diff --git a/docs/refguide.xml b/docs/refguide.xml
index 1fbec192b..f495b809f 100644
--- a/docs/refguide.xml
+++ b/docs/refguide.xml
@@ -366,10 +366,9 @@ you would expect.
even if you specify non-default host discovery types such as UDP
probes (). Read about the
option to learn how to perform
- only host discovery, or use
- to skip host discovery and port scan all
- target hosts. The following options control host
- discovery:
+ only host discovery, or use to skip host
+ discovery and port scan all target hosts. The following options
+ control host discovery:
@@ -411,11 +410,13 @@ you would expect.
ping scan
- This option tells Nmap to only
- perform a ping scan (host discovery), then print out the available hosts
- that responded to the scan. No further testing (such as
- port scanning or OS detection) is performed. This is one
- step more intrusive than the list scan, and can often be
+ This option tells Nmap to only perform a ping scan
+ (host discovery), then print out the available hosts
+ that responded to the scan. If requested, Traceroute and
+ NSE host scripts can be run against the target after the
+ ping scan, but no other further testing (such as
+ port scanning or OS detection) is performed. This is by
+ default one step more intrusive than the list scan, and can often be
used for the same purposes. It allows light reconnaissance
of a target network without attracting much attention.
Knowing how many hosts are up is more valuable to attackers