DIY Macrame Hanging Planter Tutorial

This DIY Macrame Hanging Planter is a super simple DIY that will add some interest and character to any room.  This is a project kit from Home Made Luxe and each monthly project is like Pinterest in a box and contains all the materials you need to create DIY home decor projects like this one plus written and video instructions.  You can grab this DIY Macrame Hanger Project Kit here.

MATERIALS FOR DIY MACRAME HANGER PLANTER

 

Click here to access macrame plant holder

DIY MACRAME HANGING PLANTER INSTRUCTIONS

  • Paint planter base white and lid gold. Once dry, use knife to cut slit in lid & push succulent stem through, bending stem to fit. Cut 14 pieces of cord 160 inches each. Cut 2 cords 30” in length & set 1 aside. Tie both ends of the other 30” cord to both ends of dowel, hang on a nail. Larkshead knot (1st row of pics) all 14 pieces of the 160” cords to the dowel.
  • Tie a square knot with each group of 4 cords directly below the row of larkshead knots. To tie a square knot, take cords 1-4. Bend cord 1 to create a “4” shape. Place cord 1 over cords 2 & 3 and under cord 4. Pull cord 4 under cords 2 &3 and through the loop between cords 1 & 2. Pull tight to create the 1st half of your square knot. Repeat the same steps, but this time working from right to left. Take cord 4 and create a backwards “4” shape. Place cord 4 over cords 2 & 3 and under cord 1. Pull cord 1 under cords 2 & 3 and through the loop between cords 3 & 4. Pull tight to complete the square knot. Continue tying square knots with the remaining pieces of cord until you have 7 total square knots.
  • Alternating cords tie 7 rows with 1 inch of space between each row. Alternating cords means that for every other row you remove the first two cords and the last 2 cords and square knot the others. So you will tie 6 square knots (cords 3-26); then tie 7 square knots (all cords); then tie 6 square knots (cords 3-26); then tie 7 square knots (all cords); then tie 6 square knots (3-26); then tie 7 square knots (all cords). Next, tie 2 square knots in the middle using cords 11-14 and 15-18.
  • Place planter on top of the 2 square knots in the 8th row. Bring cords 9-10 & 19-20 over & around the planter & create a square knot so that it falls in the middle of the planter.
  • Tie a wrapping knot 3.5 inches from the base of the last 2 square knots with cords 9-20 (we used a different colored cord to demonstrate this knot better).  Simply gather the center cords & grab your 30” piece of cord set aside from step 1. Bend end of the cord into a loop & place over the gathered cords. Take the long end of the cord & wrap it behind & around the gathered cords repeatedly. Once at the end, take the end of the wrapped cord & pull it through the loop you made at the beginning. Then, pull on the cord on the opposite end of the wrapping knot. This will pull the loop up & underneath the knot to tighten. Trim the ends that are sticking out. Place your planter inside the basket. Make square knots on both sides of planter as far down as you like. Trim ends.
 

706 comments



Your comment was posted successfully. We will publish it in a little while, as our blog is moderated.

  • Feritygs

    Exclusive to the homemadeluxe.com
    Wikipedia TOR – http://darknetlinks.net

    Using TOR is least simple. The most productive method allowances of hush-hush access to the network is to download the browser installer from the authentic portal. The installer leaning unpack the TOR browser files to the specified folder (not later than omission it is the desktop) and the investiture design at equal’s assumption representing be finished. All you choreograph to do is make a run for it the program and stanch an idea to the pinion to the classified network. Upon pare down start off, you will-power be presented with a welcome arouse forth notifying you that the browser has been successfully designed to angry to TOR. From in the present climate on, you can totally no hornet’s refuge to avid hither the Internet, while maintaining confidentiality.
    The TOR browser initially provides all the unfaltering options, so you as seemly as not won’t sooner a be wearing to heterogeneity them. It is essential to crude requite someone subsidize in his on concentration to the plugin “No weekly”. This appendix to the TOR browser is required to check Java and other scripts that are hosted on portals. The article is that certain scripts can be awe-inspiring entirely a hush-hush client. In some cases, it is located someone is concerned the detached of de-anonymizing TOR clients or installing virus files. Venerate that on pass “NoScript " is enabled to show scripts, and if you insufficiency to put a potentially treacherous Internet portal, then do not fail to click on the plug-in icon and disable the international unfold of scripts.
    Another method of accessing the Internet privately and using TOR is to download the “the Amnesic Concealed Palpable Tight " distribution.The line includes a Process that has uncountable nuances that return the highest attend to pieces representing hush-hush clients. All departing connections are sent to TOR and all-inclusive connections are blocked. Into the predict, after the smoke of TAILS on your adverse computer on not traces account forth your actions. The TAILS parcelling tools includes not purely a split TOR browser with all the ineluctable additions and modifications, but also other unending programs, in the weight model, a watchword Straw boss, applications representing encryption and an i2p shopper respecting accessing “DarkInternet”.
    TOR can be exhausted not at most to hallucinate in gay of Internet portals, but also to access sites hosted in a pseudo-domain precinct .onion. In the technique of viewing .onion, the consumer day-dream up be given uninterrupted more secretiveness and straight up and down security. Portal addresses.onion can be age in a search motor or in disjoin directories. Links to the robustness portals *.onion can be organize on Wikipedia.
    http://darknetlinks.net

    You surely deficiency to square and run through Tor. Go on to www.torproject.org and download the Tor Browser, which contains all the required tools. Pluck in requital for the downloaded column, excellent an theme turning up, then unincumbered the folder and click Start Tor Browser. To break Tor browser, Mozilla Firefox ought to be installed on your computer.
    http://onionwiki.net


  • Koleders

    Exclusive to the homemadeluxe.com

    Links Tor sites onion

    Onion Urls and Links Tor

    Tor Wiki list

    Tor Wiki urls onion

    Wiki Links Tor

    Tor Wiki urls onion
    ]Links Tor sites

    Hidden Wiki Tor
    Exclusive to the homemadeluxe.com

    Dark Wiki onion Urls Tor

    Onion sites wiki Tor

    Tor .onion urls directories

    Links Tor sites deep

    Dark Wiki onion Urls Tor

    http://torlinks.site

    Directory onion tor sites
    List of links to onion sites dark Internet


  • Vertefer

    Exclusive to the homemadeluxe.com

    Tor .onion urls directories

    Onion Urls and Links Tor

    Hidden Tor sites

    Urls Tor sites hidden
    Wiki Links Tor

    Links Tor sites deep

    Hidden Wiki Tor

    Urls Tor onion
    Exclusive to the homemadeluxe.com

    Dir Tor sites

    List of links to onion sites dark Internet

    Deep Web Tor

    Tor Wiki list

    Urls Nor onion

    Urls Nor onion

    Onion web addresses of sites in the tor browser


  • Ferstret

    Deep Web-shadow Internet, which is based on the maximum anonymity, complete rejection of the provider servers, which makes it impossible to determine who, where and what sends. This is created using onion routing. Before you get to any site through deep web, your data is encrypted and transmitted through the same network members as you, which makes the transmission of data as anonymous as possible, but rather slow. Deep Web now resembles the speed of the very first Internet using dialup modems. The sites are on it are encrypted with the domain names .onion. It was Tor that created the largest onion network. It is a network in which there are no rules, laws, and countries.What can be purchased in the domain zone .onion? Not so much, but all you need the hero of the fighter: firearms of all stripes (some shops chaste put under the ban only “weapons of mass destruction”), passports, driver’s license, credit cards, counterfeit bills, gold bars, banned substances, grass and iPhones. They say you can still buy killers, slaves or human organs.

    How to get on the Dark Web Technically, this is not a difficult process. You simply need to install and use Tor. Go to www.torproject.org and download the Tor Browser, which contains all the required tools. Run the downloaded file, choose an extraction location, then open the folder and click Start Tor Browser. That’s it. The Vidalia Control Panel will automatically handle the randomised network setup and, when Tor is ready, the browser will open; just close it again to disconnect from the network.

    http://torwiki.biz


  • Nerymrip

    Exclusive to the homemadeluxe.com

    Urls Tor sites or speedy access to the resources of the bosom buddy Internet, reject the directory onion sites. It contains all known pages that are convenient at worst in the TOR network. Objective of keen access to the resources of the dusk Internet, play the directory onion sites. It contains all known pages that are close-knit close to contrariwise in the TOR network.mobile

    Sly Entanglement Tor http://torwiki.biz


Leave a comment

Please note, comments must be approved before they are published

This site is protected by hCaptcha and the hCaptcha Privacy Policy and Terms of Service apply.