Prerequisites
A Range API key — get one at app.range.org/keys
An MCP-compatible AI client (Claude Desktop, Claude.ai, Cursor, or any OpenAI-compatible tool)
You use the same API key you already have. No new credentials, no separate signup.
MCP endpoint
https://api.range.org/ai/mcp
This endpoint speaks the Model Context Protocol over Streamable HTTP. Every call is authenticated with your existing API key.
Connect your client
Claude Desktop
Claude.ai
Cursor
Test with curl
Open your Claude Desktop config file:
macOS: ~/Library/Application Support/Claude/claude_desktop_config.json
Windows: %APPDATA%\Claude\claude_desktop_config.json
Add the Range server under mcpServers: {
"mcpServers" : {
"range" : {
"type" : "http" ,
"url" : "https://api.range.org/ai/mcp" ,
"headers" : {
"Authorization" : "Bearer your_api_key_here"
}
}
}
}
Restart Claude Desktop. You should see “range” appear in the tools panel (hammer icon). In Claude.ai , go to Settings → Integrations → Add MCP Server :
Name: Range
URL: https://api.range.org/ai/mcp
Authentication: Custom header
Header: Authorization
Value: Bearer your_api_key_here
Save and refresh. Range tools will be available in any new conversation. Open Cursor settings (Cmd/Ctrl + ,) and navigate to Features → MCP Servers . Add a new server: {
"range" : {
"type" : "http" ,
"url" : "https://api.range.org/ai/mcp" ,
"headers" : {
"Authorization" : "Bearer your_api_key_here"
}
}
}
Or add it to your .cursor/mcp.json file in any project directory to scope it per-project. Verify the endpoint is reachable and list all available tools: curl -X POST https://api.range.org/ai/mcp \
-H "Content-Type: application/json" \
-H "Accept: application/json, text/event-stream" \
-H "Authorization: Bearer your_api_key_here" \
-d '{"jsonrpc":"2.0","id":1,"method":"tools/list","params":{}}'
A successful response returns a JSON array of 21 tools.
Your first investigation
Once connected, paste this prompt into your AI client:
Investigate this wallet and tell me if I should be concerned about it:
5Q544fKrFoe6tsEbD7S8EmxGTJYAKtTVhAW5Q5pge4j1
Check its risk score, see if it's sanctioned, find its top counterparties,
and summarize what kind of entity this appears to be.
The AI will call get_address_risk, check_sanctions, get_address_connections, and get_address_info autonomously and return a structured summary.
Next steps
Tools Reference Browse all 21 tools with parameters and descriptions.
Investigation Playbook Learn the full step-by-step investigation workflow.