February 11 » The assault on Copenhagen by Swedish forces is beaten back with heavy losses.
May 6 » English Restoration: A faction of the British Army removes Richard Cromwell as Lord Protector of the Commonwealth and reinstalls the Rump Parliament.
May 21 » In the Concert of The Hague, the Dutch Republic, the Commonwealth of England and the Kingdom of France set out their views on how the Second Northern War should end.
May 25 » Richard Cromwell resigns as Lord Protector of England following the restoration of the Long Parliament, beginning a second brief period of the republican government called the Commonwealth of England.
November 10 » Chattrapati Shivaji Maharaj, Maratha King kills Afzal Khan, Adilshahi in the battle popularly known as Battle of Pratapgarh.
December 28 » The Marathas defeat the Adilshahi forces in the Battle of Kolhapur.
February 12 » The Convention Parliament declares that the flight to France in 1688 by James II, the last Roman Catholic British monarch, constitutes an abdication.
February 13 » William and Mary are proclaimed co-rulers of England.
April 11 » William III and Mary II are crowned as joint sovereigns of Great Britain.
April 20 » Deposed monarch James II of England lays siege to Derry.
May 24 » The English Parliament passes the Act of Toleration protecting dissenting Protestants but excluding Roman Catholics.
When copying data from this family tree, please include a reference to the origin: Peter Coen, "Coen-Van Impe", database, Genealogy Online (https://www.genealogieonline.nl/coen-worldwide/I10941.php : accessed January 29, 2026), "Jan van Grunderbeeck (1659-????)".
Copy warning
Genealogical publications are copyright protected. Although data is often retrieved from public archives, the searching, interpreting, collecting, selecting and sorting of the data results in a unique product. Copyright protected work may not simply be copied or republished.
Please stick to the following rules
Request permission to copy data or at least inform the author, chances are that the author gives permission, often the contact also leads to more exchange of data.
Do not use this data until you have checked it, preferably at the source (the archives).
State from whom you have copied the data and ideally also his/her original source.