The host at this IP address is obviously operated by cybercriminals. It is running a malware botnet controller which is being used to control infected computers (bots) around the globe using a trojan horse.
Malware botnet controller located at 192.46.229.48 on port 443 TCP:
$ telnet 192.46.229.48 443
Trying 192.46.229.48…
Connected to 192.46.229.48.
Escape character is ‘^]’
$ nslookup 192.46.229.48
li2188-48.members.linode.com
Referencing malware samples (MD5 hash):
0247222caf3b70431bb17ed46bf2cf94 — AV detection: 47 / 66 (71.21%)
29180fd1b136d9da1dfe29021974d74a — AV detection: 55 / 70 (78.57%)
2e39105cf79c568b6877942d3941318c — AV detection: 30 / 70 (42.86%)
378fa6fbd041e1fe8b817944645f7bb5 — AV detection: 42 / 70 (60.00%)
48002542747a028852b503cca538ccd3 — AV detection: 37 / 70 (52.86%)
48f73f44a67195eeaaad894137aecfed — AV detection: 40 / 68 (58.82%)
51c527a13d26dbae768098f26f49bc42 — AV detection: 29 / 70 (41.43%)
5c6f7acbf396c89c8616bc5936603a14 — AV detection: 29 / 71 (40.85%)
706b8fb52e4ec144841ec7165de1c2f0 — AV detection: 46 / 70 (65.71%)
75c9499ca1665c2352bb0415fce39dd5 — AV detection: 40 / 69 (57.97%)
8a23857d346bc1c4f713fdd5ea63d2ac — AV detection: 33 / 71 (46.48%)
8d6b2c0381dc20ffe65ae92b0ab44848 — AV detection: 37 / 71 (52.11%)
a56687f06817fe7a6a48c43d8d7133c2 — AV detection: 29 / 66 (43.94%)
a648f287ded01899c5018bf6a0c919ea — AV detection: 17 / 71 (23.94%)
a880e4e346f032c1e200ce808e5cbf9f — AV detection: 21 / 71 (29.58%)
c61f82418d155c6a2b61f9f9b7f7d2ed — AV detection: 30 / 71 (42.25%)
cb0fed54e34f1602e3c14f5bfc02bf8e — AV detection: 44 / 70 (62.86%)