Rogue Start-Up of Robot sweeper
up vote
1
down vote
favorite
I have an Xiaomi Mi robot sweeper and at 7:00:40pm each day it is being started up
by a rogue internet message. I saved the active IP table from the DD-WRT router
firmware immediately before and after several of the startups and have found
the following unique IP remote (foreign) addresses, where the source (local) ip was
that of the sweeper:
52.80.189.157
52.80.66.219
Is it possible to modify the firewall in the router's DD-WRT firmware to include all
52.80.xx.xx addresses via the "Command line" input under "administration"?
router dd-wrt
add a comment |
up vote
1
down vote
favorite
I have an Xiaomi Mi robot sweeper and at 7:00:40pm each day it is being started up
by a rogue internet message. I saved the active IP table from the DD-WRT router
firmware immediately before and after several of the startups and have found
the following unique IP remote (foreign) addresses, where the source (local) ip was
that of the sweeper:
52.80.189.157
52.80.66.219
Is it possible to modify the firewall in the router's DD-WRT firmware to include all
52.80.xx.xx addresses via the "Command line" input under "administration"?
router dd-wrt
2
I think you have some XY problem meta.stackexchange.com/questions/66377/what-is-the-xy-problem going on. Why do you think your approach is a good one to solve this problem? Your firewall should be blocking unsolicited connections. Can you disconnect the robot from wifi? What port is the connection coming in on? I suspect that the robot is reaching out to make a connection and the cloud service is telling it to turn on.
– YetAnotherRandomUser
Oct 15 at 22:54
1
Yes, it now appears to be reaching out as I turned off the robot and at that specified time there was nothing incoming. I am now blocking outgoing specific range which includes the noted IPs, namely 52.84.0.0/21.
– jerryt
Oct 16 at 19:33
add a comment |
up vote
1
down vote
favorite
up vote
1
down vote
favorite
I have an Xiaomi Mi robot sweeper and at 7:00:40pm each day it is being started up
by a rogue internet message. I saved the active IP table from the DD-WRT router
firmware immediately before and after several of the startups and have found
the following unique IP remote (foreign) addresses, where the source (local) ip was
that of the sweeper:
52.80.189.157
52.80.66.219
Is it possible to modify the firewall in the router's DD-WRT firmware to include all
52.80.xx.xx addresses via the "Command line" input under "administration"?
router dd-wrt
I have an Xiaomi Mi robot sweeper and at 7:00:40pm each day it is being started up
by a rogue internet message. I saved the active IP table from the DD-WRT router
firmware immediately before and after several of the startups and have found
the following unique IP remote (foreign) addresses, where the source (local) ip was
that of the sweeper:
52.80.189.157
52.80.66.219
Is it possible to modify the firewall in the router's DD-WRT firmware to include all
52.80.xx.xx addresses via the "Command line" input under "administration"?
router dd-wrt
router dd-wrt
asked Oct 15 at 21:51
jerryt
61
61
2
I think you have some XY problem meta.stackexchange.com/questions/66377/what-is-the-xy-problem going on. Why do you think your approach is a good one to solve this problem? Your firewall should be blocking unsolicited connections. Can you disconnect the robot from wifi? What port is the connection coming in on? I suspect that the robot is reaching out to make a connection and the cloud service is telling it to turn on.
– YetAnotherRandomUser
Oct 15 at 22:54
1
Yes, it now appears to be reaching out as I turned off the robot and at that specified time there was nothing incoming. I am now blocking outgoing specific range which includes the noted IPs, namely 52.84.0.0/21.
– jerryt
Oct 16 at 19:33
add a comment |
2
I think you have some XY problem meta.stackexchange.com/questions/66377/what-is-the-xy-problem going on. Why do you think your approach is a good one to solve this problem? Your firewall should be blocking unsolicited connections. Can you disconnect the robot from wifi? What port is the connection coming in on? I suspect that the robot is reaching out to make a connection and the cloud service is telling it to turn on.
– YetAnotherRandomUser
Oct 15 at 22:54
1
Yes, it now appears to be reaching out as I turned off the robot and at that specified time there was nothing incoming. I am now blocking outgoing specific range which includes the noted IPs, namely 52.84.0.0/21.
– jerryt
Oct 16 at 19:33
2
2
I think you have some XY problem meta.stackexchange.com/questions/66377/what-is-the-xy-problem going on. Why do you think your approach is a good one to solve this problem? Your firewall should be blocking unsolicited connections. Can you disconnect the robot from wifi? What port is the connection coming in on? I suspect that the robot is reaching out to make a connection and the cloud service is telling it to turn on.
– YetAnotherRandomUser
Oct 15 at 22:54
I think you have some XY problem meta.stackexchange.com/questions/66377/what-is-the-xy-problem going on. Why do you think your approach is a good one to solve this problem? Your firewall should be blocking unsolicited connections. Can you disconnect the robot from wifi? What port is the connection coming in on? I suspect that the robot is reaching out to make a connection and the cloud service is telling it to turn on.
– YetAnotherRandomUser
Oct 15 at 22:54
1
1
Yes, it now appears to be reaching out as I turned off the robot and at that specified time there was nothing incoming. I am now blocking outgoing specific range which includes the noted IPs, namely 52.84.0.0/21.
– jerryt
Oct 16 at 19:33
Yes, it now appears to be reaching out as I turned off the robot and at that specified time there was nothing incoming. I am now blocking outgoing specific range which includes the noted IPs, namely 52.84.0.0/21.
– jerryt
Oct 16 at 19:33
add a comment |
2 Answers
2
active
oldest
votes
up vote
2
down vote
According to the Amazon page, there is a cloud service available for the vacuum cleaner. Presumably, that's what the app is communicating with. You can also use Alexa with the vacuum cleaner, so there are many places packets might be coming from towards your vacuum.
One of the IPs you listed seems to be a company or part of a university in China, I can't tell which my the whois page.
Searching for that company some more, I found this page, showing that the company might be a datacenter.
So you're either looking at a feature that you or someone else signed up for and forgot about, or known bad IP addresses own your network. It's kind of a crapshoot at this point with the information provided. However, hackers in this day and age would be more interested in using the robot as part of a botnet or Bitcoin miner rather than just pranking you at the same time every day.
There are cloud services that the Xiaomia Mi works with but those IPs identify themselves ok. The two IPs I identified in the original question indicate a hostname of "ec2-52-80-189-157.cn-north-1.compute.amazonaws.com.cn" and "ec2-52-80-66-219.cn-north-1.compute.amazonaws.com.cn" in the Webanalysis site. This evening I will be blocking the vac from accessing 52.84.0.0/21 which includes both sites (and more) to see if it has any affect.
– jerryt
Oct 17 at 0:13
Since the "rogue" startup of the robot only occurs when connected to the internet the brute force solution is to simply deny internet access from 19:00 to 19:01 using a DD-WRT Access Restriction. Will try such this evening (10/17/18).
– jerryt
Oct 17 at 16:15
The deny of access to the internet of the robot vac for one minute at 19:00 worked. Now will to try just blocking specific IP address ranges related to those seen on the IP tables without the deny to get more in depth knowledge of source of "vac start", i.e.,42.62.64.0/18, etc.
– jerryt
Oct 18 at 17:43
Why not disconnect the robot from wifi or reset it to factory default, thereby unlinking it from whatever cloud account you have?
– YetAnotherRandomUser
Oct 18 at 21:39
As I mentioned in my last comment the deny of internet access via DD-WRT from 19:00 to 19:01 did just that when the problem occurs. All other times I need the wifi to operate it remotely using my tablet. It has become clear now that the Amazon related advertising IPs are the culprits.(52.xx.xx.xx & 54.xx.xx.xx). Thanks for the interest.
– jerryt
Oct 20 at 0:52
|
show 1 more comment
up vote
0
down vote
The "Access Restrictions" in DD-WRT make it simple to limit a single address or the whole family of which it is a part, that the robot can contact. The version of DD-WRT referenced is v24-sp2 of (3/25/13) although many other releases likly can do the same. Command line input was not necessary.
Wow! Your first answer was in response to your first and only question — after 42 days! You ought to get an award for that! Seriously, thanks for coming back to update this information. But it would be even better if you made your answer stand-alone. Imagine somebody read just your question and your answer — would it make sense? I don't think so; I think somebody would need to see the other answer and/or the comments. Imagine that they're all gone. Please edit your answer to make it clearer and more complete.
– Scott
Nov 26 at 4:11
add a comment |
2 Answers
2
active
oldest
votes
2 Answers
2
active
oldest
votes
active
oldest
votes
active
oldest
votes
up vote
2
down vote
According to the Amazon page, there is a cloud service available for the vacuum cleaner. Presumably, that's what the app is communicating with. You can also use Alexa with the vacuum cleaner, so there are many places packets might be coming from towards your vacuum.
One of the IPs you listed seems to be a company or part of a university in China, I can't tell which my the whois page.
Searching for that company some more, I found this page, showing that the company might be a datacenter.
So you're either looking at a feature that you or someone else signed up for and forgot about, or known bad IP addresses own your network. It's kind of a crapshoot at this point with the information provided. However, hackers in this day and age would be more interested in using the robot as part of a botnet or Bitcoin miner rather than just pranking you at the same time every day.
There are cloud services that the Xiaomia Mi works with but those IPs identify themselves ok. The two IPs I identified in the original question indicate a hostname of "ec2-52-80-189-157.cn-north-1.compute.amazonaws.com.cn" and "ec2-52-80-66-219.cn-north-1.compute.amazonaws.com.cn" in the Webanalysis site. This evening I will be blocking the vac from accessing 52.84.0.0/21 which includes both sites (and more) to see if it has any affect.
– jerryt
Oct 17 at 0:13
Since the "rogue" startup of the robot only occurs when connected to the internet the brute force solution is to simply deny internet access from 19:00 to 19:01 using a DD-WRT Access Restriction. Will try such this evening (10/17/18).
– jerryt
Oct 17 at 16:15
The deny of access to the internet of the robot vac for one minute at 19:00 worked. Now will to try just blocking specific IP address ranges related to those seen on the IP tables without the deny to get more in depth knowledge of source of "vac start", i.e.,42.62.64.0/18, etc.
– jerryt
Oct 18 at 17:43
Why not disconnect the robot from wifi or reset it to factory default, thereby unlinking it from whatever cloud account you have?
– YetAnotherRandomUser
Oct 18 at 21:39
As I mentioned in my last comment the deny of internet access via DD-WRT from 19:00 to 19:01 did just that when the problem occurs. All other times I need the wifi to operate it remotely using my tablet. It has become clear now that the Amazon related advertising IPs are the culprits.(52.xx.xx.xx & 54.xx.xx.xx). Thanks for the interest.
– jerryt
Oct 20 at 0:52
|
show 1 more comment
up vote
2
down vote
According to the Amazon page, there is a cloud service available for the vacuum cleaner. Presumably, that's what the app is communicating with. You can also use Alexa with the vacuum cleaner, so there are many places packets might be coming from towards your vacuum.
One of the IPs you listed seems to be a company or part of a university in China, I can't tell which my the whois page.
Searching for that company some more, I found this page, showing that the company might be a datacenter.
So you're either looking at a feature that you or someone else signed up for and forgot about, or known bad IP addresses own your network. It's kind of a crapshoot at this point with the information provided. However, hackers in this day and age would be more interested in using the robot as part of a botnet or Bitcoin miner rather than just pranking you at the same time every day.
There are cloud services that the Xiaomia Mi works with but those IPs identify themselves ok. The two IPs I identified in the original question indicate a hostname of "ec2-52-80-189-157.cn-north-1.compute.amazonaws.com.cn" and "ec2-52-80-66-219.cn-north-1.compute.amazonaws.com.cn" in the Webanalysis site. This evening I will be blocking the vac from accessing 52.84.0.0/21 which includes both sites (and more) to see if it has any affect.
– jerryt
Oct 17 at 0:13
Since the "rogue" startup of the robot only occurs when connected to the internet the brute force solution is to simply deny internet access from 19:00 to 19:01 using a DD-WRT Access Restriction. Will try such this evening (10/17/18).
– jerryt
Oct 17 at 16:15
The deny of access to the internet of the robot vac for one minute at 19:00 worked. Now will to try just blocking specific IP address ranges related to those seen on the IP tables without the deny to get more in depth knowledge of source of "vac start", i.e.,42.62.64.0/18, etc.
– jerryt
Oct 18 at 17:43
Why not disconnect the robot from wifi or reset it to factory default, thereby unlinking it from whatever cloud account you have?
– YetAnotherRandomUser
Oct 18 at 21:39
As I mentioned in my last comment the deny of internet access via DD-WRT from 19:00 to 19:01 did just that when the problem occurs. All other times I need the wifi to operate it remotely using my tablet. It has become clear now that the Amazon related advertising IPs are the culprits.(52.xx.xx.xx & 54.xx.xx.xx). Thanks for the interest.
– jerryt
Oct 20 at 0:52
|
show 1 more comment
up vote
2
down vote
up vote
2
down vote
According to the Amazon page, there is a cloud service available for the vacuum cleaner. Presumably, that's what the app is communicating with. You can also use Alexa with the vacuum cleaner, so there are many places packets might be coming from towards your vacuum.
One of the IPs you listed seems to be a company or part of a university in China, I can't tell which my the whois page.
Searching for that company some more, I found this page, showing that the company might be a datacenter.
So you're either looking at a feature that you or someone else signed up for and forgot about, or known bad IP addresses own your network. It's kind of a crapshoot at this point with the information provided. However, hackers in this day and age would be more interested in using the robot as part of a botnet or Bitcoin miner rather than just pranking you at the same time every day.
According to the Amazon page, there is a cloud service available for the vacuum cleaner. Presumably, that's what the app is communicating with. You can also use Alexa with the vacuum cleaner, so there are many places packets might be coming from towards your vacuum.
One of the IPs you listed seems to be a company or part of a university in China, I can't tell which my the whois page.
Searching for that company some more, I found this page, showing that the company might be a datacenter.
So you're either looking at a feature that you or someone else signed up for and forgot about, or known bad IP addresses own your network. It's kind of a crapshoot at this point with the information provided. However, hackers in this day and age would be more interested in using the robot as part of a botnet or Bitcoin miner rather than just pranking you at the same time every day.
answered Oct 15 at 22:52
YetAnotherRandomUser
84831230
84831230
There are cloud services that the Xiaomia Mi works with but those IPs identify themselves ok. The two IPs I identified in the original question indicate a hostname of "ec2-52-80-189-157.cn-north-1.compute.amazonaws.com.cn" and "ec2-52-80-66-219.cn-north-1.compute.amazonaws.com.cn" in the Webanalysis site. This evening I will be blocking the vac from accessing 52.84.0.0/21 which includes both sites (and more) to see if it has any affect.
– jerryt
Oct 17 at 0:13
Since the "rogue" startup of the robot only occurs when connected to the internet the brute force solution is to simply deny internet access from 19:00 to 19:01 using a DD-WRT Access Restriction. Will try such this evening (10/17/18).
– jerryt
Oct 17 at 16:15
The deny of access to the internet of the robot vac for one minute at 19:00 worked. Now will to try just blocking specific IP address ranges related to those seen on the IP tables without the deny to get more in depth knowledge of source of "vac start", i.e.,42.62.64.0/18, etc.
– jerryt
Oct 18 at 17:43
Why not disconnect the robot from wifi or reset it to factory default, thereby unlinking it from whatever cloud account you have?
– YetAnotherRandomUser
Oct 18 at 21:39
As I mentioned in my last comment the deny of internet access via DD-WRT from 19:00 to 19:01 did just that when the problem occurs. All other times I need the wifi to operate it remotely using my tablet. It has become clear now that the Amazon related advertising IPs are the culprits.(52.xx.xx.xx & 54.xx.xx.xx). Thanks for the interest.
– jerryt
Oct 20 at 0:52
|
show 1 more comment
There are cloud services that the Xiaomia Mi works with but those IPs identify themselves ok. The two IPs I identified in the original question indicate a hostname of "ec2-52-80-189-157.cn-north-1.compute.amazonaws.com.cn" and "ec2-52-80-66-219.cn-north-1.compute.amazonaws.com.cn" in the Webanalysis site. This evening I will be blocking the vac from accessing 52.84.0.0/21 which includes both sites (and more) to see if it has any affect.
– jerryt
Oct 17 at 0:13
Since the "rogue" startup of the robot only occurs when connected to the internet the brute force solution is to simply deny internet access from 19:00 to 19:01 using a DD-WRT Access Restriction. Will try such this evening (10/17/18).
– jerryt
Oct 17 at 16:15
The deny of access to the internet of the robot vac for one minute at 19:00 worked. Now will to try just blocking specific IP address ranges related to those seen on the IP tables without the deny to get more in depth knowledge of source of "vac start", i.e.,42.62.64.0/18, etc.
– jerryt
Oct 18 at 17:43
Why not disconnect the robot from wifi or reset it to factory default, thereby unlinking it from whatever cloud account you have?
– YetAnotherRandomUser
Oct 18 at 21:39
As I mentioned in my last comment the deny of internet access via DD-WRT from 19:00 to 19:01 did just that when the problem occurs. All other times I need the wifi to operate it remotely using my tablet. It has become clear now that the Amazon related advertising IPs are the culprits.(52.xx.xx.xx & 54.xx.xx.xx). Thanks for the interest.
– jerryt
Oct 20 at 0:52
There are cloud services that the Xiaomia Mi works with but those IPs identify themselves ok. The two IPs I identified in the original question indicate a hostname of "ec2-52-80-189-157.cn-north-1.compute.amazonaws.com.cn" and "ec2-52-80-66-219.cn-north-1.compute.amazonaws.com.cn" in the Webanalysis site. This evening I will be blocking the vac from accessing 52.84.0.0/21 which includes both sites (and more) to see if it has any affect.
– jerryt
Oct 17 at 0:13
There are cloud services that the Xiaomia Mi works with but those IPs identify themselves ok. The two IPs I identified in the original question indicate a hostname of "ec2-52-80-189-157.cn-north-1.compute.amazonaws.com.cn" and "ec2-52-80-66-219.cn-north-1.compute.amazonaws.com.cn" in the Webanalysis site. This evening I will be blocking the vac from accessing 52.84.0.0/21 which includes both sites (and more) to see if it has any affect.
– jerryt
Oct 17 at 0:13
Since the "rogue" startup of the robot only occurs when connected to the internet the brute force solution is to simply deny internet access from 19:00 to 19:01 using a DD-WRT Access Restriction. Will try such this evening (10/17/18).
– jerryt
Oct 17 at 16:15
Since the "rogue" startup of the robot only occurs when connected to the internet the brute force solution is to simply deny internet access from 19:00 to 19:01 using a DD-WRT Access Restriction. Will try such this evening (10/17/18).
– jerryt
Oct 17 at 16:15
The deny of access to the internet of the robot vac for one minute at 19:00 worked. Now will to try just blocking specific IP address ranges related to those seen on the IP tables without the deny to get more in depth knowledge of source of "vac start", i.e.,42.62.64.0/18, etc.
– jerryt
Oct 18 at 17:43
The deny of access to the internet of the robot vac for one minute at 19:00 worked. Now will to try just blocking specific IP address ranges related to those seen on the IP tables without the deny to get more in depth knowledge of source of "vac start", i.e.,42.62.64.0/18, etc.
– jerryt
Oct 18 at 17:43
Why not disconnect the robot from wifi or reset it to factory default, thereby unlinking it from whatever cloud account you have?
– YetAnotherRandomUser
Oct 18 at 21:39
Why not disconnect the robot from wifi or reset it to factory default, thereby unlinking it from whatever cloud account you have?
– YetAnotherRandomUser
Oct 18 at 21:39
As I mentioned in my last comment the deny of internet access via DD-WRT from 19:00 to 19:01 did just that when the problem occurs. All other times I need the wifi to operate it remotely using my tablet. It has become clear now that the Amazon related advertising IPs are the culprits.(52.xx.xx.xx & 54.xx.xx.xx). Thanks for the interest.
– jerryt
Oct 20 at 0:52
As I mentioned in my last comment the deny of internet access via DD-WRT from 19:00 to 19:01 did just that when the problem occurs. All other times I need the wifi to operate it remotely using my tablet. It has become clear now that the Amazon related advertising IPs are the culprits.(52.xx.xx.xx & 54.xx.xx.xx). Thanks for the interest.
– jerryt
Oct 20 at 0:52
|
show 1 more comment
up vote
0
down vote
The "Access Restrictions" in DD-WRT make it simple to limit a single address or the whole family of which it is a part, that the robot can contact. The version of DD-WRT referenced is v24-sp2 of (3/25/13) although many other releases likly can do the same. Command line input was not necessary.
Wow! Your first answer was in response to your first and only question — after 42 days! You ought to get an award for that! Seriously, thanks for coming back to update this information. But it would be even better if you made your answer stand-alone. Imagine somebody read just your question and your answer — would it make sense? I don't think so; I think somebody would need to see the other answer and/or the comments. Imagine that they're all gone. Please edit your answer to make it clearer and more complete.
– Scott
Nov 26 at 4:11
add a comment |
up vote
0
down vote
The "Access Restrictions" in DD-WRT make it simple to limit a single address or the whole family of which it is a part, that the robot can contact. The version of DD-WRT referenced is v24-sp2 of (3/25/13) although many other releases likly can do the same. Command line input was not necessary.
Wow! Your first answer was in response to your first and only question — after 42 days! You ought to get an award for that! Seriously, thanks for coming back to update this information. But it would be even better if you made your answer stand-alone. Imagine somebody read just your question and your answer — would it make sense? I don't think so; I think somebody would need to see the other answer and/or the comments. Imagine that they're all gone. Please edit your answer to make it clearer and more complete.
– Scott
Nov 26 at 4:11
add a comment |
up vote
0
down vote
up vote
0
down vote
The "Access Restrictions" in DD-WRT make it simple to limit a single address or the whole family of which it is a part, that the robot can contact. The version of DD-WRT referenced is v24-sp2 of (3/25/13) although many other releases likly can do the same. Command line input was not necessary.
The "Access Restrictions" in DD-WRT make it simple to limit a single address or the whole family of which it is a part, that the robot can contact. The version of DD-WRT referenced is v24-sp2 of (3/25/13) although many other releases likly can do the same. Command line input was not necessary.
answered Nov 26 at 3:06
jerryt
61
61
Wow! Your first answer was in response to your first and only question — after 42 days! You ought to get an award for that! Seriously, thanks for coming back to update this information. But it would be even better if you made your answer stand-alone. Imagine somebody read just your question and your answer — would it make sense? I don't think so; I think somebody would need to see the other answer and/or the comments. Imagine that they're all gone. Please edit your answer to make it clearer and more complete.
– Scott
Nov 26 at 4:11
add a comment |
Wow! Your first answer was in response to your first and only question — after 42 days! You ought to get an award for that! Seriously, thanks for coming back to update this information. But it would be even better if you made your answer stand-alone. Imagine somebody read just your question and your answer — would it make sense? I don't think so; I think somebody would need to see the other answer and/or the comments. Imagine that they're all gone. Please edit your answer to make it clearer and more complete.
– Scott
Nov 26 at 4:11
Wow! Your first answer was in response to your first and only question — after 42 days! You ought to get an award for that! Seriously, thanks for coming back to update this information. But it would be even better if you made your answer stand-alone. Imagine somebody read just your question and your answer — would it make sense? I don't think so; I think somebody would need to see the other answer and/or the comments. Imagine that they're all gone. Please edit your answer to make it clearer and more complete.
– Scott
Nov 26 at 4:11
Wow! Your first answer was in response to your first and only question — after 42 days! You ought to get an award for that! Seriously, thanks for coming back to update this information. But it would be even better if you made your answer stand-alone. Imagine somebody read just your question and your answer — would it make sense? I don't think so; I think somebody would need to see the other answer and/or the comments. Imagine that they're all gone. Please edit your answer to make it clearer and more complete.
– Scott
Nov 26 at 4:11
add a comment |
Thanks for contributing an answer to Super User!
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
To learn more, see our tips on writing great answers.
Some of your past answers have not been well-received, and you're in danger of being blocked from answering.
Please pay close attention to the following guidance:
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
To learn more, see our tips on writing great answers.
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsuperuser.com%2fquestions%2f1367083%2frogue-start-up-of-robot-sweeper%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
2
I think you have some XY problem meta.stackexchange.com/questions/66377/what-is-the-xy-problem going on. Why do you think your approach is a good one to solve this problem? Your firewall should be blocking unsolicited connections. Can you disconnect the robot from wifi? What port is the connection coming in on? I suspect that the robot is reaching out to make a connection and the cloud service is telling it to turn on.
– YetAnotherRandomUser
Oct 15 at 22:54
1
Yes, it now appears to be reaching out as I turned off the robot and at that specified time there was nothing incoming. I am now blocking outgoing specific range which includes the noted IPs, namely 52.84.0.0/21.
– jerryt
Oct 16 at 19:33