Like some others hereabouts, I block large swathes of server farm IPs. Until recently this has been done via a database list read on site access - it still is on my Windows server and is a fall-back on my linux Apache server.
I recently decided to firewall a few persistent, high-incidence IP ranges on my linux server. Not entirely a good idea, hence this warning.
I found that suddenly, two or three times a day, letsencrypt updated ALL of the site configs on the server, with no actual changes to them. Looking in the letsencrypt log I discovered there were several traces per call indicating an error, with a comment that the cause may be due to firewalled IPs. Pulling out several IP ranges from the firewall fixed the problem. The ranges included Amazon, Microsoft and Digital Ocean, chosen from previous observation of their bot.
Let's Encrypt does not publish the IP ranges used: understandable in several ways. Now that they are visible in the logs again I could work out the CURRENT IP ranges but it's not a reliable method, as they say the IPs will change. As far as I can tell they use at least three cloud services and possibly, now or in the future, others.
Be warned: by all means firewall small service ranges but be wary of killing the bigger ones. Leave it to the site trappers such as databases and htacess.