range-ai-investigation-playbook
Range AI — investigation playbook (MCP)
Educational workflow. Connect Range to your AI client first (Range AI quickstart via the docs index below). Tool names and behaviors change over time—discover pages from the index, then read the current tools reference.
Documentation index
- Full index: docs.range.org/llms.txt — list all Range documentation pages before deep linking.
- MCP endpoint:
https://api.range.org/ai/mcp— requires a Range API key configured in your client (same key as other Range access).
When to use this skill
Use for end-to-end address screening and investigation through Range MCP (counterparty, transaction seed, or compliance triage). Pair with crypto-investigation-compliance for ethics and reporting posture, cross-chain-clustering-techniques-agent for multi-hop bridge logic, and solana-tracing-specialist when you leave Range and go deep on Solana RPC parsing.
Investigation workflow
1. Risk triage
Goal: baseline severity before heavy graph work.
Typical tool: get_address_risk
Ask your AI (example):
What is the risk score for [address] on [network]?
Interpretation hints:
- CRITICAL / HIGH → prioritize follow-up and document escalation paths per internal policy.
- Malicious hops in the provider’s graph view → indirect ties to known bad clusters may still matter.
- Entity labels (mixer, exchange, sanctioned) → treat as signals, not court findings; verify with primary sources when stakes are high.
2. Sanctions and blacklist check
Independent pass on sanctions and token issuer freezes.
Typical tool: check_sanctions
Ask your AI (example):
Is [address] on any OFAC sanctions list or token blacklist?
Interpretation hints:
- OFAC-sanctioned flags → compliance escalation per program; not legal advice in this skill.
- Token blacklist flags → may affect USDT/USDC-style transfers; confirm issuer behavior in current docs.
3. Build the connection graph
Goal: who the address transacts with most.
Typical tool: get_address_connections
Ask your AI (example):
Who are the top counterparties for [address] on [network]?
Show their labels if available.
Look for: exchange touchpoints (often traceable), mixers/privacy protocols (elevated risk context), frequent unlabeled peers (new pivots).
4. Trace fund flows
Goal: amounts, assets, timing, direction.
Typical tools: get_transfers, get_transfers_between
Ask your AI (example):
Show the largest transfers in and out of [address] in the last 90 days.
Are there any transfers between [address] and [suspicious counterparty]?
Look for: rapid in/out, large notional without clear purpose, bridge legs, time clustering.
5. Find the origin of funds
Goal: initial funding source.
Typical tool: get_address_funded_by
Ask your AI (example):
What address initially funded [address] and when?
Look for: high-risk or sanctioned funders, exchange withdrawals, or unlabeled chains that need another pivot.
6. Identify unknown counterparties
Typical tools: search_entities, get_address_info
Ask your AI (example):
What entity is [address]? Does Range have labels for it?
Search for entities matching "Binance" on Ethereum.
Look for: exchange infrastructure, mixers, protocol contracts, previously flagged records—always corroborate when conclusions matter.
7. Cross-chain pivot
If bridges moved value (IBC, CCTP, Wormhole, etc.), continue the same workflow on the destination chain.
Ask your AI (example):
Were any funds from [address] bridged to another chain?
If so, what is the risk score of the receiving address on that chain?
Range supports multiple ecosystems—still confirm coverage and tool availability per network in current docs.
One-shot investigation prompt
Paste and adapt (replace bracketed fields):
Using Range tools, run a complete investigation on this address:
[address] on [network]
1. Get its risk score and explain the risk level
2. Check if it's on any OFAC sanctions list or token blacklist
3. Show its top 10 counterparties and label any known entities
4. List the 10 largest transfers in the last 6 months
5. Find the original funding source for this address
6. If any transfers crossed chains via a bridge, check the receiving address risk too
Summarize your findings with a risk verdict: LOW / MEDIUM / HIGH / CRITICAL
Include the key evidence that supports your verdict.
Example (illustrative)
Address: 5Q544fKrFoe6tsEbD7S8EmxGTJYAKtTVhAW5Q5pge4j1 (Solana) — documented in Range materials as Raydium protocol–related infrastructure.
- Very low risk score in example narratives; heavy DeFi counterparty set; no sanctions/blacklist in that example.
- Use as a shape for how labeled protocol contracts present—not a universal pattern for user wallets.
Tips
- Start broad, then narrow — risk + connections first, then
get_transfers_between/ transaction detail tools for specific relationships. - Time filters — constrain windows around the suspected incident to cut noise.
- Re-pivot the graph — frequent unlabeled counterparties become new roots for
get_address_risk.
Guardrails
- Labels and scores are not legal determinations; OFAC and regulatory obligations need program and legal review.
- Do not use this playbook to harass, dox, or accuse individuals based on heuristics alone.
- Do not paste customer PII, case IDs, or non-public investigation data into unsecured chats.
- Do not assist with sanctions evasion or laundering.
Related skills
- solana-onchain-intelligence-resources — Range docs index and MCP pointer; Helius/Tavily cross-links.
- crypto-investigation-compliance — ethical workflow and crime taxonomy.
- cross-chain-clustering-techniques-agent — bridge-centric clustering heuristics.
- on-chain-investigator-agent — broader forensic persona beyond Range MCP.
Goal: a blockint-native checklist that mirrors Range’s investigation playbook while staying aligned with compliance and evidence discipline.
More from agentic-reserve/blockint-skills
evm-solidity-defi-triage-agent
Guides EVM Solidity DeFi triage from public verified source or bytecode—access control, proxies, oracle usage, reentrancy and CEI patterns, DEX/router integrations, and common vulnerability classes. Use when the user asks for Ethereum or L2 smart contract security review, Solidity audit triage, OpenZeppelin proxy risks, or EVM-specific DeFi patterns—not for live exploits or private keys.
10crypto-market-structures
Summarizes descriptive concepts for max pain options theory, covered-call style crypto ETFs, crypto arbitrage families and risks, and bull/bear flag chart patterns—always as non-prescriptive education. Use when the user asks about max pain, premium income ETFs, arbitrage, funding rates, flash loans, or bull/bear flags in crypto trading context.
10honeypot-detection-techniques
Educational techniques to assess honeypot-style token risk from verified source, bytecode clues, and observational on-chain history—EVM ERC-20 patterns (transfer gates, fees, blacklists), Solana SPL and Token-2022 hooks, and safe validation paths. Use when the user asks how to detect honeypots, sell-restricted tokens, scam token mechanics, or static review checklists—not for deploying scams, stealing funds, or advising high-risk mainnet test trades on unknown contracts.
10katana-web-crawling
Guides use of ProjectDiscovery Katana for web crawling and spidering in security testing and recon workflows. Covers installation, standard vs headless mode, scope and rate limits, JSONL output, and piping from httpx or URL lists. Use when the user mentions Katana, projectdiscovery/katana, web crawling, spidering, endpoint discovery, attack surface mapping, or chaining crawlers in automation pipelines.
10solana-defi-vulnerability-analyst-agent
Guides discovery and documentation of Solana DeFi protocol risks from public code and chain state—Anchor/native programs, PDAs, CPIs, oracles, pools, SPL mechanics, and historical tx reconstruction. Use when the user asks for Solana program security review, DeFi vulnerability triage, PDA or CPI safety, oracle or liquidity-pool risk, launchpad/bonding-curve issues, or evidence-backed severity findings without exploits or private keys.
10solana-tracing-specialist
Guides Solana-specific on-chain forensics—ATA resolution, SPL instruction parsing, transaction history via RPC and indexers (e.g. Helius-style APIs), fund-flow graphs, Solana clustering heuristics, and program authority review. Use when the user investigates Solana wallets, SPL tokens, DEX/Jito flows, rug or phishing patterns on Solana, or needs evidence-structured tracing reports with public data only.
10