New output is a bit more verbose will look similar to this...
Mapping network... Scanning individual hosts... Scanning 192.168.0.1... --Suspicious port found: 53 ADM worm, li0n, MscanWorm, MuSka52 Scanning 192.168.0.103... --Suspicious port found: 1234 KiLo, Ultors Trojan ...
In this example, 53 is a false-positive for my router (DNS). 1234 was `netcat -p 1234 -l` on my home server. Shouldn't catch most common ports like http/s, ftp, ssh, etc...
You can check out the latest source here.