Actually, I don't think the resulting iptables rules are correct for blocking a range.
I usually use a base IP address and a mask, i.e.
When I saw what you were doing, I just assumed the syntax was correct for a range, but after testing something similar on my test computer, now I think the syntax is incorrect for a range. For a simple test, I ended up with these commands:
sudo iptables -F OUTPUT
sudo iptables -A OUTPUT -s -d -m state --state ESTABLISHED,RELATED -j ACCEPT
sudo iptables -A OUTPUT -s -m iprange --dst-range -j LOG --log-prefix "ODROP:" --log-level info
sudo iptables -A OUTPUT -s -m iprange --dst-range -j DROP
sudo iptables -A OUTPUT -s -d -j LOG --log-prefix "OCATCH:" --log-level info
And this result:
Chain OUTPUT (policy ACCEPT 4 packets, 974 bytes)
    pkts      bytes target     prot opt in     out     source               destination
     105    32380 ACCEPT     all  --  *      *              state RELATED,ESTABLISHED
       2      120 LOG        all  --  *      *              destination IP range LOG flags 0 level 6 prefix "ODROP:"
       2      120 DROP       all  --  *      *              destination IP range
       4      974 LOG        all  --  *      *              LOG flags 0 level 6 prefix "OCATCH:"