This is one of the challenges of security in the modern environment of cloud computing and content delivery networks. Malwarebytes blocks IPs that have been identified as delivering malware. In the old days that made fairly good sense because a given web server was generally at a given IP. These days, with cloud hosting, the IP changes. Add in content delivery networks (CDN) and you also have content from many tens or hundreds of thousands of sites being delivered through the same small group of shared IP addresses. I've seen this already with email delivery because someone else had sent spam from an IP my server was later trying to use to deliver email. Now it appears someone on the same CDN has hosted some malicious websites. The server IP banning model is nowhere near as good a solution as it used to be.
If you want to prevent this problem for now, you can whitelist the following IP addresses. Keep in mind this does present some amount of risk because malicious sites can also use the same IP addresses. There is no better solution at this time because the IP blocking system is fundamentally flawed with respect to cloud hosting and CDNs.
204.93.240.0/24 (204.93.240.0 - 204.93.240.255)
204.93.177.0/24 (204.93.177.0 - 204.93.177.255)
199.27.128.0/21 (199.27.128.0 - 199.27.135.255)
173.245.48.0/20 (173.245.48.0 - 173.245.63.255)
103.22.200.0/22 (103.22.200.0 - 103.22.203.255)
141.101.64.0/18 (141.101.64.0 - 141.101.127.255)
108.162.192.0/18 (108.162.192.0 - 108.162.255.255)
190.93.240.0/20 (190.93.240.0-190.93.255.255)