{"responseData":{"translatedText":"haza\u00f1a","match":0.99},"quotaFinished":false,"mtLangSupported":null,"responseDetails":"","responseStatus":200,"responderId":null,"exception_code":null,"matches":[{"id":"433540443","segment":"exploit","translation":"haza\u00f1a","source":"fr-FR","target":"es-ES","quality":"74","reference":null,"usage-count":3,"subject":"All","created-by":"MateCat","last-updated-by":"MateCat","create-date":"2016-09-07 10:01:51","last-update-date":"2016-09-07 10:01:51","match":0.99,"penalty":0},{"id":"387260653","segment":"Exploit","translation":"Troyano","source":"fr-FR","target":"es-ES","quality":"0","reference":null,"usage-count":2,"subject":"Computer_Science","created-by":"MatteoT","last-updated-by":"MatteoT","create-date":"2016-11-24 14:04:51","last-update-date":"2016-11-24 14:04:51","match":0.97,"penalty":0},{"id":"428139046","segment":"Exploit","translation":"Exploit","source":"fr-FR","target":"es-ES","quality":"80","reference":null,"usage-count":2,"subject":"All","created-by":"Wikipedia","last-updated-by":"Wikipedia","create-date":"2014-04-29 15:31:26","last-update-date":"2014-04-29 15:31:26","match":0.97,"penalty":0}]}