You can use the DNS Canarytoken to help you test for CVE-2021-44228.
1) On your console, Click on "Add new Canarytoken"
2) Select the "DNS" token
3) Enter a memo for the token (like: Testing log4shell #1)
4) The server will generate a DNS based token for you. Copy this Token.
5) Place this copied token in the jndi:ldap string as follows:
For example the updated string will look as follows:
Place the resultant string into search boxes and fields that will be parsed by your logging libraries, and if one of them is vulnerable, you will receive a notification that includes the hostname of the vulnerable server.
You can read more on this issue at LunaSec