First, an aside, spending time here on stackexchange is hardly wasting time. Either you are getting answers to questions you ask, or helping out a fellow user. Neither educating yourself nor helping your fellow man/woman is considered time wasted by anyone I know.
Second, with a reputation of 121, I doubt you have spent a faction of the time on here as I have with a repuation of 5000 and counting.
Whois reveals this so block this range and you won't get it. If your firewall supports CIDR notation a single line below will block it all.
NetRange: 151.101.0.0 - 151.101.255.255
CIDR: 151.101.0.0/16
Command to block access to this IP range:
iptables -I OUTPUT 1 -d 151.101.0.0/16 -j DROP
You will have to save the iptables configuation, otherwise when you reboot it is lost. I don't know if Ubuntu has an automatic facility for that.
iptables-save ><somewhere>/iptables.save
iptables-restore <<somewhere>/iptables.save
if using systemd create a file named iptables.service in
/etc/systemd/system/
[Unit]
Description=IPtables load rules
DefaultDependencies=no
After=ipset.service network-pre.target
Before=network-online.target network.target
[Service]
Type=oneshot
ExecStartPre=-/bin/echo 'Starting iptables'
ExecStart=/usr/sbin/iptables-restore <somewhere>/iptables.save
ExecReload=/usr/sbin/iptables-restore <somewhere>/iptables.save
ExecStop=/usr/lib/systemd/scripts/iptables -flush
RemainAfterExit=yes
CapabilityBoundingSet=CAP_NET_ADMIN CAP_NET_RAW
[Install]
WantedBy=basic.target
then systemctl enable iptables