A total of 322 recevied packets have been found for station/object HB9FDY between 07/04/2025 2:17:10 AM+00:00 and 07/07/2025 2:17:10 AM+00:00.
Request took 0.015 seconds to find in our database.
Packet history is available for up to 3 days. Sign up for a free account to view 30 up to days history. Use [>] to decode with our packet packet decoder tool.
Displaying 1 - 25 of 322 packets.
[>] 07/07/2025 2:04:06 AM+00:00:
DB0FRB>APRX29,TCPIP*,qAC,T2KA:;HB9FDY *111111z4732.86N/00745.96Ey
[>] 07/07/2025 1:50:26 AM+00:00:
DB0FRB>APRX29,TCPIP*,qAC,T2KA:;HB9FDY *111111z4732.86N/00745.96Ey
[>] 07/07/2025 1:36:51 AM+00:00:
DB0FRB>APRX29,TCPIP*,qAC,T2KA:;HB9FDY *111111z4732.86N/00745.96Ey
[>] 07/07/2025 1:23:42 AM+00:00:
DB0FRB>APRX29,TCPIP*,qAC,T2KA:;HB9FDY *111111z4732.86N/00745.96Ey
[>] 07/07/2025 1:09:56 AM+00:00:
DB0FRB>APRX29,TCPIP*,qAC,T2KA:;HB9FDY *111111z4732.86N/00745.96Ey
[>] 07/07/2025 12:56:01 AM+00:00:
DB0FRB>APRX29,TCPIP*,qAC,T2KA:;HB9FDY *111111z4732.86N/00745.96Ey
[>] 07/07/2025 12:42:41 AM+00:00:
DB0FRB>APRX29,TCPIP*,qAC,T2KA:;HB9FDY *111111z4732.86N/00745.96Ey
[>] 07/07/2025 12:29:06 AM+00:00:
DB0FRB>APRX29,TCPIP*,qAC,T2KA:;HB9FDY *111111z4732.86N/00745.96Ey
[>] 07/07/2025 12:15:30 AM+00:00:
DB0FRB>APRX29,TCPIP*,qAC,T2KA:;HB9FDY *111111z4732.86N/00745.96Ey
[>] 07/07/2025 12:02:06 AM+00:00:
DB0FRB>APRX29,TCPIP*,qAC,T2KA:;HB9FDY *111111z4732.86N/00745.96Ey
[>] 07/06/2025 11:48:51 PM+00:00:
DB0FRB>APRX29,TCPIP*,qAC,T2KA:;HB9FDY *111111z4732.86N/00745.96Ey
[>] 07/06/2025 11:35:16 PM+00:00:
DB0FRB>APRX29,TCPIP*,qAC,T2KA:;HB9FDY *111111z4732.86N/00745.96Ey
[>] 07/06/2025 11:21:21 PM+00:00:
DB0FRB>APRX29,TCPIP*,qAC,T2KA:;HB9FDY *111111z4732.86N/00745.96Ey
[>] 07/06/2025 11:08:11 PM+00:00:
DB0FRB>APRX29,TCPIP*,qAC,T2KA:;HB9FDY *111111z4732.86N/00745.96Ey
[>] 07/06/2025 10:54:46 PM+00:00:
DB0FRB>APRX29,TCPIP*,qAC,T2KA:;HB9FDY *111111z4732.86N/00745.96Ey
[>] 07/06/2025 10:40:57 PM+00:00:
DB0FRB>APRX29,TCPIP*,qAC,T2KA:;HB9FDY *111111z4732.86N/00745.96Ey
[>] 07/06/2025 10:27:42 PM+00:00:
DB0FRB>APRX29,TCPIP*,qAC,T2KA:;HB9FDY *111111z4732.86N/00745.96Ey
[>] 07/06/2025 10:13:51 PM+00:00:
DB0FRB>APRX29,TCPIP*,qAC,T2KA:;HB9FDY *111111z4732.86N/00745.96Ey
[>] 07/06/2025 10:00:21 PM+00:00:
DB0FRB>APRX29,TCPIP*,qAC,T2KA:;HB9FDY *111111z4732.86N/00745.96Ey
[>] 07/06/2025 9:46:51 PM+00:00:
DB0FRB>APRX29,TCPIP*,qAC,T2KA:;HB9FDY *111111z4732.86N/00745.96Ey
[>] 07/06/2025 9:33:22 PM+00:00:
DB0FRB>APRX29,TCPIP*,qAC,T2KA:;HB9FDY *111111z4732.86N/00745.96Ey
[>] 07/06/2025 9:20:21 PM+00:00:
DB0FRB>APRX29,TCPIP*,qAC,T2KA:;HB9FDY *111111z4732.86N/00745.96Ey
[>] 07/06/2025 9:07:06 PM+00:00:
DB0FRB>APRX29,TCPIP*,qAC,T2KA:;HB9FDY *111111z4732.86N/00745.96Ey
[>] 07/06/2025 8:53:21 PM+00:00:
DB0FRB>APRX29,TCPIP*,qAC,T2KA:;HB9FDY *111111z4732.86N/00745.96Ey
[>] 07/06/2025 8:39:56 PM+00:00:
DB0FRB>APRX29,TCPIP*,qAC,T2KA:;HB9FDY *111111z4732.86N/00745.96Ey
* If you compare the raw packets with similar data from other websites it may differ (especially the path), the reason is that we are not collecting packets from the same APRS-IS servers. Each APRS-IS server performes duplicate filtering, and which packet that is considered to be a duplicate may differ depending on which APRS-IS server you receive your data from.