You are using too much ACLs in your configuration. Keep in mind that, by default, traffic from higher security interface (inside) is allowed to lower security interface (outside) without the need for any ACL. The only ACL you need is for traffic comes from outside to inside in the inbound interface direction. The "out" keyword is rarely used and should be avoided as it is only used for specific scenarios. Also, remove the current NAT configs and just create a simple dynamic PAT using Auto-NAT for the inside subnet. Twice NAT is a bit complex and used for specific situations.
I suggest to use the following configs:
access-list Outside_IN extended permit icmp any any echo (Not recommended in production)
access-list Outside_IN extended permit icmp any any echo-reply
access-group Outside-IN in interface outside
object network Inside_Subnet
subnet 172.16.0.0 255.255.255.0
nat (inside,outside) dynamic interface
I also suggest to ping live machines rather than ASA's own interfaces.