The unique identifier (ID) of the attack.
The list of attacks for a specified time period.
The end time of the attack, in Unix time in seconds.
The ARN (Amazon Resource Name) of the resource that was attacked.
The start time of the attack, in Unix time in seconds.