diff --git a/nmap.cc b/nmap.cc
index 6ad87aade..f76d2599d 100644
--- a/nmap.cc
+++ b/nmap.cc
@@ -1766,9 +1766,11 @@ int nmap_main(int argc, char *argv[]) {
/* I used to check that !currenths->weird_responses, but in some
rare cases, such IPs CAN be port successfully scanned and even connected to */
if (!(currenths->flags & HOST_UP)) {
- log_write(LOG_XML, "");
- write_host_header(currenths);
- log_write(LOG_XML, "\n");
+ if (o.verbose) {
+ log_write(LOG_XML, "");
+ write_host_header(currenths);
+ log_write(LOG_XML, "\n");
+ }
delete currenths;
o.numhosts_scanned++;
continue;