As some people mentioned, both IOC Feeds and Network Feeds are great options for blocking large lists of potentially malicious IPs. They are definitely better than creating many unnecessary host objects and managing them in large groups for your policy.
Regarding implied rules accepting the traffic before the feed blocking, I'd definitely look into https://support.checkpoint.com/results/sk/sk105740. From experience with a few customers, it's a common reason for seeing "Accepts" of traffic heading towards your gateways, and there are explanations in the SK for mitigating it.
If you are going to use IOC feeds, one option is to host them on some web/file server of your own, but you need to maintain, secure and keep it backed up. Another option is to leverage the IOC hosting capabilities of the Infinity Portal. This can be accessed via the Infinity XDR app, but doesn't require an XDR license. You can add your IPs there, or point it to multiple external feeds.
A third option (which I think is very cool), is to leverage Infinity Playblocks. Once you activate "Quantum Enforcement", your policies will have an ordered layer for blocking malicious sources or quarantining compromised machines. This works in parallel to your existing layers / policies, and similar to Network Feeds, it's an "Access Policy" feature that doesn't require any of the Threat Prevention blades.
The list of malicious sources can be populated automatically by Playblocks as it monitors your IPS activity (which does require the IPS blade) and will flag any IP that is performing high confidence IPS attacks on your gateways. An attack on a single gateway, will cause that IP to be blocked across all your gateways.
Another way to populate the list (which not many are familiar with) is via Playblocks APIs. You can either manually script something that will add IPs to the list, or you can attach it to your SIEM / SOAR to do it automatically in real time. You can also add IPs via the Playblocks UI in the Infinity Portal application.
Using Playblocks relieves you of the burden of hosting the Network Feed, but it also brings useful features like expiration (TTL) for the added IPs, audit logs and more.