It is a IP block.
Sites on servers that are still vulnerable to the Poodle attack should always be blocked.
A solution is known for over a year.
If a host still hasn’t applied it, the entire host should be blocked.

Blacklisted IP:
http://zulu.zscaler.com/submission/show/33ca1d75db2302bfbd6eb2f3daa9e6ce-1447003667
http://urlquery.net/report.php?id=1447003965698
http://urlquery.net/report.php?id=1447003977017
http://multirbl.valli.org/lookup/191.252.51.6.html

Bad IP history:
https://www.virustotal.com/en/ip-address/191.252.51.6/information/

Vulnarable to poodle attack, certificate mismatch, several security problems:
https://www.ssllabs.com/ssltest/analyze.html?d=pds.inf.br

Name server problem:
http://www.dnsinspect.com/pds.inf.br/1447004408