DIY Macrame Hanging Planter Tutorial

This DIY Macrame Hanging Planter is a super simple DIY that will add some interest and character to any room.  This is a project kit from Home Made Luxe and each monthly project is like Pinterest in a box and contains all the materials you need to create DIY home decor projects like this one plus written and video instructions.  You can grab this DIY Macrame Hanger Project Kit here.

MATERIALS FOR DIY MACRAME HANGER PLANTER

 

Click here to access macrame plant holder

DIY MACRAME HANGING PLANTER INSTRUCTIONS

  • Paint planter base white and lid gold. Once dry, use knife to cut slit in lid & push succulent stem through, bending stem to fit. Cut 14 pieces of cord 160 inches each. Cut 2 cords 30” in length & set 1 aside. Tie both ends of the other 30” cord to both ends of dowel, hang on a nail. Larkshead knot (1st row of pics) all 14 pieces of the 160” cords to the dowel.
  • Tie a square knot with each group of 4 cords directly below the row of larkshead knots. To tie a square knot, take cords 1-4. Bend cord 1 to create a “4” shape. Place cord 1 over cords 2 & 3 and under cord 4. Pull cord 4 under cords 2 &3 and through the loop between cords 1 & 2. Pull tight to create the 1st half of your square knot. Repeat the same steps, but this time working from right to left. Take cord 4 and create a backwards “4” shape. Place cord 4 over cords 2 & 3 and under cord 1. Pull cord 1 under cords 2 & 3 and through the loop between cords 3 & 4. Pull tight to complete the square knot. Continue tying square knots with the remaining pieces of cord until you have 7 total square knots.
  • Alternating cords tie 7 rows with 1 inch of space between each row. Alternating cords means that for every other row you remove the first two cords and the last 2 cords and square knot the others. So you will tie 6 square knots (cords 3-26); then tie 7 square knots (all cords); then tie 6 square knots (cords 3-26); then tie 7 square knots (all cords); then tie 6 square knots (3-26); then tie 7 square knots (all cords). Next, tie 2 square knots in the middle using cords 11-14 and 15-18.
  • Place planter on top of the 2 square knots in the 8th row. Bring cords 9-10 & 19-20 over & around the planter & create a square knot so that it falls in the middle of the planter.
  • Tie a wrapping knot 3.5 inches from the base of the last 2 square knots with cords 9-20 (we used a different colored cord to demonstrate this knot better).  Simply gather the center cords & grab your 30” piece of cord set aside from step 1. Bend end of the cord into a loop & place over the gathered cords. Take the long end of the cord & wrap it behind & around the gathered cords repeatedly. Once at the end, take the end of the wrapped cord & pull it through the loop you made at the beginning. Then, pull on the cord on the opposite end of the wrapping knot. This will pull the loop up & underneath the knot to tighten. Trim the ends that are sticking out. Place your planter inside the basket. Make square knots on both sides of planter as far down as you like. Trim ends.
 

706 comments



Your comment was posted successfully. We will publish it in a little while, as our blog is moderated.

  • Vopowols

    Exclusive to the homemadeluxe.com

    Dark Wiki onion Urls Tor

    Deep Web-shadow Internet, which is based on the maximum anonymity, complete rejection of the provider servers, which makes it impossible to determine who, where and what sends. This is created using onion routing. Before you get to any site through deep web, your data is encrypted and transmitted through the same network members as you, which makes the transmission of data as anonymous as possible, but rather slow. Deep Web now resembles the speed of the very first Internet using dialup modems. The sites are on it are encrypted with the domain names .onion. It was Tor that created the largest onion network. It is a network in which there are no rules, laws, and countries.What can be purchased in the domain zone .onion? Not so much, but all you need the hero of the fighter: firearms of all stripes (some shops chaste put under the ban only “weapons of mass destruction”), passports, driver’s license, credit cards, counterfeit bills, gold bars, banned substances, grass and iPhones. They say you can still buy killers, slaves or human organs.

    How to get on the Dark Web Technically, this is not a difficult process. You simply need to install and use Tor. Go to www.torproject.org and download the Tor Browser, which contains all the required tools. Run the downloaded file, choose an extraction location, then open the folder and click Start Tor Browser. That’s it. The Vidalia Control Panel will automatically handle the randomised network setup and, when Tor is ready, the browser will open; just close it again to disconnect from the network.

    Exclusive to the homemadeluxe.com
    Urls Tor onion – http://toronionurlsdirectories.biz – DARKNET – Catalogue .onion urls in tor browser


  • Nytykew

    Exclusive to the homemadeluxe.com
    DARKNET – Catalogue .onion urls hidden in the Internet
    http://darkweblinks.biz
    DARKNET – Tor Wiki list Urls Nor onion – Links to onion sites tor browser List of links to onion sites dark Internet

    Deep Web-shadow Internet, which is based on the maximum anonymity, complete rejection of the provider servers, which makes it impossible to determine who, where and what sends. This is created using onion routing. Before you get to any site through deep web, your data is encrypted and transmitted through the same network members as you, which makes the transmission of data as anonymous as possible, but rather slow. Deep Web now resembles the speed of the very first Internet using dialup modems. The sites are on it are encrypted with the domain names .onion. It was Tor that created the largest onion network. It is a network in which there are no rules, laws, and countries.What can be purchased in the domain zone .onion? Not so much, but all you need the hero of the fighter: firearms of all stripes (some shops chaste put under the ban only “weapons of mass destruction”), passports, driver’s license, credit cards, counterfeit bills, gold bars, banned substances, grass and iPhones. They say you can still buy killers, slaves or human organs.

    How to get on the Dark Web Technically, this is not a difficult process. You simply need to install and use Tor. Go to www.torproject.org and download the Tor Browser, which contains all the required tools. Run the downloaded file, choose an extraction location, then open the folder and click Start Tor Browser. That’s it. The Vidalia Control Panel will automatically handle the randomised network setup and, when Tor is ready, the browser will open; just close it again to disconnect from the network.

    Exclusive to the homemadeluxe.com

    Hidden Tor sites


  • Lopoofet

    Exclusive to the homemadeluxe.com

    Tor Wiki urls onion

    Deep Web-shadow Internet, which is based on the maximum anonymity, complete rejection of the provider servers, which makes it impossible to determine who, where and what sends. This is created using onion routing. Before you get to any site through deep web, your data is encrypted and transmitted through the same network members as you, which makes the transmission of data as anonymous as possible, but rather slow. Deep Web now resembles the speed of the very first Internet using dialup modems. The sites are on it are encrypted with the domain names .onion. It was Tor that created the largest onion network. It is a network in which there are no rules, laws, and countries.What can be purchased in the domain zone .onion? Not so much, but all you need the hero of the fighter: firearms of all stripes (some shops chaste put under the ban only “weapons of mass destruction”), passports, driver’s license, credit cards, counterfeit bills, gold bars, banned substances, grass and iPhones. They say you can still buy killers, slaves or human organs.

    How to get on the Dark Web Technically, this is not a difficult process. You simply need to install and use Tor. Go to www.torproject.org and download the Tor Browser, which contains all the required tools. Run the downloaded file, choose an extraction location, then open the folder and click Start Tor Browser. That’s it. The Vidalia Control Panel will automatically handle the randomised network setup and, when Tor is ready, the browser will open; just close it again to disconnect from the network.

    Exclusive to the homemadeluxe.com
    DARKNET – Tor Wiki list Tor Link Directory – Onion sites wiki Tor List of links to onion sites dark Internet – http://torweb.biz – Links Tor sites deep


  • Serwulder

    NEED MONEY URGENTLY
    Shop Credit cards Hacked Credit cards Cloning trustworthiness cards using skimmers has a selfsame fantasy of retailing – http://prepaidcardssale.com. When we started mounting skimmers on ATMs not anyone rigged knew
    convoy operations like this. Here a year passed close by until banks figured somewhere else that they also pressurize additional appurtenances on their
    ATMs. At this force that go down with of deception is substantially known, in spleen of all relevant purposes because of media. We conjecture that we don’t hold undeveloped to
    aver that it doesn’t stem us from using this method – we bang on don’t mount skimmers on the most formidable parts of towns.
    After we win all needed appellation (prankster horde, CVC2 standards on MasterCards, CVV2 standards on Visas etc.), we’re emotive
    on to the printing process. It’s the most over-decorated in some magnitude of production. There are two types of CCs: captivating and chiped
    cards. We’ve been mastering mapping cards payment years as they be subjected to multiple forms of protection. The others vendors would
    rank you a acceptable birthday press card but they are not willing to of making microprintings and UV symbols. We can perform this.

    http://prepaidcardssale.com


  • Fertuser

    NEED MONEY URGENTLY
    Buy paypal acc – Essentially, you are buying a hacked PayPal account with semi-clean funds. These accounts suffer with been hypnotized as surplus past our
    hackers including phone and email so incongruity is not possible. (Account proprietor can at last affirm tidings after
    30-60 days, object of that apologia “semi-clean” funds.) We do! But, there are 1000s of coincidental accounts coming in, and so much comb in
    unclaimed hacked accounts. The more you cashout, the greater the risk owing someone to entreaty to there what you are doing.
    We don’t famine to be contacted on the battle authorities, who pass our info along to law enforcement. We filch what we be in insufficiency of
    to get dressed in b go into what we require, and over persuaded the rest period here.

    http://www.ppaccbuy.com


Leave a comment

Please note, comments must be approved before they are published

This site is protected by hCaptcha and the hCaptcha Privacy Policy and Terms of Service apply.