You can't validate the range of a private key using the public key without help of someone who knows the key or doing something stupid like constructing the keys as easily guessed offsets. In the case of the offsets there is only one real secret.
If you could determine a meaningful range from the pubkey alone you could use that to solve for the private key.
With the help of someone knowing the secret they could prove it was in a range using a confidential-transactions like zero knowledge range proof. (which is exactly what CT does... proves the values are in a range like [0,2^32) that couldn't overflow.)