iifl-logo

Mining Sector

Invest wise with Expert advice

By continuing, I accept the T&C and agree to receive communication on Whatsapp

Download App
image

Davis brings 25 years of industry experience.

image

Vedanta needs to raise funds for meeting upcoming loan repayments.

image

The 29 coal blocks that have been successfully bid out contain approximately 91 million tonnes of Potential Recoverable Coal (PRC).

image

The block has estimated bauxite reserves of 22.13 million tonnes.

image

He has over 30 years of diverse international experience in technical, commercial, and executive leadership roles, having previously worked for BP, Talisman Energy, and Africa Oil.

image

The resolution professional established a price threshold of 1,143 crore, at which Vedanta submitted a bid.

image

CIL and Trade Unions signed the agreement in Kolkata on Tuesday.

image

The Ministry of Coal will undertake additional 19 First Mile Connectivity (FMC) projects with a capacity of 330 million tonnes.

image

Base price set at $ 9.57 per mmBtu

Download App
Knowledge Center
Logo

Logo IIFL Customer Care Number
(Gold/NCD/NBFC/Insurance/NPS)
1860-267-3000 / 7039-050-000

Logo IIFL Capital Services Support WhatsApp Number
+91 9892691696

Download The App Now

appapp
Loading...

Follow us on

facebooktwitterrssyoutubeinstagramlinkedintelegram

2026, IIFL Capital Services Ltd. All Rights Reserved

ATTENTION INVESTORS

RISK DISCLOSURE ON DERIVATIVES

Copyright © IIFL Capital Services Limited (Formerly known as IIFL Securities Ltd). All rights Reserved.

IIFL Capital Services Limited - Stock Broker SEBI Regn. No: INZ000164132, PMS SEBI Regn. No: INP000002213,IA SEBI Regn. No: INA000000623, SEBI RA Regn. No: INH000000248, DP SEBI Reg. No. IN-DP-185-2016, BSE Enlistment Number (RA): 5016
ARN NO : 47791 (AMFI Registered Mutual Fund & Specialized Investment Fund Distributor), PFRDA Reg. No. PoP 20092018

ISO certification icon
We are ISO/IEC 27001:2022 Certified.

This Certificate Demonstrates That IIFL As An Organization Has Defined And Put In Place Best-Practice Information Security Processes.