Tezos
Betanet Icon

Tezos Betanet

The Tezos community has been running the alphanet, a test network, successfully for well over a year. Although this has provided valuable engineering insight, there is no substitute for real-world experience. To that end, the Tezos Foundation proposed a genesis block which is now the seed of a beta network (“betanet”). This genesis block includes recommended allocations for contributions to the Foundation’s fundraiser. Community members who opt to interact with this network must understand that it will undergo unscheduled downtime and require maintenance and adjustments. It is anticipated that a broader main network (“mainnet”) launch will follow with transactions from the betanet persisting into the mainnet.

Icon

How To Get Started

1

Check Your Contribution

Click on the "Check Your Contribution" button below to check the recommended allocation of a given public key hash. Contributors may find their public key hashes on the PDF documents they created during the Foundation's fundraiser.

Check Your Contribution
2

Obtain Your Activation Code

Activation codes are required to access the recommended allocations of the corresponding public key hashes. In order to obtain these codes, contributors must complete the Foundation’s Know Your Customer / Anti-Money Laundering (“KYC/AML”) process. Contributors who did not complete this process before the betanet launch can do so now.

Begin KYC/AML KYC/AML FAQ
3

Access Your Recommended Allocation

Holding Tezos tokens ("tez") allows one to interact with the Tezos blockchain. Contributors can access and manage their recommended allocations using the command line client. This will require entering the activation code of a public key hash and its private key information (a fifteen-word mnemonic, and the email address and password used during the fundraiser). Every user should make sure to exercise extreme care and take all available safety precautions when entering private key information anywhere. Any party or software, such as a wallet, that gains knowledge of private key information will have access to the tez controlled by the corresponding public key hash. Always think twice before entering private key information anywhere.