To learn how to check if your Check Point products configured for blocking Log4j attack, watch the 2
Log4j Scanning In 2 Minutes
This tool was created with the intention of helping the community quickly identify vulnerable
applications in your own networks only.
Usage of log4j-scan for attacking targets without prior mutual consent is illegal.