It is a IP block. Sites on servers that are still vulnerable to the Poodle attack should always be blocked. A solution is known for over a year. If a host still hasn’t applied it, the entire host should be blocked.
Blacklisted IP: http://zulu.zscaler.com/submission/show/33ca1d75db2302bfbd6eb2f3daa9e6ce-1447003667 http://urlquery.net/report.php?id=1447003965698 http://urlquery.net/report.php?id=1447003977017 http://multirbl.valli.org/lookup/191.252.51.6.html
Bad IP history: https://www.virustotal.com/en/ip-address/191.252.51.6/information/
Vulnarable to poodle attack, certificate mismatch, several security problems: https://www.ssllabs.com/ssltest/analyze.html?d=pds.inf.br
Name server problem: http://www.dnsinspect.com/pds.inf.br/1447004408