.webp)
Earn yield and borrow against your NFTs with the safest loans on the market
.webp)
Earn
Provide liquidity in the form of ETH to our secure pools and receive continuous earnings that grow exponentially.
.webp)
Borrow
Borrow ETH using your NFTs as collateral with instant, open-ended loans protected by our robust risk framework.
Benefits
.webp)
Safety
Our robust Risk Framework covers asset and liquidity risks. The entire protocol has been audited by award-winning ethical hackers.

Fair LTV
We combine price data from 6 different appraisers with our own models to provide a Dynamic Loan-To-Value for each independent NFT.
.webp)
Instant Loans
Don't waste time waiting to agree with a lender, get an open-ended loan on the spot. No rush to repay.
.webp)
Enhanced liquidity
Unlockd DAO Treasury protects lenders. Plus, our liquidity
framework ensures liquidations at market value.
Use Cases
.webp)
Collectors
Unlock additional capital to expand your art collection without having to sell your assets. You'll still be able to shine your PFP while having the liquidity to hunt for that new drop. Now, the art you own lets you leverage your collection.
.webp)
DeFi users
To make it big in DeFi you need to be capital efficient. As a lender, enjoy the best APYs for your crypto. In the future, as a borrower you will be able to pledge DeFi NFTs, such as Uniswap V3, to unlock additional capital.
.webp)
Investors
Access to debt in the physical world is tedious and limited. We do better in crypto. Start making the most of the non-fungible assets you own, and turn your illiquid investments into tax-efficient fuel for your portfolio.
.webp)
Metaverse Guilds
Guilds can turn their yield-generating and idle resources, like creatures or land, into productive assets to optimize working capital. Scale operations, onboard new players, dominate the arena and conquer the GameFi industry with extra liquidity.
.webp)
%201.webp)
Testimonials
Ecosystem






































.webp)
Security Claim
Unlockd takes all necessary precautions to protect our users’ data and assets. Multiple security engineers and independent hackers have provided us with an objective assessment of the protocol and audited every potential weak point.