The host at this IP address is obviously operated by cybercriminals. It is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse.
Malware botnet controller located at 178.79.138.253 on port 443 TCP:
$ telnet 178.79.138.253 443
Trying 178.79.138.253…
Connected to 178.79.138.253.
Escape character is ‘^]’
$ nslookup 178.79.138.253
li194-253.members.linode.com
Referencing malware samples (MD5 hash):
0247222caf3b70431bb17ed46bf2cf94 — AV detection: 47 / 66 (71.21%)
1e6b4fd9f05335b09a07c51956de3600 — AV detection: 32 / 70 (45.71%)
29180fd1b136d9da1dfe29021974d74a — AV detection: 55 / 70 (78.57%)
2e39105cf79c568b6877942d3941318c — AV detection: 30 / 70 (42.86%)
378fa6fbd041e1fe8b817944645f7bb5 — AV detection: 42 / 70 (60.00%)
48f73f44a67195eeaaad894137aecfed — AV detection: 40 / 68 (58.82%)
4c91553629fe2ea4439b70ffe7253ffc — AV detection: 28 / 69 (40.58%)
509b43b85e94f69dff4636dbc32b8106 — AV detection: 52 / 71 (73.24%)
51c527a13d26dbae768098f26f49bc42 — AV detection: 29 / 70 (41.43%)
648ca5a2d8b3556cbb32d2920c46c94b — AV detection: 25 / 70 (35.71%)
706b8fb52e4ec144841ec7165de1c2f0 — AV detection: 46 / 70 (65.71%)
7710d08e7ab7e360ee3d55f124c4b1c9 — AV detection: 30 / 68 (44.12%)
8758f0d7d50bfd8a4e4e663fedc1b1e3 — AV detection: 38 / 70 (54.29%)
8a23857d346bc1c4f713fdd5ea63d2ac — AV detection: 33 / 71 (46.48%)
9b3ace88af7f21118f311d891d4cac94 — AV detection: 32 / 71 (45.07%)
a648f287ded01899c5018bf6a0c919ea — AV detection: 17 / 71 (23.94%)
a880e4e346f032c1e200ce808e5cbf9f — AV detection: 21 / 71 (29.58%)
c2aacfd024500cc7f6a7b5e33a2e9e6b — AV detection: 36 / 69 (52.17%)
cb0fed54e34f1602e3c14f5bfc02bf8e — AV detection: 44 / 70 (62.86%)
ed7e85eaa6b885ed70c22b014da392c8 — AV detection: 27 / 70 (38.57%)