The iptables code that Leonard was suggesting would only work for SSH (port 22) not 443 (https). But anyway, as you say, the IPs are from all over the place and you can't restrict 443 otherwise nobody would be able to connect to secure sites.
Does this second site need https? If not, just switch it off. Do the same for the next site this happens to.
Basically, if I'm guessing correctly, you are being targeted by a botnet which is attempting to use the Heartbleed bug to obtain what I would presume to be as much data as possible -- obtaining a client's SSL key is not an issue unless they are a bank or something and the attacker intends to spam their users later. They are after login credentials, ideally Plesk ones.
The attacker would seem to have a list of some or all the domains on your Plesk box. They are probably trying them one by one.
While ASL (see
www.atomicorp.com) would help you, it may not resolve the real issue, which is the massive logfiles.
How about changing logrotate settings so that they rotate by size (say 100Mb)? That would at least reduce the size of the logfiles to whatever size they may grow in 24 hours. I dare say it is possible to put together a script that runs every hour (either via logrotate or just using bash script) to look for ssl access logs that are larger than XMb and either deleting or rotating them.
The problem you are facing is going to hit a lot of us eventually, so finding the neatest solution we can as soon as we can would be useful.