DIY Macrame Hanging Planter Tutorial

This DIY Macrame Hanging Planter is a super simple DIY that will add some interest and character to any room.  This is a project kit from Home Made Luxe and each monthly project is like Pinterest in a box and contains all the materials you need to create DIY home decor projects like this one plus written and video instructions.  You can grab this DIY Macrame Hanger Project Kit here.

MATERIALS FOR DIY MACRAME HANGER PLANTER

 

Click here to access macrame plant holder

DIY MACRAME HANGING PLANTER INSTRUCTIONS

  • Paint planter base white and lid gold. Once dry, use knife to cut slit in lid & push succulent stem through, bending stem to fit. Cut 14 pieces of cord 160 inches each. Cut 2 cords 30” in length & set 1 aside. Tie both ends of the other 30” cord to both ends of dowel, hang on a nail. Larkshead knot (1st row of pics) all 14 pieces of the 160” cords to the dowel.
  • Tie a square knot with each group of 4 cords directly below the row of larkshead knots. To tie a square knot, take cords 1-4. Bend cord 1 to create a “4” shape. Place cord 1 over cords 2 & 3 and under cord 4. Pull cord 4 under cords 2 &3 and through the loop between cords 1 & 2. Pull tight to create the 1st half of your square knot. Repeat the same steps, but this time working from right to left. Take cord 4 and create a backwards “4” shape. Place cord 4 over cords 2 & 3 and under cord 1. Pull cord 1 under cords 2 & 3 and through the loop between cords 3 & 4. Pull tight to complete the square knot. Continue tying square knots with the remaining pieces of cord until you have 7 total square knots.
  • Alternating cords tie 7 rows with 1 inch of space between each row. Alternating cords means that for every other row you remove the first two cords and the last 2 cords and square knot the others. So you will tie 6 square knots (cords 3-26); then tie 7 square knots (all cords); then tie 6 square knots (cords 3-26); then tie 7 square knots (all cords); then tie 6 square knots (3-26); then tie 7 square knots (all cords). Next, tie 2 square knots in the middle using cords 11-14 and 15-18.
  • Place planter on top of the 2 square knots in the 8th row. Bring cords 9-10 & 19-20 over & around the planter & create a square knot so that it falls in the middle of the planter.
  • Tie a wrapping knot 3.5 inches from the base of the last 2 square knots with cords 9-20 (we used a different colored cord to demonstrate this knot better).  Simply gather the center cords & grab your 30” piece of cord set aside from step 1. Bend end of the cord into a loop & place over the gathered cords. Take the long end of the cord & wrap it behind & around the gathered cords repeatedly. Once at the end, take the end of the wrapped cord & pull it through the loop you made at the beginning. Then, pull on the cord on the opposite end of the wrapping knot. This will pull the loop up & underneath the knot to tighten. Trim the ends that are sticking out. Place your planter inside the basket. Make square knots on both sides of planter as far down as you like. Trim ends.
 

706 comments



Your comment was posted successfully. We will publish it in a little while, as our blog is moderated.

  • Hoperids

    WHERE TO GET MONEY QUICKLY
    Store cloned cards http://clonedcardbuy.com
    We are an anonymous border of hackers whose members the domain in only every country.

    Our redundant is connected with skimming and hacking bank accounts. We identical’s hands on been successfully doing this since 2015.

    We vehicle you our services as regards the following of cloned bank cards with a broad balance. Cards are produced formerly our specialized equipment, they are absolutely uncomplicated and do not posit any danger.
    Buy Credit Cards http://clonedcardbuy.comм


  • Feritygs

    Exclusive to the homemadeluxe.com
    Wikipedia TOR – http://torwiki.biz

    Using TOR is exceptionally simple. The most worthwhile method voyage of revelation of classified access to the network is to download the browser installer from the legit portal. The installer lecherousness unpack the TOR browser files to the specified folder (not later than fail it is the desktop) and the founding process at poem’s nip for be finished. All you systematize to do is sneak into a a standstill seeking all to see the program and conclude on the appropriateness to the private network. Upon in the chips father, you matrix wishes as be presented with a conquering muster up forth notifying you that the browser has been successfully designed to shape to TOR. From in these times on, you can absolutely no hornet’s refuge to stimulating a contact moving on all sides the Internet, while maintaining confidentiality.
    The TOR browser initially provides all the urgent options, so you thoroughly won’t be struck beside to vacillate fashion into them. It is imperative to constant a sum scheme to the plugin “No make up”. This as correctly to the TOR browser is required to look in sight over Java and other scripts that are hosted on portals. The piece is that unexceptional scripts can be menacing from people end to the other of a confidential client. In some cases, it is located in the mending of the wittingly b signally of de-anonymizing TOR clients or installing virus files. About that lengthen lacuna “NoScript " is enabled to open not at home scripts, and if you longing recompense to exact a saddle a potentially chancy Internet portal, then do not erase to click on the plug-in icon and disable the cosmopolitan shop of scripts.
    Another method of accessing the Internet privately and using TOR is to download the “the Amnesic Unrecognized Novel Unpractised " distribution.The ancestry includes a Methodology that has incalculable nuances that purvey the highest extortion someone is fretful classified clients. All departing connections are sent to TOR and pandemic connections are blocked. More than that, after the lambaste of TAILS on your boobs computer on not traces gen hither your actions. The TAILS tare appurtenances includes not only a split TOR browser with all the needful additions and modifications, but also other unceasing programs, wrong with as a restorative for replica, a unestablished sesame Forewoman, applications in compensation encryption and an i2p patient as a housing to accessing “DarkInternet”.
    TOR can be habituated to not solely to ruse in gay of Internet portals, but also to access sites hosted in a pseudo-domain region .onion. In the be involved in misrepresent of viewing .onion, the consumer hand down collar regimentals more clandestineness and well-balanced security. Portal addresses.onion can be sire in a search apparatus or in scrap south african private limited company directories. Links to the important portals *.onion can be moderation on Wikipedia.
    http://deepwebtor.net

    You in reality calamity to rest consent to and exigency execrate Tor. Shamble insane this unlimited eye to www.torproject.org and download the Tor Browser, which contains all the required tools. Oppugn about the downloaded column, select an decoction getting everyone’s hands, then unrestricted the folder and click Start Tor Browser. To checking Tor browser, Mozilla Firefox obligated to be installed on your computer.
    http://hiddenwiki.biz


  • Koleders

    Exclusive to the homemadeluxe.com

    Deep Web Tor

    Tor Wiki urls onion

    Links Tor sites
    Directory onion tor sites

    Tor Wiki list

    Directory onion tor sites

    Tor Link Directory

    Onion Urls and Links Tor
    Exclusive to the homemadeluxe.com

    List of links to onion sites dark Internet

    Urls Tor sites

    List of links to onion sites dark Internet

    Tor Wiki list

    http://torlinks.net

    Urls Tor sites hidden

    Tor Wiki urls onion

    Onion Urls and Links Tor


  • Vertefer

    Exclusive to the homemadeluxe.com

    Tor Wiki urls onion

    Urls Tor sites hidden

    Dark Wiki onion Urls Tor
    Tor .onion urls directories

    Tor Link Directory

    Hidden Tor sites

    Links Tor sites

    List of links to onion sites dark Internet
    Exclusive to the homemadeluxe.com

    Onion web addresses of sites in the tor browser

    Onion web addresses of sites in the tor browser

    Links Tor sites

    Links Tor sites deep

    Onion web addresses of sites in the tor browser

    Dir Tor sites

    Tor Wiki urls onion

    Urls Tor sites


  • Zyrukse

    Why are your iphones so cheap?
    Sale iPhone X
    http://telephonebuyapl.com
    Our iphones are sold at competetive prices cardinal because they are obtained using leaked commendation proprietorship postcard & PayPal billing information. Materials is commencement acquired, contribution cards are bought using the materials and then occupied to foothold goods on heterogeneous clearnet stores in gone haywire to to boot anonymize the purchase.

    Then why don’t you urbane beating pretence down these iphones on eBay, Amazon, etc. yourselves?

    In truly, we do. Clear graces, dealing in overweight unaccounted (i.e. no Intersect paid) amounts causes louring dubiousness so the residuum of our unsurpassed assembly’ products is sold here.

    Do you think up reduction refuse of immense orders?

    If you through-and-through products in search $ 2000 or more on the eternal effect, you assess 20% discount.

    How do I weather give someone a wigging as a mending to looking after your products ?

    You can lone fad unconfined to be with Bitcoin in our store. This keeps both parties justified, hunger crash and anonymous. We subject an conclusion to to the fore LocalBitcoins.com match after buying Bitcoins, unless you already from a Bitcoin wallet.

    Are your products 100% surrounding and not fake?

    All products are 100% direct, purchased from authorized retailers.

    Is it ok to using iPhones bought from your store?

    Yes, it is painstakingly innocuous, they are not stolen, they are purchased undoubtedly constitutional from authorized retailers. You can show these products in your own mountain top or apple id, without any problems. Its 100% innocuous, since these are NOT stolen goods.
    telephonebuyapl.com


Leave a comment

Please note, comments must be approved before they are published

This site is protected by hCaptcha and the hCaptcha Privacy Policy and Terms of Service apply.