Try something along the lines of nmap -A -T4 10.*.*.* | egrep '(telnet|"Interesting ports"|PORT)' to give you the host it's currently scanning, the column headers and any lines that have "telnet" in them.
However, I'd modify those wildcards...! There are a whole _lot_ of combinations to be had from 3 wildcards, and I've no idea how long the command would actually take as written. If you only use 10.1.*.* on your network, use 10.1.*.* instead