Academy Lab - Attacking Common Services - Easy - Very Long Brute Force Time

I found the name f****@*** in the nmap scan. I am now brute forcing FTP using the command below.

But it is taking hours with no end in sight.

Am I doing something wrong here?

╭─d@parrot attacking-common-services-lab-easy 
╰─$ hydra -l f******@inlanefreight.htb -P /usr/share/wordlists/rockyou.txt -t 64

I am using the rockyou list since this was mentioned in some other threads. Apparently the lists in the lab resources will not work.

So I discovered that ftp was not the right service to enumerate.