Once the spam trap address is incorporated into the spammer’s mailing list, the next step is to send it some spam. In the diagram below, the spammer has compromised a user’s PC with spam-sending malware. The spam trap address “joe@spamtrap.com” is incorporated into the spammer’s mailing list, and the spammer’s spamming malware is attempting to deliver to that address.