Back to Features

Stealth Routing

Obfuscate transactions through multi-hop routing and relayer networks

Overview

Stealth Routing breaks the direct link between your source and destination addresses by routing transactions through multiple intermediate addresses and relayers.

This makes it extremely difficult for on-chain analytics to trace the flow of funds and identify the true origin or destination of your transactions.

How It Works

1

Initiate Transaction

Start by specifying your source address and destination. The system will calculate the optimal routing path through available relayers.

2

Multi-Hop Routing

Your transaction is split and routed through multiple intermediate addresses and relayer nodes, creating a complex path that obscures the origin.

3

Final Delivery

The final relayer delivers your funds to the destination address, completing the obfuscated transaction flow.

Benefits

Enhanced Privacy

Break direct links between source and destination addresses

Relayer Network

Leverage a distributed network of trusted relayers

Optimized Paths

Automatic path optimization for cost and privacy

Multiple Hops

Configure the number of hops for desired privacy level

Getting Started

To use Stealth Routing:

  1. Navigate to the Stealth Routing page in the dashboard
  2. Enter your source and destination addresses
  3. Select the desired number of hops and relayer preferences
  4. Review the estimated fees and privacy improvement
  5. Confirm and execute the routed transaction