If you are an Enterprise customer there is an Open Proxies Managed List you can use in Firewall Rules.
I’m sure that there have been many requests for a similar managed list for VPNs and Hosting Providers (there has been at least one such request, by me!).
I use a rule like this to block a list of hosting provider and similar ASNs, while allowing good bots, and giving myself an easy way to allowlist the IPs of useful services within those ASNs.
(ip.geoip.asnum in {64496 64497 64498} and not cf.client.bot and not ip.src in $asnbypasslist)
I get contacted by some legitimate services within those ASNs. In all cases so far I have been able to add their IP addresses to my ASN Bypass List, but I simultaneously direct them to the application form to become a Verified Bot.
There was a discussion on this Community about blocking a large list of “bad” ASNs that is probably of interest.
As @WalshyMVP said, there is real value in proxies, VPNs, Tor etc., and that the ban hammer should not be applied to them unless you actually need to. They are a valuable tool for people who are living under various levels of surveillance or oppression, or people who want to ensure a level of personal privacy. If the traffic from these sources does not cause harm to you, try and let them in. (Hosting providers hosting automated bots are fair game in my world, ban away!)