LILIN DVR508 H.264 Real-Time Full D1 Digital Video Recorder
Technical Specification
- Make: LILIN
- Model code: DVR508
- Channels: 8 channels
- Recording Mode: Real time recording
- Monitor Outputs: 1
LILIN DVR508 H.264 Real-Time Full D1 digital video recorder with bulit-in 3D intellectual motion adoptive refinement and vivid image enhancement engines. It features easy-to use Jog-and-Shuttlebutton operation, HTTP web-based interface including DVR configuration, PTZ control, playback, and live monitoring.
Read more| Make | LILIN |
|---|---|
| Manufacturer | LILIN |
| Category | CCTV>Digital video recorders (DVRs) |
| Model code | DVR508 |
| Channels | 8 channels |
| Recording Mode | Real time recording |
| Monitor Outputs | 1 |
| Inbuilt Multiplexer | Yes |
| Compression Type | H.264 |
| Resolution | 720 x 480 resolution |
| Signal Mode | NTSC |
| IP Storage rate (fps) | 240 fps |
| Physical Specifications |
Dimensions mm: 434 x 411 x 88 Weight kg: 4700 |
| Electrical Specifications |
Voltage: 12 V DC Power Consumption: 60 W |
| Environmental Specifications |
Operating Temp oC: 0 ~ +50 Operating Humidity %: 0 ~ 80 |
| Additional info | LILIN DVR508 H.264 Real-Time Full D1 digital video recorder with bulit-in 3D intellectual motion adoptive refinement and vivid image enhancement engines. It features easy-to use Jog-and-Shuttlebutton operation, HTTP web-based interface including DVR configuration, PTZ control, playback, and live monitoring. |
You might be interested in these products
- See other LILIN products
- LILIN IP Dome cameras
- LILIN IP cameras
- LILIN Dome cameras
- LILIN CCTV cameras
- LILIN Network video recorders (NVRs)
Related Whitepapers
The benefits of Edge AI + Cloud for security systems
Connected video technology for safe cities
Choosing the right storage technology for video surveillance
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download

