Rate Limiting Rule Not Working As Expected, some are still logged

What is the name of the domain?

vopay.com

What is the issue you’re encountering

The following ratelimiting rule isnt working as intended. (cf.waf.score.class eq “attack” and http.request.uri.path ne “/api/v2/vopay/update-notification” and not ip.src in {52.60.226.121 15.156.104.253}) or (cf.waf.score.class eq “likely_attack” and http.request.uri.path ne “/api/v2/vopay/update-notification” and not ip.src in {52.60.226.121 15.156.104.253})

Screenshot of the error

sorry for a bad original post, UI issues… here are actual info

we also have managed rules for skip (http.request.uri.path wildcard " /api/v2/batch/eft/*") and (http.request.uri.path eq "/api/v2/vopay/update-notification"). And some Execute on Cloudflare Managed Ruleset & Cloudflare OWASP Core Ruleset

as for the issue itself. this situation has happened a few times

below, Attacking IP Rate Limit Block triggered 7.22k times, but still 3.84k logs. Given my rule, the first 16 or so (+ CF side delay) should get logged and rest be blocked for the next 1h. I dont understand how I did the misconfigure.

This issues persist (per graph, not posted) when I have IP and path / filtered. and when I have the host/url also filtered.

Support left me on read for 6+ weeks. I’d appreciate the communities help.

These are the rules in use.