Scan of the redirect’s destination uri: https://www.virustotal.com/nl/url/56997e17858dd8d9e1f8962d5f6ba2044c60d0d6c141238406dbff5930bf717e/analysis/1406305758/
2 detect.
Opened up in Fetch.
See: http://fetch.scritch.org/%2Bfetch/?url=http%3A%2F%2Fifyoucan.ru%2Fmiss.php%3Fr%3Dwww.u-doka.ru%2F%26p%3D&useragent=Fetch+useragent&accept_encoding=
and the attached code - see script and location.replace

polonus

P.S. Pondus also alerted me to these scan results: http://urlquery.net/report.php?id=1406305864764
IP has quite some malsite domains: http://urlquery.net/report.php?id=1405961746872
ET CURRENT_EVENTS HTTP Request to a *.cu.cc domain
and some things we would expect when we found “bodisparking” browser search hijacker ad-fraud.
Does not surprise me one bit ???- we have landed in cyber-criminal ;D circles, my friend, with active and up malcode.

Damian