The host at this IP address is obviously operated by cybercriminals. It is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse.
Malware botnet controller located at 172.105.196.53 on port 443 TCP:
$ telnet 172.105.196.53 443
Trying 172.105.196.53…
Connected to 172.105.196.53.
Escape character is ‘^]’
$ nslookup 172.105.196.53
li1838-53.members.linode.com
Referencing malware samples (MD5 hash):
0247222caf3b70431bb17ed46bf2cf94 — AV detection: 47 / 66 (71.21%)
1e6b4fd9f05335b09a07c51956de3600 — AV detection: 32 / 70 (45.71%)
2e39105cf79c568b6877942d3941318c — AV detection: 30 / 70 (42.86%)
378fa6fbd041e1fe8b817944645f7bb5 — AV detection: 42 / 70 (60.00%)
48002542747a028852b503cca538ccd3 — AV detection: 37 / 70 (52.86%)
48f73f44a67195eeaaad894137aecfed — AV detection: 40 / 68 (58.82%)
509b43b85e94f69dff4636dbc32b8106 — AV detection: 52 / 71 (73.24%)
51c527a13d26dbae768098f26f49bc42 — AV detection: 29 / 70 (41.43%)
5c6f7acbf396c89c8616bc5936603a14 — AV detection: 29 / 71 (40.85%)
5cf9fab202fe205d713194f466e41744 — AV detection: 29 / 70 (41.43%)
6a56e9c66beb428f1cb669f1aaf4a22e — AV detection: 36 / 69 (52.17%)
706b8fb52e4ec144841ec7165de1c2f0 — AV detection: 46 / 70 (65.71%)
7710d08e7ab7e360ee3d55f124c4b1c9 — AV detection: 30 / 68 (44.12%)
a56687f06817fe7a6a48c43d8d7133c2 — AV detection: 29 / 66 (43.94%)
a648f287ded01899c5018bf6a0c919ea — AV detection: 17 / 71 (23.94%)
a880e4e346f032c1e200ce808e5cbf9f — AV detection: 21 / 71 (29.58%)
ad174f1923c01c67e8b38f1e6864ea1f — AV detection: 43 / 71 (60.56%)
b5216ac0ee6839938ff9e74fed535a0b — AV detection: 30 / 71 (42.25%)
cb0fed54e34f1602e3c14f5bfc02bf8e — AV detection: 44 / 70 (62.86%)
d1b97a0c6699e1cd9cc54176b84123e6 — AV detection: 12 / 70 (17.14%)
ed7e85eaa6b885ed70c22b014da392c8 — AV detection: 27 / 70 (38.57%)
ed995f31ee2575bc8c1de5efa0503019 — AV detection: 34 / 71 (47.89%)