iifl-logo

Financial Sector

Invest wise with Expert advice

By continuing, I accept the T&C and agree to receive communication on Whatsapp

Download App
image

Top gainers on the Nifty included JSW Steel, Tata Steel, SBI, Hindalco, and Adani Enterprises

image

Swan Energy stated in a stock exchange filing that it intends to use the QIP cash for facility modernization and debt reduction.

image

Here are some of the stocks that may see significant price movement today.

image

Some Nifty stocks scored on returns, some on risks and some on their correlation to the index.

image

Nifty surpasses 22,200 mark for the first time.

image

The NFO is available for subscription from February 20 to March 05.

image

AMC will follow an active investment style supported by in-house research.

image

In the broader market, profit-booking was observed, with the BSE Smallcap index trading flat and the BSE Midcap down by 0.3%.

image

Recommendation: Buy; Target price: ₹1450

image

Sheetal Agarwal of IIFL chatted with management of Azad Engineering, whose IPO will open on December 20.

Download App
Knowledge Center
Logo

Logo IIFL Customer Care Number
(Gold/NCD/NBFC/Insurance/NPS)
1860-267-3000 / 7039-050-000

Logo IIFL Capital Services Support WhatsApp Number
+91 9892691696

Download The App Now

appapp
Loading...

Follow us on

facebooktwitterrssyoutubeinstagramlinkedintelegram

2025, IIFL Capital Services Ltd. All Rights Reserved

ATTENTION INVESTORS

RISK DISCLOSURE ON DERIVATIVES

Copyright © IIFL Capital Services Limited (Formerly known as IIFL Securities Ltd). All rights Reserved.

IIFL Capital Services Limited - Stock Broker SEBI Regn. No: INZ000164132, PMS SEBI Regn. No: INP000002213,IA SEBI Regn. No: INA000000623, SEBI RA Regn. No: INH000000248, DP SEBI Reg. No. IN-DP-185-2016, BSE Enlistment Number (RA): 5016
ARN NO : 47791 (AMFI Registered Mutual Fund Distributor), PFRDA Reg. No. PoP 20092018

ISO certification icon
We are ISO/IEC 27001:2022 Certified.

This Certificate Demonstrates That IIFL As An Organization Has Defined And Put In Place Best-Practice Information Security Processes.