Not sure if I got you right, was the exploitation successful?
In reverse tcp payload, you give the victim side a RHOST and RPORT, and generate the payload.
When you're going to open a port for listening with msf on your machine (host), you DON'T GIVE IT A RHOST/RPORT! You just give it a LPORT and LHOST.
*Caution: Second time (when you want to listen and wait for the victim to connect back) you use the multi handler and give the payload name to it.
P.S.: I think you're mistaking reverse tcp with bind tcp..