Dahua 5MP 2.8mm 30m IR Vandal Dome

SKU: D-IPC-HDBW2531EP-S-2.8-S2

Explore the Dahua 5MP Vandal Dome Camera at IC Plus. This camera features a 2.8mm lens, 30m IR range, and more. Visit www.ic.plus for details




Listed for Support Purposes Only

 Dahua Technology

With upgraded H.265 encoding technology, Dahua Lite series network camera has efficient video encoding capacity, which saves bandwidth and storage space. This camera adopts the latest starlight technology and displays better color image in the condition of low illumination. It supports SD card storage, dust-proof function, waterproof function and vandal-proof function, complying with the standards of IP67 and IK10


Features:

  • 5MP, 1/2.7” CMOS image sensor, low illuminance, high image definition 
  • Outputs max. 5MP (2592 × 1944) @20 fps, and supports 2688 ×1520 (2688 × 1520) @25/30 fps 
  • H.265 codec, high compression rate, ultra-low bit rate 
  • Built-in IR LED, max IR distance: 30 m 
  • 2.8mm Fixed Lens
  • ROI, SMART H.264+/H.265+, flexible coding, applicable to various bandwidth and storage environments 
  • Rotation mode, WDR, 3D NR, HLC, BLC, digital watermarking, applicable to various monitoring scenes 
  • Intelligent detection: Intrusion, tripwire 
  • Abnormality detection: Motion detection, video tampering, no SD card, SD card full, SD card error, network disconnected, IP conflict, illegal access, voltage detection 
  • Supports max. 256 GB Micro SD card 
  • 12V DC/PoE power supply 
  • IP67, IK10 protection

Smart H.265+ & Smart H.264+ 
With advanced scene-adaptive rate control algorithm, Dahua smart encoding technology realizes the higher encoding efficiency than H.265 and H.264, provides high-quality video, and reduces the cost of storage and transmission.

Starlight 
With advanced image processing technology and optical technology, Dahua Starlight technology can provide clear colorful video in the environment of low illuminance. It widely applies to various environments of low illuminance.

Cyber Security 
Dahua network camera is equipped with a series of key security technologies, such as security authentication and authorization, access control, trusted protection, encrypted transmission, and encrypted storage, which improve its security defense and data protection, and prevent malicious programs from invading the device.


Sign up for our newsletter

We only use your email address to add you to our mailing list for receiving our newsletters(monthly). This information is only kept in our mailing list and not for any other purposes than for contacting you with our newsletters.

Thank you for your submission! You will hear from us soon.