HIMARS strikes at Russian military formation in Zaporizhzhia

HIMARS strikes at Russian military formation in Zaporizhzhia
M142 HIMARS. Photo from open sources

An artillery unit of the Armed Forces of Ukraine launched a HIMARS strike on a cluster of Russian troops.

The video of the attack was published on the Rotten Cherry Telegram channel.

Artillerymen of the 15th Separate Artillery Reconnaissance Brigade, who aimed the rocket system at the coordinates received from a reconnaissance drone, performed the strike.

An aerial reconnaissance drone of the 128th Separate Mountain Assault Brigade transmitted the coordinates for adjusting the fire.

The first strike of three HIMARS missiles hit a group of Russian soldiers, which consisted of about 30-40 men. After the missiles reached the target, none of the soldiers showed signs of life.

According to the original source of the video, the total Russian losses as a result of this strike came up to over 20 dead.

The second strike took place during the evacuation of the wounded and the collection of the bodies of the dead Russian military. The enemy used one truck, five civilian vehicles, and an evacuation team for the evacuation.

The strike was caused by a cluster munition, which hit the evacuation group along with the vehicles.

The incident occurred near the village of Tavria, Vasylivka district, Zaporizhzhia region. Coordinates of the impact site: 47.35176009440257, 35.54769932768806.

Militarnyi previously reported that in September 2024, Ukrainian defenders struck a training ground with the Russian invaders near Donetsk.

This training ground is located near the Donetsk ring road near the temporarily occupied city, about 25 kilometers from the front line.

“Dozens of dead” are reported, namely about 50 invaders, but this information is unconfirmed.

Share this post:

SUPPORT MILITARNYI

PrivatBank ( Bank card )
5169 3351 0164 7408
Bank Account in UAH (IBAN)
UA043052990000026007015028783
BTC
bc1qg0z99m95fte7kj8faa7h2kvnq92wvc53exe8gm
USDT
0x8676644fA7B6d328310283cAC1065Ae01d97CEe7
ETH
0xfD02863D3289416fcF50975c9DFda13623f97758
Popular
Button Text