I can using VT chromizer and have the VirusTotal results with one click. The Webshield and Networkshield blockings are for a reason and that is to be blocked from venturing out there and get infeccted. If you question a particular result then give the alert message image and the broken destination URL (hxtp or wxw) to us in the virus and worms section and we will come up with a verification. The example you gave is produced by a particular mailcious javascript injection campaign and could be verified by a scan from either Sucuri:
http://sitecheck.sucuri.net/scanner/ or Zscaler Zulu Risk Analyzer:
http://zulu.zscaler.com/ to be accurate.
Trust me that Webshield and Networkshield blocking is highly accurate and will produce very little reason for FPs. But with particular and general IP blocks the malware might have been closed down or no longer respond since the blacklisting occured. In that case after a FP report is filed the avast team may reconsider a blocked IP or IP range, but that is solely up to them. Sometimes malcode will be active for 3,5 hrs, sometimes it stays on for 1700 or more hrs or becomes persisitent, or is launched in ever changing new versions with different names and files from the same address and then has to be closed down, taken down etc. etc.,
polonus