jmason is correct.
But, I want to add to this to save you some hassle later on as well from my experience. Some of these labs and their answers are a nightmare currently if you try follow their commands to a T. You’re kind of set up to fail from the beginning with:
nmap -sT -O -sV --version-all 172.16.80.1/24
You will find that the addition of -p- will get you the results you need for later on scanning all ports vs the nmap defaults.
sudo nmap -v -sT -O -sV -p- --version-all 172.16.80.1/24
For example on 172.16.80.24 nmap only finds 8080/tcp open http Apache Tomcat/Coyote JSP engine 1.1 with a default scan but will also find 4433/tcp open ssl/http nginx 1.1.19 with the -p- switch
So, without doing that you also wouldn’t have known to specify that port they tell you to later as shown in the answers in this:
sudo nmap --script +vuln -p4433 172.16.80.24
Note also that some commands like the above may not give full results without sudo (at least that was the case on my updated kali VM)
Unfortunately some of the port numbers simply don’t match up regardless with the lab answers. (I never saw 35316 on the .22 machine)
The silver lining with the un-updated labs is it forces you to research and figure out why things are different…