Both for attacker (after the DBMS fingerprint output) and for developer/DBA (at the end, just before the "shutting down" message).
Report also about known vulnerabilities based on DBMS exact version (consider backporting!) and known Metasploit exploits.