subResources

If applicable, additional detail about the resource being attacked, for example, IP address or URL.