I'd start with a Layer1 topology diagram so I would understand what was physically connected to what.
Then I would document the Layer2 network: VLANs, STP priorities and aggregated links.
Then I would document the layer3 network: which IP addresses are where.
Based on this I would make sure there were no loops. Enable loop protect on all access switches and any other Layer2 config that needs fixing up.