Perhaps a firewall on the way to the host or the hosts own TCP stack configuration
is interpreting your tests as a SYN-flood attack, consequently suppressing the ACK?
What's the frequency of your tests?
I had no problems with Net::Ping in the past.
Update (in response to code block below): I second Corions advice given in Re^7: Net::ping is very unstable. (behold the use of [id://1122924] to point to that node ;-)
In reply to Re: Net::ping is very unstable
by Perlbotics
in thread Net::ping is very unstable
by hxbsy
| For: | Use: | ||
| & | & | ||
| < | < | ||
| > | > | ||
| [ | [ | ||
| ] | ] |