Rogue Start-Up of Robot sweeper











up vote
1
down vote

favorite












I have an Xiaomi Mi robot sweeper and at 7:00:40pm each day it is being started up
by a rogue internet message. I saved the active IP table from the DD-WRT router
firmware immediately before and after several of the startups and have found
the following unique IP remote (foreign) addresses, where the source (local) ip was
that of the sweeper:



52.80.189.157
52.80.66.219



Is it possible to modify the firewall in the router's DD-WRT firmware to include all
52.80.xx.xx addresses via the "Command line" input under "administration"?










share|improve this question


















  • 2




    I think you have some XY problem meta.stackexchange.com/questions/66377/what-is-the-xy-problem going on. Why do you think your approach is a good one to solve this problem? Your firewall should be blocking unsolicited connections. Can you disconnect the robot from wifi? What port is the connection coming in on? I suspect that the robot is reaching out to make a connection and the cloud service is telling it to turn on.
    – YetAnotherRandomUser
    Oct 15 at 22:54






  • 1




    Yes, it now appears to be reaching out as I turned off the robot and at that specified time there was nothing incoming. I am now blocking outgoing specific range which includes the noted IPs, namely 52.84.0.0/21.
    – jerryt
    Oct 16 at 19:33















up vote
1
down vote

favorite












I have an Xiaomi Mi robot sweeper and at 7:00:40pm each day it is being started up
by a rogue internet message. I saved the active IP table from the DD-WRT router
firmware immediately before and after several of the startups and have found
the following unique IP remote (foreign) addresses, where the source (local) ip was
that of the sweeper:



52.80.189.157
52.80.66.219



Is it possible to modify the firewall in the router's DD-WRT firmware to include all
52.80.xx.xx addresses via the "Command line" input under "administration"?










share|improve this question


















  • 2




    I think you have some XY problem meta.stackexchange.com/questions/66377/what-is-the-xy-problem going on. Why do you think your approach is a good one to solve this problem? Your firewall should be blocking unsolicited connections. Can you disconnect the robot from wifi? What port is the connection coming in on? I suspect that the robot is reaching out to make a connection and the cloud service is telling it to turn on.
    – YetAnotherRandomUser
    Oct 15 at 22:54






  • 1




    Yes, it now appears to be reaching out as I turned off the robot and at that specified time there was nothing incoming. I am now blocking outgoing specific range which includes the noted IPs, namely 52.84.0.0/21.
    – jerryt
    Oct 16 at 19:33













up vote
1
down vote

favorite









up vote
1
down vote

favorite











I have an Xiaomi Mi robot sweeper and at 7:00:40pm each day it is being started up
by a rogue internet message. I saved the active IP table from the DD-WRT router
firmware immediately before and after several of the startups and have found
the following unique IP remote (foreign) addresses, where the source (local) ip was
that of the sweeper:



52.80.189.157
52.80.66.219



Is it possible to modify the firewall in the router's DD-WRT firmware to include all
52.80.xx.xx addresses via the "Command line" input under "administration"?










share|improve this question













I have an Xiaomi Mi robot sweeper and at 7:00:40pm each day it is being started up
by a rogue internet message. I saved the active IP table from the DD-WRT router
firmware immediately before and after several of the startups and have found
the following unique IP remote (foreign) addresses, where the source (local) ip was
that of the sweeper:



52.80.189.157
52.80.66.219



Is it possible to modify the firewall in the router's DD-WRT firmware to include all
52.80.xx.xx addresses via the "Command line" input under "administration"?







router dd-wrt






share|improve this question













share|improve this question











share|improve this question




share|improve this question










asked Oct 15 at 21:51









jerryt

61




61








  • 2




    I think you have some XY problem meta.stackexchange.com/questions/66377/what-is-the-xy-problem going on. Why do you think your approach is a good one to solve this problem? Your firewall should be blocking unsolicited connections. Can you disconnect the robot from wifi? What port is the connection coming in on? I suspect that the robot is reaching out to make a connection and the cloud service is telling it to turn on.
    – YetAnotherRandomUser
    Oct 15 at 22:54






  • 1




    Yes, it now appears to be reaching out as I turned off the robot and at that specified time there was nothing incoming. I am now blocking outgoing specific range which includes the noted IPs, namely 52.84.0.0/21.
    – jerryt
    Oct 16 at 19:33














  • 2




    I think you have some XY problem meta.stackexchange.com/questions/66377/what-is-the-xy-problem going on. Why do you think your approach is a good one to solve this problem? Your firewall should be blocking unsolicited connections. Can you disconnect the robot from wifi? What port is the connection coming in on? I suspect that the robot is reaching out to make a connection and the cloud service is telling it to turn on.
    – YetAnotherRandomUser
    Oct 15 at 22:54






  • 1




    Yes, it now appears to be reaching out as I turned off the robot and at that specified time there was nothing incoming. I am now blocking outgoing specific range which includes the noted IPs, namely 52.84.0.0/21.
    – jerryt
    Oct 16 at 19:33








2




2




I think you have some XY problem meta.stackexchange.com/questions/66377/what-is-the-xy-problem going on. Why do you think your approach is a good one to solve this problem? Your firewall should be blocking unsolicited connections. Can you disconnect the robot from wifi? What port is the connection coming in on? I suspect that the robot is reaching out to make a connection and the cloud service is telling it to turn on.
– YetAnotherRandomUser
Oct 15 at 22:54




I think you have some XY problem meta.stackexchange.com/questions/66377/what-is-the-xy-problem going on. Why do you think your approach is a good one to solve this problem? Your firewall should be blocking unsolicited connections. Can you disconnect the robot from wifi? What port is the connection coming in on? I suspect that the robot is reaching out to make a connection and the cloud service is telling it to turn on.
– YetAnotherRandomUser
Oct 15 at 22:54




1




1




Yes, it now appears to be reaching out as I turned off the robot and at that specified time there was nothing incoming. I am now blocking outgoing specific range which includes the noted IPs, namely 52.84.0.0/21.
– jerryt
Oct 16 at 19:33




Yes, it now appears to be reaching out as I turned off the robot and at that specified time there was nothing incoming. I am now blocking outgoing specific range which includes the noted IPs, namely 52.84.0.0/21.
– jerryt
Oct 16 at 19:33










2 Answers
2






active

oldest

votes

















up vote
2
down vote













According to the Amazon page, there is a cloud service available for the vacuum cleaner. Presumably, that's what the app is communicating with. You can also use Alexa with the vacuum cleaner, so there are many places packets might be coming from towards your vacuum.



One of the IPs you listed seems to be a company or part of a university in China, I can't tell which my the whois page.



Searching for that company some more, I found this page, showing that the company might be a datacenter.



So you're either looking at a feature that you or someone else signed up for and forgot about, or known bad IP addresses own your network. It's kind of a crapshoot at this point with the information provided. However, hackers in this day and age would be more interested in using the robot as part of a botnet or Bitcoin miner rather than just pranking you at the same time every day.






share|improve this answer





















  • There are cloud services that the Xiaomia Mi works with but those IPs identify themselves ok. The two IPs I identified in the original question indicate a hostname of "ec2-52-80-189-157.cn-north-1.compute.amazonaws.com.cn" and "ec2-52-80-66-219.cn-north-1.compute.amazonaws.com.cn" in the Webanalysis site. This evening I will be blocking the vac from accessing 52.84.0.0/21 which includes both sites (and more) to see if it has any affect.
    – jerryt
    Oct 17 at 0:13










  • Since the "rogue" startup of the robot only occurs when connected to the internet the brute force solution is to simply deny internet access from 19:00 to 19:01 using a DD-WRT Access Restriction. Will try such this evening (10/17/18).
    – jerryt
    Oct 17 at 16:15










  • The deny of access to the internet of the robot vac for one minute at 19:00 worked. Now will to try just blocking specific IP address ranges related to those seen on the IP tables without the deny to get more in depth knowledge of source of "vac start", i.e.,42.62.64.0/18, etc.
    – jerryt
    Oct 18 at 17:43










  • Why not disconnect the robot from wifi or reset it to factory default, thereby unlinking it from whatever cloud account you have?
    – YetAnotherRandomUser
    Oct 18 at 21:39










  • As I mentioned in my last comment the deny of internet access via DD-WRT from 19:00 to 19:01 did just that when the problem occurs. All other times I need the wifi to operate it remotely using my tablet. It has become clear now that the Amazon related advertising IPs are the culprits.(52.xx.xx.xx & 54.xx.xx.xx). Thanks for the interest.
    – jerryt
    Oct 20 at 0:52


















up vote
0
down vote













The "Access Restrictions" in DD-WRT make it simple to limit a single address or the whole family of which it is a part, that the robot can contact. The version of DD-WRT referenced is v24-sp2 of (3/25/13) although many other releases likly can do the same. Command line input was not necessary.






share|improve this answer





















  • Wow! Your first answer was in response to your first and only question — after 42 days! You ought to get an award for that! Seriously, thanks for coming back to update this information. But it would be even better if you made your answer stand-alone. Imagine somebody read just your question and your answer — would it make sense? I don't think so; I think somebody would need to see the other answer and/or the comments. Imagine that they're all gone. Please edit your answer to make it clearer and more complete.
    – Scott
    Nov 26 at 4:11











Your Answer








StackExchange.ready(function() {
var channelOptions = {
tags: "".split(" "),
id: "3"
};
initTagRenderer("".split(" "), "".split(" "), channelOptions);

StackExchange.using("externalEditor", function() {
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled) {
StackExchange.using("snippets", function() {
createEditor();
});
}
else {
createEditor();
}
});

function createEditor() {
StackExchange.prepareEditor({
heartbeatType: 'answer',
convertImagesToLinks: true,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: 10,
bindNavPrevention: true,
postfix: "",
imageUploader: {
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
},
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
});


}
});














draft saved

draft discarded


















StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsuperuser.com%2fquestions%2f1367083%2frogue-start-up-of-robot-sweeper%23new-answer', 'question_page');
}
);

Post as a guest















Required, but never shown

























2 Answers
2






active

oldest

votes








2 Answers
2






active

oldest

votes









active

oldest

votes






active

oldest

votes








up vote
2
down vote













According to the Amazon page, there is a cloud service available for the vacuum cleaner. Presumably, that's what the app is communicating with. You can also use Alexa with the vacuum cleaner, so there are many places packets might be coming from towards your vacuum.



One of the IPs you listed seems to be a company or part of a university in China, I can't tell which my the whois page.



Searching for that company some more, I found this page, showing that the company might be a datacenter.



So you're either looking at a feature that you or someone else signed up for and forgot about, or known bad IP addresses own your network. It's kind of a crapshoot at this point with the information provided. However, hackers in this day and age would be more interested in using the robot as part of a botnet or Bitcoin miner rather than just pranking you at the same time every day.






share|improve this answer





















  • There are cloud services that the Xiaomia Mi works with but those IPs identify themselves ok. The two IPs I identified in the original question indicate a hostname of "ec2-52-80-189-157.cn-north-1.compute.amazonaws.com.cn" and "ec2-52-80-66-219.cn-north-1.compute.amazonaws.com.cn" in the Webanalysis site. This evening I will be blocking the vac from accessing 52.84.0.0/21 which includes both sites (and more) to see if it has any affect.
    – jerryt
    Oct 17 at 0:13










  • Since the "rogue" startup of the robot only occurs when connected to the internet the brute force solution is to simply deny internet access from 19:00 to 19:01 using a DD-WRT Access Restriction. Will try such this evening (10/17/18).
    – jerryt
    Oct 17 at 16:15










  • The deny of access to the internet of the robot vac for one minute at 19:00 worked. Now will to try just blocking specific IP address ranges related to those seen on the IP tables without the deny to get more in depth knowledge of source of "vac start", i.e.,42.62.64.0/18, etc.
    – jerryt
    Oct 18 at 17:43










  • Why not disconnect the robot from wifi or reset it to factory default, thereby unlinking it from whatever cloud account you have?
    – YetAnotherRandomUser
    Oct 18 at 21:39










  • As I mentioned in my last comment the deny of internet access via DD-WRT from 19:00 to 19:01 did just that when the problem occurs. All other times I need the wifi to operate it remotely using my tablet. It has become clear now that the Amazon related advertising IPs are the culprits.(52.xx.xx.xx & 54.xx.xx.xx). Thanks for the interest.
    – jerryt
    Oct 20 at 0:52















up vote
2
down vote













According to the Amazon page, there is a cloud service available for the vacuum cleaner. Presumably, that's what the app is communicating with. You can also use Alexa with the vacuum cleaner, so there are many places packets might be coming from towards your vacuum.



One of the IPs you listed seems to be a company or part of a university in China, I can't tell which my the whois page.



Searching for that company some more, I found this page, showing that the company might be a datacenter.



So you're either looking at a feature that you or someone else signed up for and forgot about, or known bad IP addresses own your network. It's kind of a crapshoot at this point with the information provided. However, hackers in this day and age would be more interested in using the robot as part of a botnet or Bitcoin miner rather than just pranking you at the same time every day.






share|improve this answer





















  • There are cloud services that the Xiaomia Mi works with but those IPs identify themselves ok. The two IPs I identified in the original question indicate a hostname of "ec2-52-80-189-157.cn-north-1.compute.amazonaws.com.cn" and "ec2-52-80-66-219.cn-north-1.compute.amazonaws.com.cn" in the Webanalysis site. This evening I will be blocking the vac from accessing 52.84.0.0/21 which includes both sites (and more) to see if it has any affect.
    – jerryt
    Oct 17 at 0:13










  • Since the "rogue" startup of the robot only occurs when connected to the internet the brute force solution is to simply deny internet access from 19:00 to 19:01 using a DD-WRT Access Restriction. Will try such this evening (10/17/18).
    – jerryt
    Oct 17 at 16:15










  • The deny of access to the internet of the robot vac for one minute at 19:00 worked. Now will to try just blocking specific IP address ranges related to those seen on the IP tables without the deny to get more in depth knowledge of source of "vac start", i.e.,42.62.64.0/18, etc.
    – jerryt
    Oct 18 at 17:43










  • Why not disconnect the robot from wifi or reset it to factory default, thereby unlinking it from whatever cloud account you have?
    – YetAnotherRandomUser
    Oct 18 at 21:39










  • As I mentioned in my last comment the deny of internet access via DD-WRT from 19:00 to 19:01 did just that when the problem occurs. All other times I need the wifi to operate it remotely using my tablet. It has become clear now that the Amazon related advertising IPs are the culprits.(52.xx.xx.xx & 54.xx.xx.xx). Thanks for the interest.
    – jerryt
    Oct 20 at 0:52













up vote
2
down vote










up vote
2
down vote









According to the Amazon page, there is a cloud service available for the vacuum cleaner. Presumably, that's what the app is communicating with. You can also use Alexa with the vacuum cleaner, so there are many places packets might be coming from towards your vacuum.



One of the IPs you listed seems to be a company or part of a university in China, I can't tell which my the whois page.



Searching for that company some more, I found this page, showing that the company might be a datacenter.



So you're either looking at a feature that you or someone else signed up for and forgot about, or known bad IP addresses own your network. It's kind of a crapshoot at this point with the information provided. However, hackers in this day and age would be more interested in using the robot as part of a botnet or Bitcoin miner rather than just pranking you at the same time every day.






share|improve this answer












According to the Amazon page, there is a cloud service available for the vacuum cleaner. Presumably, that's what the app is communicating with. You can also use Alexa with the vacuum cleaner, so there are many places packets might be coming from towards your vacuum.



One of the IPs you listed seems to be a company or part of a university in China, I can't tell which my the whois page.



Searching for that company some more, I found this page, showing that the company might be a datacenter.



So you're either looking at a feature that you or someone else signed up for and forgot about, or known bad IP addresses own your network. It's kind of a crapshoot at this point with the information provided. However, hackers in this day and age would be more interested in using the robot as part of a botnet or Bitcoin miner rather than just pranking you at the same time every day.







share|improve this answer












share|improve this answer



share|improve this answer










answered Oct 15 at 22:52









YetAnotherRandomUser

84831230




84831230












  • There are cloud services that the Xiaomia Mi works with but those IPs identify themselves ok. The two IPs I identified in the original question indicate a hostname of "ec2-52-80-189-157.cn-north-1.compute.amazonaws.com.cn" and "ec2-52-80-66-219.cn-north-1.compute.amazonaws.com.cn" in the Webanalysis site. This evening I will be blocking the vac from accessing 52.84.0.0/21 which includes both sites (and more) to see if it has any affect.
    – jerryt
    Oct 17 at 0:13










  • Since the "rogue" startup of the robot only occurs when connected to the internet the brute force solution is to simply deny internet access from 19:00 to 19:01 using a DD-WRT Access Restriction. Will try such this evening (10/17/18).
    – jerryt
    Oct 17 at 16:15










  • The deny of access to the internet of the robot vac for one minute at 19:00 worked. Now will to try just blocking specific IP address ranges related to those seen on the IP tables without the deny to get more in depth knowledge of source of "vac start", i.e.,42.62.64.0/18, etc.
    – jerryt
    Oct 18 at 17:43










  • Why not disconnect the robot from wifi or reset it to factory default, thereby unlinking it from whatever cloud account you have?
    – YetAnotherRandomUser
    Oct 18 at 21:39










  • As I mentioned in my last comment the deny of internet access via DD-WRT from 19:00 to 19:01 did just that when the problem occurs. All other times I need the wifi to operate it remotely using my tablet. It has become clear now that the Amazon related advertising IPs are the culprits.(52.xx.xx.xx & 54.xx.xx.xx). Thanks for the interest.
    – jerryt
    Oct 20 at 0:52


















  • There are cloud services that the Xiaomia Mi works with but those IPs identify themselves ok. The two IPs I identified in the original question indicate a hostname of "ec2-52-80-189-157.cn-north-1.compute.amazonaws.com.cn" and "ec2-52-80-66-219.cn-north-1.compute.amazonaws.com.cn" in the Webanalysis site. This evening I will be blocking the vac from accessing 52.84.0.0/21 which includes both sites (and more) to see if it has any affect.
    – jerryt
    Oct 17 at 0:13










  • Since the "rogue" startup of the robot only occurs when connected to the internet the brute force solution is to simply deny internet access from 19:00 to 19:01 using a DD-WRT Access Restriction. Will try such this evening (10/17/18).
    – jerryt
    Oct 17 at 16:15










  • The deny of access to the internet of the robot vac for one minute at 19:00 worked. Now will to try just blocking specific IP address ranges related to those seen on the IP tables without the deny to get more in depth knowledge of source of "vac start", i.e.,42.62.64.0/18, etc.
    – jerryt
    Oct 18 at 17:43










  • Why not disconnect the robot from wifi or reset it to factory default, thereby unlinking it from whatever cloud account you have?
    – YetAnotherRandomUser
    Oct 18 at 21:39










  • As I mentioned in my last comment the deny of internet access via DD-WRT from 19:00 to 19:01 did just that when the problem occurs. All other times I need the wifi to operate it remotely using my tablet. It has become clear now that the Amazon related advertising IPs are the culprits.(52.xx.xx.xx & 54.xx.xx.xx). Thanks for the interest.
    – jerryt
    Oct 20 at 0:52
















There are cloud services that the Xiaomia Mi works with but those IPs identify themselves ok. The two IPs I identified in the original question indicate a hostname of "ec2-52-80-189-157.cn-north-1.compute.amazonaws.com.cn" and "ec2-52-80-66-219.cn-north-1.compute.amazonaws.com.cn" in the Webanalysis site. This evening I will be blocking the vac from accessing 52.84.0.0/21 which includes both sites (and more) to see if it has any affect.
– jerryt
Oct 17 at 0:13




There are cloud services that the Xiaomia Mi works with but those IPs identify themselves ok. The two IPs I identified in the original question indicate a hostname of "ec2-52-80-189-157.cn-north-1.compute.amazonaws.com.cn" and "ec2-52-80-66-219.cn-north-1.compute.amazonaws.com.cn" in the Webanalysis site. This evening I will be blocking the vac from accessing 52.84.0.0/21 which includes both sites (and more) to see if it has any affect.
– jerryt
Oct 17 at 0:13












Since the "rogue" startup of the robot only occurs when connected to the internet the brute force solution is to simply deny internet access from 19:00 to 19:01 using a DD-WRT Access Restriction. Will try such this evening (10/17/18).
– jerryt
Oct 17 at 16:15




Since the "rogue" startup of the robot only occurs when connected to the internet the brute force solution is to simply deny internet access from 19:00 to 19:01 using a DD-WRT Access Restriction. Will try such this evening (10/17/18).
– jerryt
Oct 17 at 16:15












The deny of access to the internet of the robot vac for one minute at 19:00 worked. Now will to try just blocking specific IP address ranges related to those seen on the IP tables without the deny to get more in depth knowledge of source of "vac start", i.e.,42.62.64.0/18, etc.
– jerryt
Oct 18 at 17:43




The deny of access to the internet of the robot vac for one minute at 19:00 worked. Now will to try just blocking specific IP address ranges related to those seen on the IP tables without the deny to get more in depth knowledge of source of "vac start", i.e.,42.62.64.0/18, etc.
– jerryt
Oct 18 at 17:43












Why not disconnect the robot from wifi or reset it to factory default, thereby unlinking it from whatever cloud account you have?
– YetAnotherRandomUser
Oct 18 at 21:39




Why not disconnect the robot from wifi or reset it to factory default, thereby unlinking it from whatever cloud account you have?
– YetAnotherRandomUser
Oct 18 at 21:39












As I mentioned in my last comment the deny of internet access via DD-WRT from 19:00 to 19:01 did just that when the problem occurs. All other times I need the wifi to operate it remotely using my tablet. It has become clear now that the Amazon related advertising IPs are the culprits.(52.xx.xx.xx & 54.xx.xx.xx). Thanks for the interest.
– jerryt
Oct 20 at 0:52




As I mentioned in my last comment the deny of internet access via DD-WRT from 19:00 to 19:01 did just that when the problem occurs. All other times I need the wifi to operate it remotely using my tablet. It has become clear now that the Amazon related advertising IPs are the culprits.(52.xx.xx.xx & 54.xx.xx.xx). Thanks for the interest.
– jerryt
Oct 20 at 0:52












up vote
0
down vote













The "Access Restrictions" in DD-WRT make it simple to limit a single address or the whole family of which it is a part, that the robot can contact. The version of DD-WRT referenced is v24-sp2 of (3/25/13) although many other releases likly can do the same. Command line input was not necessary.






share|improve this answer





















  • Wow! Your first answer was in response to your first and only question — after 42 days! You ought to get an award for that! Seriously, thanks for coming back to update this information. But it would be even better if you made your answer stand-alone. Imagine somebody read just your question and your answer — would it make sense? I don't think so; I think somebody would need to see the other answer and/or the comments. Imagine that they're all gone. Please edit your answer to make it clearer and more complete.
    – Scott
    Nov 26 at 4:11















up vote
0
down vote













The "Access Restrictions" in DD-WRT make it simple to limit a single address or the whole family of which it is a part, that the robot can contact. The version of DD-WRT referenced is v24-sp2 of (3/25/13) although many other releases likly can do the same. Command line input was not necessary.






share|improve this answer





















  • Wow! Your first answer was in response to your first and only question — after 42 days! You ought to get an award for that! Seriously, thanks for coming back to update this information. But it would be even better if you made your answer stand-alone. Imagine somebody read just your question and your answer — would it make sense? I don't think so; I think somebody would need to see the other answer and/or the comments. Imagine that they're all gone. Please edit your answer to make it clearer and more complete.
    – Scott
    Nov 26 at 4:11













up vote
0
down vote










up vote
0
down vote









The "Access Restrictions" in DD-WRT make it simple to limit a single address or the whole family of which it is a part, that the robot can contact. The version of DD-WRT referenced is v24-sp2 of (3/25/13) although many other releases likly can do the same. Command line input was not necessary.






share|improve this answer












The "Access Restrictions" in DD-WRT make it simple to limit a single address or the whole family of which it is a part, that the robot can contact. The version of DD-WRT referenced is v24-sp2 of (3/25/13) although many other releases likly can do the same. Command line input was not necessary.







share|improve this answer












share|improve this answer



share|improve this answer










answered Nov 26 at 3:06









jerryt

61




61












  • Wow! Your first answer was in response to your first and only question — after 42 days! You ought to get an award for that! Seriously, thanks for coming back to update this information. But it would be even better if you made your answer stand-alone. Imagine somebody read just your question and your answer — would it make sense? I don't think so; I think somebody would need to see the other answer and/or the comments. Imagine that they're all gone. Please edit your answer to make it clearer and more complete.
    – Scott
    Nov 26 at 4:11


















  • Wow! Your first answer was in response to your first and only question — after 42 days! You ought to get an award for that! Seriously, thanks for coming back to update this information. But it would be even better if you made your answer stand-alone. Imagine somebody read just your question and your answer — would it make sense? I don't think so; I think somebody would need to see the other answer and/or the comments. Imagine that they're all gone. Please edit your answer to make it clearer and more complete.
    – Scott
    Nov 26 at 4:11
















Wow! Your first answer was in response to your first and only question — after 42 days! You ought to get an award for that! Seriously, thanks for coming back to update this information. But it would be even better if you made your answer stand-alone. Imagine somebody read just your question and your answer — would it make sense? I don't think so; I think somebody would need to see the other answer and/or the comments. Imagine that they're all gone. Please edit your answer to make it clearer and more complete.
– Scott
Nov 26 at 4:11




Wow! Your first answer was in response to your first and only question — after 42 days! You ought to get an award for that! Seriously, thanks for coming back to update this information. But it would be even better if you made your answer stand-alone. Imagine somebody read just your question and your answer — would it make sense? I don't think so; I think somebody would need to see the other answer and/or the comments. Imagine that they're all gone. Please edit your answer to make it clearer and more complete.
– Scott
Nov 26 at 4:11


















draft saved

draft discarded




















































Thanks for contributing an answer to Super User!


  • Please be sure to answer the question. Provide details and share your research!

But avoid



  • Asking for help, clarification, or responding to other answers.

  • Making statements based on opinion; back them up with references or personal experience.


To learn more, see our tips on writing great answers.





Some of your past answers have not been well-received, and you're in danger of being blocked from answering.


Please pay close attention to the following guidance:


  • Please be sure to answer the question. Provide details and share your research!

But avoid



  • Asking for help, clarification, or responding to other answers.

  • Making statements based on opinion; back them up with references or personal experience.


To learn more, see our tips on writing great answers.




draft saved


draft discarded














StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsuperuser.com%2fquestions%2f1367083%2frogue-start-up-of-robot-sweeper%23new-answer', 'question_page');
}
);

Post as a guest















Required, but never shown





















































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown

































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown







Popular posts from this blog

"Incorrect syntax near the keyword 'ON'. (on update cascade, on delete cascade,)

Alcedinidae

RAC Tourist Trophy