Hexagonal Nickel Plated Brass Screw Plugs NPT1/2

Product Details
Customization: Available
Certification: CCC, RoHS, ISO, CE
Surface Treatment: Nickel Plated
Still deciding? Get samples of US$ 2/Piece
Request Sample
Diamond Member Since 2022

Suppliers with verified business licenses

Audited Supplier

Audited by an independent third-party inspection agency

Management System Certification
ISO 9001
  • Hexagonal Nickel Plated Brass Screw Plugs NPT1/2
  • Hexagonal Nickel Plated Brass Screw Plugs NPT1/2
  • Hexagonal Nickel Plated Brass Screw Plugs NPT1/2
  • Hexagonal Nickel Plated Brass Screw Plugs NPT1/2
  • Hexagonal Nickel Plated Brass Screw Plugs NPT1/2
  • Hexagonal Nickel Plated Brass Screw Plugs NPT1/2
Find Similar Products
  • Overview
  • Product Description
Overview

Basic Info.

Model NO.
NPT1/2
Material
Brass
Type
Hexagonal
Thread
NPT1/2
Thread Length
10mm
Spaner Size
15mm
Packing
20PCS/Bag
Transport Package
Plastic Bag with Standard Cartons
Specification
npt1/2
Origin
China
Production Capacity
1000PCS/Day

Product Description

Product Description

Ex-proof hex blind plugs


Material: SS304  SS316

Protection Degree: IP68

Ex-proof degree: EXD IIC GB

Production function: Fill the excess holes on the device to prevent water and dust from entering the device
Thread size Thickness (mm) Thread length (mm) Spanner size(mm)
PG7 3 8 14
PG9 3 8 19
PG11 3 8 22
PG13.5 3 8 24
PG16 4 9 26
PG21 4 9 32
PG29 5 12 46
PG36 5 12 55
PG48 5 12 60
Hexagonal Nickel Plated Brass Screw Plugs NPT1/2
Hexagonal Nickel Plated Brass Screw Plugs NPT1/2
Hexagonal Nickel Plated Brass Screw Plugs NPT1/2 
Hexagonal Nickel Plated Brass Screw Plugs NPT1/2
Hexagonal Nickel Plated Brass Screw Plugs NPT1/2
Hexagonal Nickel Plated Brass Screw Plugs NPT1/2Hexagonal Nickel Plated Brass Screw Plugs NPT1/2Hexagonal Nickel Plated Brass Screw Plugs NPT1/2

Send your message to this supplier

*From:
*To:
*Message:

Enter between 20 to 4,000 characters.

This is not what you are looking for? Post a Sourcing Request Now
Contact Supplier
Product Groups