when i used words "close the ecos..app" or "start the ecos..app" , i meant to close/start the web-browser app that you are using to access/test the ecos...org website.
website needs an app : HTTP-client app (aka: web-browser app), to connect with it.
As some (web-browser, net-diagnostics, etc) app do use their own different recursive/caching DNS server, so caching dns-servers traffic also need to be blocked.
your web-browser(s) are your app, command line tools inside your Terminal (or Shell) which you use for this test+block purpose are your app.
what i'm talking about is, how to stop unwanted websites (domain-names, sub-domain names, etc), in various or all apps that we use in our computer completely, or stop unwanted websites completely from router config.
Many users dont like when various web-crawlers coming from cloudflare type of cloud hosts, & steals/takes-away web-server data, etc.
There are various+MANY web tools & standalone tools that can reveal all hosts name , sub-domains, ip-address, etc etc used by a domain or sub-domain or a host, etc , even if its under a cloudflare/cloudfront, etc dns managed.
https://subdomains.whoisxmlapi.com/ (they have other services).
search there your test domain : ecos...org
in my side result showed it has 63 sub-domains etc : https://subdomains.whoisxmlapi.com/lookup-report/mwkWgz7DkK
also try these :
https://www.ipaddress.com/search/
https://securitytrails.com/dns-trails
https://github.com/jobertabma/virtual-host-discovery
https://pentest-tools.com/information-gathering/find-virtual-hosts
if you want to block those (unwanted sites) only in one computer, then goto /etc/hosts or /private/etc/host file, and/or use PF firewall (if it is a mac computer).
if you want to block those (unwanted sites) for all computers under your LAN side, etc, then goto router, setup firewall rules to drop packets for those unwanted web-sites.
in windows, anyone can very easily downlaod free firewall app from Comodo, & start protecting their windows computer.
Even w/o using Comodo firewall, a windows-user can directly configure Windows firewall rules, to make it more safe.
but apple ppl / mac devs , etc made it very hard , complicated.
As if (harmful) hackers telepathically knows which is mac computer & will not do port scan etc to find holes,
or As if mac computer user dont need their own overriding blocking rules for their protection.
everything has plus & minus side.
To make an effective block (of those unwanted websites), you also have to find & block all public CACHING DNS server's ip-address and their host/domain-name also if exists.
But you must not block any root dns servers, TLD (aka 2nd-Level) dns servers.
You can use the macOS's builtin PF firewall :
https://apple.stackexchange.com/questions/230209/how-do-i-drop-outgoing-packets-to-specific-host-port (2016)
https://iyanmv.medium.com/setting-up-correctly-packet-filter-pf-firewall-on-any-macos-from-sierra-to-big-sur-47e70e062a0e (2021)
https://apple.stackexchange.com/questions/350579/how-to-configure-macos-firewall-to-block-outgoing-ip-ranges (2019)
https://blog.neilsabol.site/post/quickly-easily-adding-pf-packet-filter-firewall-rules-macos-osx/ (2018)
https://manjusri.ucsc.edu/2015/03/10/PF-on-Mac-OS-X/ (2015/old)
or use any one of the paid software pf firewall wrapper apps to use macOS's pf firewall.
https://www.macupdate.com/best-picks/mac-firewall (2021)
https://apple.stackexchange.com/questions/86517/firewall-for-outgoing-connections (2013/old)
if your computer is assigned a fixed ip-address by your DHCP in Router (or you manually set a fixed ip-adrs inside network-adapter), then in router's firewall rules, you can easily specify for which local computer you want to drop outbound unwanted sites.