Avast marked my webpage as a dangerous site. FALSE POSITIVE

Hello, we are having some trouble with our webpage.
Yesterday my website got wrongly marked as fraudulent by Google, but today they unmarked my website, the problem is that users still can’t access unless they deactivate Avast shields.
I’ve already run scans at virustotal.com and https://sitecheck.sucuri.net/results/sproactiva.cl/intranet. They don’t report any problems concerning being blacklisted nor infected.

Any ideas?
Thanks in advance!

What does the avast message say? … you may post a screenshot

Vulnerable libraries used :
http://retire.insecurity.today/#!/scan/c02d2b58b3ec5b106882f958c4186fe87171ffc44b7628fe4365a1456678459a

Blacklistings on that ASN :
http://urlquery.net/report.php?id=1493128921479

Huge amount of blacklistings on that IP :
https://www.virustotal.com/en/ip-address/50.87.144.108/information/

https://www.avast.com/report-a-url.php

Thanks a lot.
We are very surprised with the ammount of domains pointing to our IP. We have no absolutely no relation to those domains.
What can we do?

Get dedicated hosting instead of shared hosting.

Another presentation of just the issues Eddy mentions:

Search results for -sproactiva.cl/intranet. Total number observed artifacts in database: URLs, HTTP cookies, Flash cookies, HTML5 localStorage cookies, sessionStorage cookies and SSL/TLS checks. Recents scans from a few hours back are listed below. -http://intranet.com/ 3rd-party 1 Persistent 3 Session 0 Score ? -http://interact-intranet.com/ 3rd-party 4 Persistent 9 Session 4 Score ? -http://proactive-internet.com/ 3rd-party 0 Persistent 4 Session 1 Score ?
See: -https://aw-snap.info/file-viewer/?protocol=not-secure&tgt=sproactiva.cl%2Fintranet&ref_sel=GSP2&ua_sel=ff&fs=1 and https://urlscan.io/result/65fc6ffb-407b-44ae-8270-9ecbe0f9afd0#summary

And you are never alone on these BigData domains: http://domainbigdata.com/50.87.144.108
So when there is abuse on that same IP, you can reap the consequences of that as well,

Also consider the results from scanning URL: -http://sproactiva.cl/intranet/javascript/tapmodo-Jcrop-1902fbc/js/jquery.Jcrop.js
Number of sources found: 109
Number of sinks found: 88

jQuery bug with this expression in that very code for that hash was patched

quickExpr = /^(?:[^#<](<[\w\W]+>)[^>]$|#([\w-]*)$
The quick patch by jQuery is:

- quickExpr = /^(?:[^<]*(<[\w\W]+>)[^>]*$|#([\w\-]*)$)/, + quickExpr = /^(?:[^#<]*(<[\w\W]+>)[^>]*$|#([\w\-]*)$)/,

polonus (volunteer website security analyst and website error-hunter)

I am removing sproactiva[.]cl from our blacklist :wink: