LoTW users list

 

by HB9BZA

 

XW3DT (Laos) is current
DXCC entity #339 on LoTW!
(was #340 before MVI deletion)
Only Mount Athos is still missing
WANTED: lotwreport.adi files
(details are on my "How to help" page)
Already sent it monthes ago?
Why not submitting an update now?

 

LoTW users list (73,973 calls in 339 current DXCC entities - updated on 23-JUL-2014)

 
 Please note there will be no updates between July 27th and August 3rd 
 
Full list
Text (5 calls/line)
Users by country: USA
HTML
Countries not on LoTW
HTML
MS Access and SQLite3 files
on  WD5EAE's site
Full list, for RXCLUS
Text (1 call/line, no rem's)
Users by country: DX
HTML
Users count by country
HTML
Lists with last upload dates
on WD5EAE's site


Please note this is not an official list, as the ARRL never considered releasing such a list as useful. This is a compilation of information from many sources, including the DX-Cluster, DX bulletins, WEB sites and files received from other LoTW users. If you would like to help making this list even bigger, then your file of callsigns you got LoTW credits from is very welcome (see the "How to help" page).

I hope this list will encourage other hams to use the LoTW system by showing them that almost all current DXCC entities, including very rare ones (Ducie Is, Heard Is, North Korea,...), can already be credited for the DXCC with this system! Confirmations via LoTW can also be received in incredibly short times. As an example, I worked 3A2MW one day at 1852Z, uploaded my log just after this contact and he did the same at 1928Z. Result: a QSL in 36 minutes!!!

Another purpose of this list was to integrate it into my free packet radio/telnet client RXCLUS to make it possible to work more LoTW participants and to get more credits for your DXCC awards! The current version is able to identify LoTW users, import your lotwreport.adi file directly from the ARRL's server and generate alarms based on it. If you are interested, you can get it from my download page.

 

This email address is being protected from spambots. You need JavaScript enabled to view it.