I don't think not using a stable version is related. The issue was present even before installing OpenWRT. That was one of the reasons I wanted to install OpenWRT in the first place, so I could get some more options to try and fix the issue.
I've did my sniffing while the PLC (192.168.144.252) was pinging the Shelly (192.168.144.9):
--- 192.168.144.9 ping statistics ---
50 packets transmitted, 29 packets received, 42% packet loss
round-trip min/avg/max = 1.573/3.898/9.488 ms
And here is the sniff filtered by ip.addr == 192.168.144.9 (the shelly).
90 1.190512 192.168.144.9 224.0.0.251 MDNS 486 Standard query response 0x0000 PTR shelly1-500291F089ED._http._tcp.local SRV, cache flush 0 0 80 shelly1-500291F089ED.local TXT, cache flush A, cache flush 192.168.144.9 NSEC, cache flush shelly1-500291F089ED.local
92 1.194882 192.168.144.9 224.0.0.251 MDNS 486 Standard query response 0x0000 PTR shelly1-500291F089ED._http._tcp.local SRV, cache flush 0 0 80 shelly1-500291F089ED.local TXT, cache flush A, cache flush 192.168.144.9 NSEC, cache flush shelly1-500291F089ED.local
267 4.627660 192.168.144.3 192.168.144.9 TCP 125 49720 → 80 [SYN] Seq=0 Win=65535 Len=0 MSS=1460 WS=64 TSval=397018169 TSecr=0 SACK_PERM=1
268 4.628999 192.168.144.3 192.168.144.9 TCP 125 [TCP Out-Of-Order] 49720 → 80 [SYN] Seq=0 Win=65535 Len=0 MSS=1460 WS=64 TSval=397018169 TSecr=0 SACK_PERM=1
270 4.630623 192.168.144.9 192.168.144.3 TCP 109 80 → 49720 [SYN, ACK] Seq=0 Ack=1 Win=2144 Len=0 MSS=536 SACK_PERM=1
271 4.630680 192.168.144.9 192.168.144.3 TCP 109 [TCP Out-Of-Order] 80 → 49720 [SYN, ACK] Seq=0 Ack=1 Win=2144 Len=0 MSS=536 SACK_PERM=1
272 4.631621 192.168.144.9 192.168.144.3 TCP 109 [TCP Out-Of-Order] 80 → 49720 [SYN, ACK] Seq=0 Ack=1 Win=2144 Len=0 MSS=536 SACK_PERM=1
274 4.632875 192.168.144.3 192.168.144.9 TCP 107 49720 → 80 [ACK] Seq=1 Ack=1 Win=65535 Len=0
276 4.633225 192.168.144.3 192.168.144.9 HTTP 493 GET /status HTTP/1.1
277 4.633582 192.168.144.3 192.168.144.9 TCP 493 [TCP Retransmission] 49720 → 80 [PSH, ACK] Seq=1 Ack=1 Win=65535 Len=392
282 4.680503 192.168.144.9 192.168.144.3 TCP 637 80 → 49720 [PSH, ACK] Seq=1 Ack=393 Win=1752 Len=536 [TCP segment of a reassembled PDU]
284 4.681275 192.168.144.3 192.168.144.9 TCP 107 49720 → 80 [ACK] Seq=393 Ack=537 Win=65535 Len=0
285 4.682826 192.168.144.3 192.168.144.9 TCP 107 [TCP Dup ACK 284#1] 49720 → 80 [ACK] Seq=393 Ack=537 Win=65535 Len=0
286 4.683575 192.168.144.3 192.168.144.9 TCP 107 [TCP Dup ACK 284#2] 49720 → 80 [ACK] Seq=393 Ack=537 Win=65535 Len=0
288 4.686350 192.168.144.9 192.168.144.3 HTTP/JSON 429 HTTP/1.1 200 OK , JavaScript Object Notation (application/json)
290 4.687003 192.168.144.3 192.168.144.9 TCP 107 49720 → 80 [ACK] Seq=393 Ack=865 Win=65535 Len=0
291 4.689037 192.168.144.3 192.168.144.9 TCP 107 [TCP Dup ACK 290#1] 49720 → 80 [ACK] Seq=393 Ack=865 Win=65535 Len=0
292 4.690231 192.168.144.3 192.168.144.9 TCP 107 [TCP Dup ACK 290#2] 49720 → 80 [ACK] Seq=393 Ack=865 Win=65535 Len=0
294 4.690275 192.168.144.3 192.168.144.9 TCP 107 49720 → 80 [FIN, ACK] Seq=393 Ack=865 Win=65535 Len=0
296 4.691829 192.168.144.9 192.168.144.3 TCP 101 80 → 49720 [ACK] Seq=865 Ack=394 Win=1751 Len=0
298 4.692084 192.168.144.9 192.168.144.3 TCP 101 [TCP Dup ACK 296#1] 80 → 49720 [ACK] Seq=865 Ack=394 Win=1751 Len=0
299 4.692866 192.168.144.9 192.168.144.3 TCP 101 [TCP Dup ACK 296#2] 80 → 49720 [ACK] Seq=865 Ack=394 Win=1751 Len=0
305 4.701931 192.168.144.9 192.168.144.3 TCP 101 [TCP Dup ACK 296#3] 80 → 49720 [ACK] Seq=865 Ack=394 Win=1751 Len=0
307 4.702443 192.168.144.9 192.168.144.3 TCP 101 80 → 49720 [FIN, ACK] Seq=865 Ack=394 Win=1751 Len=0
309 4.703204 192.168.144.3 192.168.144.9 TCP 107 49720 → 80 [ACK] Seq=394 Ack=866 Win=65535 Len=0
310 4.703769 192.168.144.3 192.168.144.9 TCP 107 [TCP Dup ACK 309#1] 49720 → 80 [ACK] Seq=394 Ack=866 Win=65535 Len=0
312 4.707824 192.168.144.3 192.168.144.9 TCP 107 [TCP Dup ACK 309#2] 49720 → 80 [ACK] Seq=394 Ack=866 Win=65535 Len=0
368 5.963839 192.168.144.252 192.168.144.9 ICMP 145 Echo (ping) request id=0x09d4, seq=0/0, ttl=64 (reply in 375)
375 5.967554 192.168.144.9 192.168.144.252 ICMP 145 Echo (ping) reply id=0x09d4, seq=0/0, ttl=255 (request in 368)
424 6.963816 192.168.144.252 192.168.144.9 ICMP 145 Echo (ping) request id=0x09d4, seq=1/256, ttl=64 (reply in 426)
426 6.965039 192.168.144.9 192.168.144.252 ICMP 145 Echo (ping) reply id=0x09d4, seq=1/256, ttl=255 (request in 424)
468 7.960033 192.168.144.252 192.168.144.9 ICMP 145 Echo (ping) request id=0x09d4, seq=2/512, ttl=64 (no response found!)
469 7.961409 192.168.144.252 192.168.144.9 ICMP 145 Echo (ping) request id=0x09d4, seq=2/512, ttl=64 (reply in 471)
471 7.962604 192.168.144.9 192.168.144.252 ICMP 145 Echo (ping) reply id=0x09d4, seq=2/512, ttl=255 (request in 469)
479 8.049918 192.168.144.9 192.168.144.3 TCP 109 63507 → 2001 [SYN] Seq=0 Win=2144 Len=0 MSS=536 SACK_PERM=1
481 8.062402 192.168.144.3 192.168.144.9 TCP 107 2001 → 63507 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
498 8.387168 192.168.144.9 192.168.144.254 DNS 123 Standard query 0xa300 A api.shelly.cloud
500 8.390446 192.168.144.254 192.168.144.9 DNS 139 Standard query response 0xa300 A api.shelly.cloud A 23.251.142.183
502 8.393559 192.168.144.9 23.251.142.183 TCP 109 50560 → 80 [SYN] Seq=0 Win=2144 Len=0 MSS=536 SACK_PERM=1
505 8.425866 23.251.142.183 192.168.144.9 TCP 109 80 → 50560 [SYN, ACK] Seq=0 Ack=1 Win=28400 Len=0 MSS=1420 SACK_PERM=1
507 8.427449 192.168.144.9 23.251.142.183 TCP 101 50560 → 80 [ACK] Seq=1 Ack=1 Win=2144 Len=0
513 8.434763 192.168.144.9 23.251.142.183 HTTP 255 GET /files/firmware?type=SHSW-1&device=shelly1-500291F089ED&fw=20210115-102904%2fv1.9.4%40e2732e05 HTTP/1.1
516 8.466905 23.251.142.183 192.168.144.9 TCP 107 80 → 50560 [ACK] Seq=1 Ack=155 Win=28944 Len=0
523 8.631830 23.251.142.183 192.168.144.9 TCP 637 80 → 50560 [ACK] Seq=1 Ack=155 Win=28944 Len=536 [TCP segment of a reassembled PDU]
524 8.632797 23.251.142.183 192.168.144.9 TCP 637 [TCP Retransmission] 80 → 50560 [ACK] Seq=1 Ack=155 Win=28944 Len=536
528 8.637602 192.168.144.9 23.251.142.183 TCP 101 [TCP ACKed unseen segment] 50560 → 80 [ACK] Seq=155 Ack=615 Win=1530 Len=0
530 8.643591 192.168.144.9 23.251.142.183 TCP 101 [TCP Window Update] [TCP ACKed unseen segment] 50560 → 80 [ACK] Seq=155 Ack=615 Win=2144 Len=0
532 8.643793 192.168.144.9 23.251.142.183 TCP 101 [TCP Dup ACK 528#1] [TCP ACKed unseen segment] 50560 → 80 [ACK] Seq=155 Ack=615 Win=2144 Len=0
534 8.644039 192.168.144.9 23.251.142.183 TCP 101 [TCP ACKed unseen segment] 50560 → 80 [FIN, ACK] Seq=155 Ack=615 Win=2144 Len=0
535 8.644334 192.168.144.9 23.251.142.183 TCP 101 [TCP ACKed unseen segment] [TCP Out-Of-Order] 50560 → 80 [FIN, ACK] Seq=155 Ack=615 Win=2144 Len=0
536 8.644677 192.168.144.9 23.251.142.183 TCP 101 [TCP ACKed unseen segment] [TCP Out-Of-Order] 50560 → 80 [FIN, ACK] Seq=155 Ack=615 Win=2144 Len=0
539 8.677839 23.251.142.183 192.168.144.9 TCP 107 [TCP Previous segment not captured] 80 → 50560 [FIN, ACK] Seq=615 Ack=156 Win=28944 Len=0
541 8.679414 192.168.144.9 23.251.142.183 TCP 101 [TCP ACKed unseen segment] 50560 → 80 [ACK] Seq=156 Ack=616 Win=2143 Len=0
557 8.959580 192.168.144.252 192.168.144.9 ICMP 145 Echo (ping) request id=0x09d4, seq=3/768, ttl=64 (reply in 559)
559 8.960593 192.168.144.9 192.168.144.252 ICMP 145 Echo (ping) reply id=0x09d4, seq=3/768, ttl=255 (request in 557)
586 9.641183 192.168.144.3 192.168.144.9 TCP 125 49721 → 80 [SYN] Seq=0 Win=65535 Len=0 MSS=1460 WS=64 TSval=397023155 TSecr=0 SACK_PERM=1
588 9.642543 192.168.144.9 192.168.144.3 TCP 109 80 → 49721 [SYN, ACK] Seq=0 Ack=1 Win=2144 Len=0 MSS=536 SACK_PERM=1
589 9.642851 192.168.144.9 192.168.144.3 TCP 109 [TCP Out-Of-Order] 80 → 49721 [SYN, ACK] Seq=0 Ack=1 Win=2144 Len=0 MSS=536 SACK_PERM=1
592 9.656575 192.168.144.3 192.168.144.9 TCP 107 49721 → 80 [ACK] Seq=1 Ack=1 Win=65535 Len=0
595 9.660977 192.168.144.3 192.168.144.9 TCP 107 [TCP Dup ACK 592#1] 49721 → 80 [ACK] Seq=1 Ack=1 Win=65535 Len=0
597 9.662746 192.168.144.3 192.168.144.9 TCP 107 [TCP Dup ACK 592#2] 49721 → 80 [ACK] Seq=1 Ack=1 Win=65535 Len=0
599 9.663310 192.168.144.3 192.168.144.9 HTTP 493 GET /status HTTP/1.1
600 9.663960 192.168.144.3 192.168.144.9 TCP 493 [TCP Retransmission] 49721 → 80 [PSH, ACK] Seq=1 Ack=1 Win=65535 Len=392
601 9.665377 192.168.144.3 192.168.144.9 TCP 493 [TCP Retransmission] 49721 → 80 [PSH, ACK] Seq=1 Ack=1 Win=65535 Len=392
604 9.717130 192.168.144.9 192.168.144.3 TCP 637 80 → 49721 [PSH, ACK] Seq=1 Ack=393 Win=1752 Len=536 [TCP segment of a reassembled PDU]
605 9.717519 192.168.144.9 192.168.144.3 TCP 637 [TCP Retransmission] 80 → 49721 [PSH, ACK] Seq=1 Ack=393 Win=1752 Len=536
606 9.718155 192.168.144.9 192.168.144.3 TCP 637 [TCP Retransmission] 80 → 49721 [PSH, ACK] Seq=1 Ack=393 Win=1752 Len=536
612 9.725016 192.168.144.9 192.168.144.3 TCP 637 [TCP Retransmission] 80 → 49721 [PSH, ACK] Seq=1 Ack=393 Win=1752 Len=536
615 9.728279 192.168.144.3 192.168.144.9 TCP 107 49721 → 80 [ACK] Seq=393 Ack=537 Win=65535 Len=0
616 9.729200 192.168.144.3 192.168.144.9 TCP 107 [TCP Dup ACK 615#1] 49721 → 80 [ACK] Seq=393 Ack=537 Win=65535 Len=0
618 9.732100 192.168.144.9 192.168.144.3 HTTP/JSON 457 HTTP/1.1 200 OK , JavaScript Object Notation (application/json)
619 9.732460 192.168.144.9 192.168.144.3 TCP 457 [TCP Retransmission] 80 → 49721 [PSH, ACK] Seq=537 Ack=393 Win=1752 Len=356
620 9.732904 192.168.144.9 192.168.144.3 TCP 457 [TCP Retransmission] 80 → 49721 [PSH, ACK] Seq=537 Ack=393 Win=1752 Len=356
626 9.741117 192.168.144.9 192.168.144.3 TCP 457 [TCP Retransmission] 80 → 49721 [PSH, ACK] Seq=537 Ack=393 Win=1752 Len=356
628 9.742486 192.168.144.3 192.168.144.9 TCP 107 49721 → 80 [ACK] Seq=393 Ack=893 Win=65535 Len=0
630 9.744878 192.168.144.9 192.168.144.3 TCP 101 80 → 49721 [FIN, ACK] Seq=893 Ack=393 Win=1752 Len=0
631 9.745283 192.168.144.9 192.168.144.3 TCP 101 [TCP Out-Of-Order] 80 → 49721 [FIN, ACK] Seq=893 Ack=393 Win=1752 Len=0
632 9.746004 192.168.144.9 192.168.144.3 TCP 101 [TCP Out-Of-Order] 80 → 49721 [FIN, ACK] Seq=893 Ack=393 Win=1752 Len=0
637 9.750992 192.168.144.3 192.168.144.9 TCP 107 49721 → 80 [FIN, ACK] Seq=393 Ack=893 Win=65535 Len=0
638 9.752772 192.168.144.3 192.168.144.9 TCP 107 [TCP Out-Of-Order] 49721 → 80 [FIN, ACK] Seq=393 Ack=893 Win=65535 Len=0
644 9.766269 192.168.144.9 192.168.144.3 TCP 101 [TCP Retransmission] 80 → 49721 [FIN, ACK] Seq=893 Ack=393 Win=1752 Len=0
646 9.766763 192.168.144.9 192.168.144.3 TCP 101 80 → 49721 [ACK] Seq=894 Ack=394 Win=1751 Len=0
648 9.767061 192.168.144.3 192.168.144.9 TCP 107 [TCP Retransmission] 49721 → 80 [FIN, ACK] Seq=393 Ack=894 Win=65535 Len=0
650 9.768289 192.168.144.9 192.168.144.3 TCP 101 [TCP Dup ACK 646#1] 80 → 49721 [ACK] Seq=894 Ack=394 Win=1751 Len=0
660 9.962310 192.168.144.252 192.168.144.9 ICMP 145 Echo (ping) request id=0x09d4, seq=4/1024, ttl=64 (reply in 662)
662 9.963391 192.168.144.9 192.168.144.252 ICMP 145 Echo (ping) reply id=0x09d4, seq=4/1024, ttl=255 (request in 660)
670 10.049484 192.168.144.9 224.0.1.187 CoAP 195 NON, MID:47424, Unknown 30, /cit/s
671 10.049601 192.168.144.9 224.0.1.187 CoAP 195 NON, MID:47424, Unknown 30, /cit/s
672 10.050492 192.168.144.9 224.0.1.187 CoAP 195 NON, MID:47424, Unknown 30, /cit/s
674 10.052516 192.168.144.9 224.0.1.187 CoAP 195 NON, MID:47424, Unknown 30, /cit/s
677 10.053336 192.168.144.9 224.0.1.187 CoAP 195 NON, MID:47424, Unknown 30, /cit/s
679 10.056401 192.168.144.9 224.0.1.187 CoAP 195 NON, MID:47424, Unknown 30, /cit/s
1191 20.965361 192.168.144.252 192.168.144.9 ICMP 145 Echo (ping) request id=0x09d4, seq=15/3840, ttl=64 (reply in 1193)
1193 20.966061 192.168.144.9 192.168.144.252 ICMP 145 Echo (ping) reply id=0x09d4, seq=15/3840, ttl=255 (request in 1191)
1239 21.963049 192.168.144.252 192.168.144.9 ICMP 145 Echo (ping) request id=0x09d4, seq=16/4096, ttl=64 (no response found!)
1240 21.965138 192.168.144.252 192.168.144.9 ICMP 145 Echo (ping) request id=0x09d4, seq=16/4096, ttl=64 (no response found!)
1241 21.966253 192.168.144.252 192.168.144.9 ICMP 145 Echo (ping) request id=0x09d4, seq=16/4096, ttl=64 (no response found!)
1242 21.966883 192.168.144.252 192.168.144.9 ICMP 145 Echo (ping) request id=0x09d4, seq=16/4096, ttl=64 (reply in 1244)
1244 21.967903 192.168.144.9 192.168.144.252 ICMP 145 Echo (ping) reply id=0x09d4, seq=16/4096, ttl=255 (request in 1242)
1292 22.966596 192.168.144.252 192.168.144.9 ICMP 145 Echo (ping) request id=0x09d4, seq=17/4352, ttl=64 (reply in 1294)
1294 22.967513 192.168.144.9 192.168.144.252 ICMP 145 Echo (ping) reply id=0x09d4, seq=17/4352, ttl=255 (request in 1292)
1356 23.963600 192.168.144.252 192.168.144.9 ICMP 145 Echo (ping) request id=0x09d4, seq=18/4608, ttl=64 (no response found!)
1357 23.964074 192.168.144.252 192.168.144.9 ICMP 145 Echo (ping) request id=0x09d4, seq=18/4608, ttl=64 (reply in 1364)
1364 23.970920 192.168.144.9 192.168.144.252 ICMP 145 Echo (ping) reply id=0x09d4, seq=18/4608, ttl=255 (request in 1357)
1414 24.963852 192.168.144.252 192.168.144.9 ICMP 145 Echo (ping) request id=0x09d4, seq=19/4864, ttl=64 (no response found!)
1415 24.964150 192.168.144.252 192.168.144.9 ICMP 145 Echo (ping) request id=0x09d4, seq=19/4864, ttl=64 (reply in 1417)
1417 24.965202 192.168.144.9 192.168.144.252 ICMP 145 Echo (ping) reply id=0x09d4, seq=19/4864, ttl=255 (request in 1415)
1421 25.067123 192.168.144.9 224.0.1.187 UDP 195 38496 → 10132 [BAD UDP LENGTH 3442 > IP PAYLOAD LENGTH] Len=3434
1423 25.069110 192.168.144.9 224.0.1.187 CoAP 195 NON, MID:47425, Unknown 30, /cit/s
1424 25.072518 192.168.144.9 224.0.1.187 CoAP 195 NON, MID:47425, Unknown 30, /cit/s
1498 26.035633 192.168.144.9 192.168.144.3 TCP 109 61600 → 2001 [SYN] Seq=0 Win=2144 Len=0 MSS=536 SACK_PERM=1
1500 26.036465 192.168.144.3 192.168.144.9 TCP 107 2001 → 61600 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
1547 26.967636 192.168.144.252 192.168.144.9 ICMP 145 Echo (ping) request id=0x09d4, seq=21/5376, ttl=64 (reply in 1549)
1549 26.968777 192.168.144.9 192.168.144.252 ICMP 145 Echo (ping) reply id=0x09d4, seq=21/5376, ttl=255 (request in 1547)
1550 26.968815 192.168.144.9 192.168.144.252 ICMP 145 Echo (ping) reply id=0x09d4, seq=21/5376, ttl=255
1551 26.969245 192.168.144.9 192.168.144.252 ICMP 145 Echo (ping) reply id=0x09d4, seq=21/5376, ttl=255
1616 27.964571 192.168.144.252 192.168.144.9 ICMP 145 Echo (ping) request id=0x09d4, seq=22/5632, ttl=64 (no response found!)
1618 27.965502 192.168.144.9 192.168.192.77 ICMP 145 Unknown ICMP (obsolete or malformed?)
1670 28.966742 192.168.144.252 192.168.144.9 ICMP 145 Echo (ping) request id=0x09d4, seq=23/5888, ttl=64 (reply in 1673)
1672 28.967715 192.168.144.9 192.168.144.252 ICMP 145 Echo (ping) reply id=0x8b80, seq=52237/3532, ttl=255
1673 28.967992 192.168.144.9 192.168.144.252 ICMP 145 Echo (ping) reply id=0x09d4, seq=23/5888, ttl=255 (request in 1670)
1674 28.968580 192.168.144.9 192.168.144.252 ICMP 145 Echo (ping) reply id=0x09d4, seq=23/5888, ttl=255
1726 29.965297 192.168.144.252 192.168.144.9 ICMP 145 Echo (ping) request id=0x09d4, seq=24/6144, ttl=64 (reply in 1728)
1728 29.966197 192.168.144.9 192.168.144.252 ICMP 145 Echo (ping) reply id=0x09d4, seq=24/6144, ttl=255 (request in 1726)
1791 30.965614 192.168.144.252 192.168.144.9 ICMP 145 Echo (ping) request id=0x09d4, seq=25/6400, ttl=64 (no response found!)
1792 30.965990 192.168.144.252 192.168.144.9 ICMP 145 Echo (ping) request id=0x09d4, seq=25/6400, ttl=64 (no response found!)
1794 30.966993 192.168.144.9 192.168.144.252 ICMP 145 Echo (ping) reply id=0x890d, seq=18513/20808, ttl=255
1795 30.967125 192.168.144.9 192.168.144.252 ICMP 145 Echo (ping) reply id=0x9e59, seq=33895/26500, ttl=255
1840 31.965671 192.168.144.252 192.168.144.9 ICMP 145 Echo (ping) request id=0x09d4, seq=26/6656, ttl=64 (reply in 1842)
1842 31.966589 192.168.144.9 192.168.144.252 ICMP 145 Echo (ping) reply id=0x09d4, seq=26/6656, ttl=255 (request in 1840)
1887 32.966189 192.168.144.252 192.168.144.9 ICMP 145 Echo (ping) request id=0x09d4, seq=27/6912, ttl=64 (no response found!)
1944 33.666129 192.168.144.3 192.168.144.9 TCP 125 49722 → 80 [SYN] Seq=0 Win=65535 Len=0 MSS=1460 WS=64 TSval=397047149 TSecr=0 SACK_PERM=1
1947 33.667823 192.168.144.9 192.168.144.3 TCP 109 80 → 49722 [SYN, ACK] Seq=0 Ack=1 Win=2144 Len=0 MSS=536 SACK_PERM=1
1949 33.668681 192.168.144.3 192.168.144.9 TCP 107 49722 → 80 [ACK] Seq=1 Ack=1 Win=65535 Len=0
1951 33.669291 192.168.144.3 192.168.144.9 HTTP 493 GET /status HTTP/1.1
1955 33.717879 192.168.144.9 192.168.144.3 TCP 637 80 → 49722 [PSH, ACK] Seq=1 Ack=393 Win=1752 Len=536 [TCP segment of a reassembled PDU]
1956 33.718324 192.168.144.9 192.168.144.3 TCP 637 [TCP Retransmission] 80 → 49722 [PSH, ACK] Seq=1 Ack=393 Win=1752 Len=536
1957 33.718722 192.168.144.9 192.168.144.3 TCP 637 [TCP Retransmission] 80 → 49722 [PSH, ACK] Seq=1 Ack=393 Win=1752 Len=536
1959 33.719647 192.168.144.3 192.168.144.9 TCP 107 49722 → 80 [ACK] Seq=393 Ack=537 Win=65535 Len=0
1965 33.733058 192.168.144.9 192.168.144.3 HTTP/JSON 457 HTTP/1.1 200 OK , JavaScript Object Notation (application/json)
1967 33.735782 192.168.144.3 192.168.144.9 TCP 107 49722 → 80 [ACK] Seq=393 Ack=893 Win=65535 Len=0
1969 33.736648 192.168.144.3 192.168.144.9 TCP 107 49722 → 80 [FIN, ACK] Seq=393 Ack=893 Win=65535 Len=0
1971 33.737633 192.168.144.9 192.168.144.3 TCP 101 [TCP Port numbers reused] 80 → 49722 [SYN, RST, PSH, URG, ECN] Seq=7448 Win=17596 Urg=52233[Malformed Packet]
1973 33.738985 192.168.144.9 192.168.144.3 TCP 101 80 → 49722 [FIN, ACK] Seq=1 Ack=1 Win=1751 Len=0
1975 33.739601 192.168.144.3 192.168.144.9 TCP 107 [TCP ACKed unseen segment] 49722 → 80 [ACK] Seq=394 Ack=894 Win=65535 Len=0
1993 33.966139 192.168.144.252 192.168.144.9 ICMP 145 Echo (ping) request id=0x09d4, seq=28/7168, ttl=64 (reply in 1995)
1995 33.967185 192.168.144.9 192.168.144.252 ICMP 145 Echo (ping) reply id=0x09d4, seq=28/7168, ttl=255 (request in 1993)
1996 33.967402 192.168.144.9 192.168.144.252 ICMP 145 Echo (ping) reply id=0x09d4, seq=28/7168, ttl=255
2038 34.636070 192.168.144.3 192.168.144.9 TCP 125 49723 → 80 [SYN] Seq=0 Win=65535 Len=0 MSS=1460 WS=64 TSval=397048113 TSecr=0 SACK_PERM=1
2040 34.637576 192.168.144.9 192.168.144.3 TCP 109 80 → 49723 [SYN, ACK] Seq=0 Ack=1 Win=2144 Len=0 MSS=536 SACK_PERM=1
2042 34.639099 192.168.144.3 192.168.144.9 TCP 107 49723 → 80 [ACK] Seq=1 Ack=1 Win=65535 Len=0
2044 34.639612 192.168.144.3 192.168.144.9 HTTP 493 GET /status HTTP/1.1
2049 34.687038 192.168.144.9 192.248.1.142 TCP 637 80 → 49723 [PSH, ACK] Seq=1 Ack=1 Win=1752 Len=536 [TCP segment of a reassembled PDU]
2050 34.687165 192.168.144.9 192.168.144.3 TCP 637 80 → 49723 [PSH, ACK] Seq=1 Ack=393 Win=1752 Len=536 [TCP segment of a reassembled PDU]
2052 34.688009 192.168.144.3 192.168.144.9 TCP 107 49723 → 80 [ACK] Seq=393 Ack=537 Win=65535 Len=0
2054 34.690306 192.168.144.9 192.168.144.3 TCP 457 80 → 49723 [PSH, ACK] Seq=537 Ack=393 Win=1752 Len=356 [TCP segment of a reassembled PDU]
2056 34.691123 192.168.144.3 192.168.144.9 TCP 107 49723 → 80 [ACK] Seq=393 Ack=893 Win=65535 Len=0
2058 34.691466 192.168.144.3 192.168.144.9 TCP 107 49723 → 80 [FIN, ACK] Seq=393 Ack=893 Win=65535 Len=0
2060 34.692855 192.168.144.9 192.168.144.3 TCP 101 80 → 49723 [ACK] Seq=893 Ack=394 Win=1751 Len=0
2061 34.693255 192.168.144.9 192.168.144.3 TCP 101 [TCP Dup ACK 2060#1] 80 → 49723 [ACK] Seq=893 Ack=394 Win=1751 Len=0
2063 34.694217 192.168.144.9 192.168.144.3 HTTP/JSON 101 HTTP/1.1 200 OK , JavaScript Object Notation (application/json)
2065 34.695115 192.168.144.3 192.168.144.9 TCP 107 49723 → 80 [ACK] Seq=394 Ack=894 Win=65535 Len=0
2078 34.966475 192.168.144.252 192.168.144.9 ICMP 145 Echo (ping) request id=0x09d4, seq=29/7424, ttl=64 (no response found!)
2079 34.966485 192.168.144.252 192.168.144.9 ICMP 145 Echo (ping) request id=0x09d4, seq=29/7424, ttl=64 (no response found!)
2080 34.966744 192.168.144.252 192.168.144.9 ICMP 145 Echo (ping) request id=0x09d4, seq=29/7424, ttl=64 (no response found!)
2081 34.967419 192.168.144.252 192.168.144.9 ICMP 145 Echo (ping) request id=0x09d4, seq=29/7424, ttl=64 (reply in 2084)
2084 34.968571 192.168.144.9 192.168.144.252 ICMP 145 Echo (ping) reply id=0x09d4, seq=29/7424, ttl=255 (request in 2081)
2085 34.969426 192.168.144.9 192.168.144.252 ICMP 145 Echo (ping) reply id=0x09d4, seq=29/7424, ttl=255
2142 35.967214 192.168.144.252 192.168.144.9 ICMP 145 Echo (ping) request id=0x09d4, seq=30/7680, ttl=64 (no response found!)
2145 35.968649 192.168.144.9 192.168.144.252 ICMP 145 Echo (ping) reply id=0x3dd4, seq=30/7680, ttl=255
2204 36.966979 192.168.144.252 192.168.144.9 ICMP 145 Echo (ping) request id=0x09d4, seq=31/7936, ttl=64 (no response found!)
2205 36.967547 192.168.144.252 192.168.144.9 ICMP 145 Echo (ping) request id=0x09d4, seq=31/7936, ttl=64 (no response found!)
2206 36.968307 192.168.144.252 192.168.144.9 ICMP 145 Echo (ping) request id=0x09d4, seq=31/7936, ttl=64 (reply in 2208)
2208 36.969306 192.168.144.9 192.168.144.252 ICMP 145 Echo (ping) reply id=0x09d4, seq=31/7936, ttl=255 (request in 2206)
And I've uploaded the entire .cap file here.
Now the very high pings I noticed while pinging my Mac via WiFi, although there was no packet loss, is also very strange. I'm starting to think the 2.4 Ghz radio on this unit is simply defective. Pinging the same Mac connected to the 5Ghz radio produces sub-second pings and also no packet loss.
PS: Shellies can't use 5ghz WiFi, only 2.4.