the UAV communication available in market.

Remote OAM

After turning on the fully self-movable defense, it can enter unattended mode, detect, and strike autonomously. And a variety of OAM features are available when used with the remote server, including firmware updating, resetting, status inquiry, self-testing, parameter configuration, and more.

GPS

The Systemcan detect its current position using its built-in GPS.

Networking

The Systemcan network multiple devices through the cloud server, observe the online/abnormal status of each device, and control the device remotely through the mobile terminal (mobile phone IPAD), including but not limited to viewing the operating interface of the device system, receiving alarm information, viewing the black and whitelist, and turning on defense functions.

Data security

Use certificate management and data encryption between the equipment and server to ensure data reliability and security.

System Initialization

As shown in the figure, we have achieved full-band coverage and the measured results have reached a precision of three percent.

Inquiry Cart 0