You have created a blacklist hash, it is empty. Rule iptables you'll block all of the blacklist hash who will go to your host on port 80. If the source ip is in the hash, it will be DROP. Check who's in hash
ipset -L blacklist
Add to hash
ipset -A blacklist 1.1.1.1
This is all nice and convenient, but you will have to edit the list with pens. Each ip put in the hash table. Ie it is not an automated tool.
Another example of how little blood can organize some kind of protection. Use the module limit.
Create a chain
iptables -N dummy_bot
Let into it those who go to port 80
iptables -A INPUT -p tcp --dport 80 --syn -j dummy_bot
Suppose that a bot will make more than 5 requests in 10 seconds, then
iptables -A dummy_bot -m limit --limit 5 / 10s --limit-burst 6 -j RETURN
If it does not, then the action is RETURN.
And if it exceeds, then
iptables -A dummy_bot -j DROP
We drop such.