The host at this IP address is obviously operated by cybercriminals. It is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse.
Malware botnet controller located at 45.79.126.97 on port 443 TCP:
$ telnet 45.79.126.97 443
Trying 45.79.126.97…
Connected to 45.79.126.97.
Escape character is ‘^]’
$ nslookup 45.79.126.97
li2147-97.members.linode.com
Referencing malware samples (MD5 hash):
0247222caf3b70431bb17ed46bf2cf94 — AV detection: 47 / 66 (71.21%)
1c2263e201ad57fbe365a6354ed26a3d — AV detection: 26 / 70 (37.14%)
1e6b4fd9f05335b09a07c51956de3600 — AV detection: 32 / 70 (45.71%)
29180fd1b136d9da1dfe29021974d74a — AV detection: 55 / 70 (78.57%)
2e39105cf79c568b6877942d3941318c — AV detection: 30 / 70 (42.86%)
378fa6fbd041e1fe8b817944645f7bb5 — AV detection: 42 / 70 (60.00%)
48002542747a028852b503cca538ccd3 — AV detection: 37 / 70 (52.86%)
5cf9fab202fe205d713194f466e41744 — AV detection: 29 / 70 (41.43%)
8747ccb6ab75126a8184897a3f95dfdf — AV detection: 53 / 70 (75.71%)
9e452c1cf85474c00c4019ef6605901e — AV detection: 51 / 70 (72.86%)
a56687f06817fe7a6a48c43d8d7133c2 — AV detection: 29 / 66 (43.94%)
a648f287ded01899c5018bf6a0c919ea — AV detection: 17 / 71 (23.94%)
a880e4e346f032c1e200ce808e5cbf9f — AV detection: 21 / 71 (29.58%)
ad174f1923c01c67e8b38f1e6864ea1f — AV detection: 43 / 71 (60.56%)
b5216ac0ee6839938ff9e74fed535a0b — AV detection: 30 / 71 (42.25%)
cb0fed54e34f1602e3c14f5bfc02bf8e — AV detection: 44 / 70 (62.86%)