|Listed in category:
This listing sold on Sat, Sep 14 at 12:07 PM.
Have one to sell?

Military MOLLE II Waist/Butt/Fanny Pack ACU Digital Camo NSN 8465-01-524-7263

US $9.99
Condition:
Used
Out of Stock12 sold
    This one's trending. 12 have already sold.
    People want this. 13 people are watching this.
    Shipping:
    Free USPS Ground Advantage®.
    Located in: Mesa, Arizona, United States
    Delivery:
    Estimated between Tue, Oct 1 and Sat, Oct 5 to 43230
    Delivery time is estimated using our proprietary method which is based on the buyer's proximity to the item location, the shipping service selected, the seller's shipping history, and other factors. Delivery times may vary, especially during peak periods.
    Returns:
    Seller does not accept returns.
    Payments:
          
    Earn up to 5x points when you use your eBay Mastercard®. Learn moreabout earning points with eBay Mastercard

    Shop with confidence

    eBay Money Back Guarantee
    Get the item you ordered or your money back. Learn moreeBay Money Back Guarantee - opens new window or tab
    Seller assumes all responsibility for this listing.
    eBay item number:266821571129

    Item specifics

    Condition
    Used: An item that has been used previously. See the seller’s listing for full details and ...
    Theme
    Militaria
    Original/Reproduction
    Original
    Time Period Manufactured
    2001-Now
    Country/Region of Manufacture
    Unknown
    Modified Item
    No

    Item description from the seller

    jboogie6669

    jboogie6669

    99.4% positive feedback
    8.2K items sold
    Joined Sep 2012

    Detailed seller ratings

    Average for the last 12 months
    Accurate description
    4.9
    Reasonable shipping cost
    5.0
    Shipping speed
    5.0
    Communication
    4.9

    Seller feedback (2,864)

  • r***r (434)- Feedback left by buyer.
    Past month
    Verified purchase
    Cyber Kill Chain is a concept developed by Lockheed Martin that outlines the steps or stages that cyber attackers typically follow to execute a successful attack. This framework is used by cybersecurity professionals to understand the attack lifecycle and to develop strategies for detecting and stopping attacks at various stages
  • e***l (702)- Feedback left by buyer.
    Past month
    Verified purchase
    Great seller! Item was received exactly as described plus fast shipping
  • c***o (70)- Feedback left by buyer.
    Past 6 months
    Verified purchase
    As described.
  • See all feedback