Thank You MIDCO: When a Regional ISP Subscribes to Your Threat Intel Feed
- Patrick Duggan
- Dec 6, 2025
- 2 min read
December 6, 2025
I started this whole thing because I was tired of getting scraped. Built a honeypot, caught some bots, published some IOCs. Standard indie security researcher stuff.
Then Microsoft's threat intel team subscribed to my OTX feed.
Then AT&T Alien Labs.
Now MIDCO (Midcontinent Communications) - a regional telecommunications provider serving Minnesota, North Dakota, South Dakota, Kansas, and other parts of the Upper Midwest.
Why This Matters
MIDCO isn't a Fortune 500. They're not a giant cloud provider with infinite security budgets. They're the company that provides internet to Sioux Falls. To Fargo. To Bemidji.
They have Customer Experience Centers in places like Mitchell, South Dakota and Yankton. Real humans helping real customers in real communities.
And their security team decided our threat intelligence feed was worth subscribing to.
The Numbers
• 27,646 indicators in our OTX pulse library
• 134 threat intel pulses published
• 16 subscribers including Microsoft, AT&T, and now MIDCO
What MIDCO Gets
Every IOC we publish. Every Pattern 38 GitHub sleeper account. Every Pattern 43 password-protected malware dropper. Every Stealc C2 we find.
For free.
Because that's how threat intelligence should work. The attackers share their tools. Defenders should share their findings.
The Regional ISP Angle
Here's what most people don't understand about regional ISPs:
They're on the front lines. When a credential stuffing campaign hits, it's often residential IPs getting abused. When botnets recruit, they're recruiting grandma's router in Grand Forks.
MIDCO sees this traffic. They deal with abuse reports. They try to protect their customers from becoming unwitting participants in attacks.
Having access to real-time threat intel - especially supply chain attack patterns targeting developers - helps them:
1. Block known-bad infrastructure before it reaches customers 2. Identify compromised residential IPs on their network 3. Correlate abuse reports with known campaigns 4. Protect small businesses that can't afford enterprise security
The Midwest Security Stack
You know what I love about this?
I'm in Minnesota. MIDCO serves Minnesota (Bemidji represent).
This is Upper Midwest threat intel protecting Upper Midwest networks.
No Silicon Valley middleman. No enterprise sales cycle. Just a guy with a honeypot sharing IOCs with an ISP that needs them.
What's Next
• GreyNoise for noise reduction (filtering out mass scanners)
• Pulsedive for risk scoring
• Mandiant integration pending (signed up for free tier via CISA)
More sources = better correlation = fewer false positives = better protection for MIDCO's customers in Rapid City and Watertown.
Thank You
To the MIDCO security team: thank you for subscribing. Thank you for caring about threat intel. Thank you for protecting those communities.
To everyone else: the feed is free. Always has been. Always will be.
OTX Profile: pduggusa STIX Feed: https://analytics.dugganusa.com/api/v1/stix-feed/taxii/collections/threat-intel/objects
*Your security is our problem now.*
*- DugganUSA LLC, Minneapolis, Minnesota*
Get Free IOCs
Subscribe to our threat intelligence feeds for free, machine-readable IOCs:
AlienVault OTX: https://otx.alienvault.com/user/pduggusa
STIX 2.1 Feed: https://analytics.dugganusa.com/api/v1/stix-feed
Questions? [email protected]




Comments