Submit project

Fo consider the project complete the form. Private and contact information will hidden.
Your name
Your Email
Project title
Project amount
Project description
Please, be as precise as possible in your descriptions. This will help to avoid misunderstandings and unnecessary clarifications.
Thank you!
We need to fund this campaign ASAP! Get your friends involved
Use this banner on social media
Together, we can achieve great things!
Завдяки вам закриті тисячі запитів для ЗСУ! Маємо продовжувати!

Rapid Response

Situation report as at 6th of March, 2018

The news as at 6th of March: the first 24 hours of “total and unconditional truce” have brought three attacks on the part of the occupiers. All these attacks took place in the day light hours.

One Ukrainian soldier got wounded due to enemy shelling. In a mobile hospital he got assisted to, immediately.

In the Luhansk area, the russian occupational troops shelled Shchastia using 82 mm caliber mortars, automatic grenade launchers and small arms. Near Troitske, the enemy deployed 82 mm caliber machine guns and large caliber guns.

In the Donetsk sector, the enemy shelled Novotroitske using rocket-propelled grenades and small arms.

“If you come closer, I will shoot you.” The SMM OSCE patrol saw an armed terrorist near the temporarily occupied village of Kozatske in Mariupol vicinity. The militant kneeled down and pointed his rifle at the SMM vehicle threatening to open fire. Reacting to their request to lower his rifle and call his superior, the terrorist used hostile language and said, in Russian, “Leave immediately, and if you come closer, I will shoot.” It has been another time that the SMM patrol got prevented from monitoring compliance with the Minsk agreements on the part of Russian militants, because of Russian militants themselves.

Yesterday we informed you about the warning issued by Ukrainian reconnaissance regarding the possibility of provocative shelling on the part of occupiers, and here it is, the first fake news. Over the past 24 hours the AFU troops withhold return fire; nevertheless, the russian State Duma’s member, Alexey Zhuravliov said that he got under mortar attack lead by the Ukrainian army near Donetsk, on the 5th of March, the first day of the truce. Actually, in saying this he failed to confirm the very fact of attack, but instead testified that he crossed the state border in an illegal way through non-controlled checkpoint.

You can bring our victory closer and support the Ukrainian army within the Rapid Response project.

Donate to other projects
Founds raised Purchase in progress

Rapid Response

Quick response to military requests and timely delivery of needed item/s to military positions.

15 300 000 UAH (365 637 USD) needed
95% raised
Read more

Partners

Реквізити ПриватБанку для переказу у гривнях
Миколаївський обласний благодійний фонд “РЕГІОНАЛЬНИЙ ФОНД БЛАГОЧЕСТЯ”
ПАО КБ ПриватБанк
ЄДРПОУ: 36143302
МФО: 305299
IBAN-код: UA343052990000026000011709917
Призначення платежу: Благодійний внесок. “Оперативне реагування”
USD
Beneficiary: Mykolayiv Regional Charitable Foundation “Regional Foundation Blagochestya”
IBANcode: UA583052990000026007011702069
Beneficiary address: UA 54000, Mykolaiv, Buznyka str. 5, 118
Beneficiary bank: Privatbank
50, Naberezhna Peremogy Street, Dnipropetrovsk, 49094, Ukraine
Swift code: PBANUA2X

Intermediary bank: JP Morgan Chase Bank,New York ,USA
Swift code: CHASUS33
Correspondent account: 001-1-000080
Description: Charitable donation for ‘Rapid Response’ project
or
Intermediary bank: The Bank of New York Mellon, New York, USA
Swift code: IRVT US 3N
Correspondent account: 890-0085-754
Description: Charitable donation for ‘Rapid Response’ project
EUR
Beneficiary: Mykolayiv Regional Charitable Foundation “Regional Foundation Blagochestya”
IBANcode: UA703052990000026002041702959
Beneficiary address: UA 54000, Mykolaiv, Buznyka str. 5, 118
Beneficiary bank: Privatbank
50, Naberezhna Peremogy Street, Dnipropetrovsk, 49094, Ukraine
Swift code: PBANUA2X

Intermediary bank: Commerzbank AG ,Frankfurt am Main, Germany
Swift code: COBADEFF
Correspondent account: 400886700401
Description: Charitable donation for ‘Rapid Response’ project
PLZ
Beneficiary: Mykolayiv Regional Charitable Foundation "Regional Foundation Blagochestya"
IBAN Code: UA363052990000026006001705679
Name of the bank: JSC CB "PRIVATBANK", 1D HRUSHEVSKOHO STR., KYIV, 01001, UKRAINE
Bank SWIFT Code: PBANUA2X
Beneficiary address: UA 54000, Mykolaiv, Buznyka str. 5, 118
CORRESPONDENT BANK: Bank Pekao/Grupa Pekao S.A., Warsaw, Poland
Account in the correspondent bank: PL13124000013140533111120301
SWIFT Code of the correspondent bank: PKOPPLPW
Description: Charitable donation for "Rapid Response" project.
GBP
Beneficiary: Mykolayiv Regional Charitable Foundation “Regional Foundation Blagochestya”
IBANcode: UA583052990000026007011702069
Beneficiary address: UA 54000, Mykolaiv, Buznyka str. 5, 118
Beneficiary bank: Privatbank
50, Naberezhna Peremogy Street, Dnipropetrovsk, 49094, Ukraine
Swift code: PBANUA2X

Intermediary bank: JP Morgan Chase Bank,New York ,USA
Swift code: CHASUS33
Correspondent account: 001-1-000080
Description: Charitable donation for ‘Rapid Response’ project
or
Intermediary bank: The Bank of New York Mellon, New York, USA
Swift code: IRVT US 3N
Correspondent account: 890-0085-754
Description: Charitable donation for ‘Rapid Response’ project

Press about us