diff --git a/docs/nmap.1 b/docs/nmap.1
index 95f9b37a2..dc4ece880 100644
--- a/docs/nmap.1
+++ b/docs/nmap.1
@@ -353,9 +353,7 @@ This host discovery is often sufficient when scanning local networks, but a more
.PP
The
\fB\-P*\fR
-options (which select ping types) can be combined\&. You can increase your odds of penetrating strict firewalls by sending many probe types using different TCP ports/flags and ICMP codes\&. Also note that ARP/Neighbor Discovery
-
-is done by default against targets on a local Ethernet network even if you specify other
+options (which select ping types) can be combined\&. You can increase your odds of penetrating strict firewalls by sending many probe types using different TCP ports/flags and ICMP codes\&. Also note that ARP/Neighbor Discovery is done by default against targets on a local Ethernet network even if you specify other
\fB\-P*\fR
options, because it is almost always faster and more effective\&.
.PP
diff --git a/docs/refguide.xml b/docs/refguide.xml
index 5378cf47d..01b454587 100644
--- a/docs/refguide.xml
+++ b/docs/refguide.xml
@@ -388,7 +388,7 @@ you would expect.
ping types) can be combined. You can increase your odds of
penetrating strict firewalls by sending many probe types using
different TCP ports/flags and ICMP codes. Also note that
- ARP/Neighbor Discovery ARP ping
+ ARP/Neighbor DiscoveryARP ping
is done by default against
targets on a local Ethernet network even if you specify other
options, because it is almost always faster