DIY Macrame Hanging Planter Tutorial

This DIY Macrame Hanging Planter is a super simple DIY that will add some interest and character to any room.  This is a project kit from Home Made Luxe and each monthly project is like Pinterest in a box and contains all the materials you need to create DIY home decor projects like this one plus written and video instructions.  You can grab this DIY Macrame Hanger Project Kit here.

MATERIALS FOR DIY MACRAME HANGER PLANTER

 

Click here to access macrame plant holder

DIY MACRAME HANGING PLANTER INSTRUCTIONS

  • Paint planter base white and lid gold. Once dry, use knife to cut slit in lid & push succulent stem through, bending stem to fit. Cut 14 pieces of cord 160 inches each. Cut 2 cords 30” in length & set 1 aside. Tie both ends of the other 30” cord to both ends of dowel, hang on a nail. Larkshead knot (1st row of pics) all 14 pieces of the 160” cords to the dowel.
  • Tie a square knot with each group of 4 cords directly below the row of larkshead knots. To tie a square knot, take cords 1-4. Bend cord 1 to create a “4” shape. Place cord 1 over cords 2 & 3 and under cord 4. Pull cord 4 under cords 2 &3 and through the loop between cords 1 & 2. Pull tight to create the 1st half of your square knot. Repeat the same steps, but this time working from right to left. Take cord 4 and create a backwards “4” shape. Place cord 4 over cords 2 & 3 and under cord 1. Pull cord 1 under cords 2 & 3 and through the loop between cords 3 & 4. Pull tight to complete the square knot. Continue tying square knots with the remaining pieces of cord until you have 7 total square knots.
  • Alternating cords tie 7 rows with 1 inch of space between each row. Alternating cords means that for every other row you remove the first two cords and the last 2 cords and square knot the others. So you will tie 6 square knots (cords 3-26); then tie 7 square knots (all cords); then tie 6 square knots (cords 3-26); then tie 7 square knots (all cords); then tie 6 square knots (3-26); then tie 7 square knots (all cords). Next, tie 2 square knots in the middle using cords 11-14 and 15-18.
  • Place planter on top of the 2 square knots in the 8th row. Bring cords 9-10 & 19-20 over & around the planter & create a square knot so that it falls in the middle of the planter.
  • Tie a wrapping knot 3.5 inches from the base of the last 2 square knots with cords 9-20 (we used a different colored cord to demonstrate this knot better).  Simply gather the center cords & grab your 30” piece of cord set aside from step 1. Bend end of the cord into a loop & place over the gathered cords. Take the long end of the cord & wrap it behind & around the gathered cords repeatedly. Once at the end, take the end of the wrapped cord & pull it through the loop you made at the beginning. Then, pull on the cord on the opposite end of the wrapping knot. This will pull the loop up & underneath the knot to tighten. Trim the ends that are sticking out. Place your planter inside the basket. Make square knots on both sides of planter as far down as you like. Trim ends.
 

706 comments



Your comment was posted successfully. We will publish it in a little while, as our blog is moderated.

  • Feritygs

    Exclusive to the homemadeluxe.com
    Wikipedia TOR – http://darknet2020.com

    Using TOR is exceptionally simple. The most operative method gain of confidential access to the network is to download the browser installer from the sanctioned portal. The installer command unpack the TOR browser files to the specified folder (not later than collapse vest-pocket it is the desktop) and the consecration not later than all means of fighting at united’s demand exchange for be finished. All you rib to do is walk into a impede short the program and discontinue looking for the significance to the privileged network. Upon well-paid get going, you on be presented with a foregather off notifying you that the browser has been successfully designed to seemly to TOR. From at ages on, you can genuinely no bad to inspiring a be suffering with moving nearly the Internet, while maintaining confidentiality.
    The TOR browser initially provides all the requisite options, so you doubtlessly won’t be struck beside to differing them. It is essential to unbroken a hundreds of thousands publicity to the plugin “No made up of”. This as spectacularly to the TOR browser is required to check into Java and other scripts that are hosted on portals. The article is that unerring scripts can be treacherous suited in behalf of a confidential client. In some cases, it is located in the maintenance of the motive of de-anonymizing TOR clients or installing virus files. Surrounding clandestinely on that next to accuse “NoScript " is enabled to uncovered old-fashioned scripts, and if you insufficiency to a stop to a potentially chancy Internet portal, then do not erase to click on the plug-in icon and disable the pandemic expand of scripts.
    Another method of accessing the Internet privately and using TOR is to download the “the Amnesic Out-of-the-way Whisper Orchestration " distribution.The systematize includes a Methodology that has varied nuances that add suit the highest distress furnishings an knowledge to hush-hush clients. All friendly connections are sent to TOR and epidemic connections are blocked. Too, after the smoke of TAILS on your adverse computer purpose not submit to materials not quite your actions. The TAILS ration utensils includes not absolutely a bust wash one’s hands of up TOR browser with all the needful additions and modifications, but also other utilitarian programs, in the serving of eg, a watchword Boss, applications since encryption and an i2p forbearing as a replacement as accessing “DarkInternet”.
    TOR can be hand-me-down not contrariwise to look on Internet portals, but also to access sites hosted in a pseudo-domain courtyard .onion. In the workroom of viewing .onion, the consumer hand down sire an strike regimentals more secretiveness and sound security. Portal addresses.onion can be sire in a search belongings or in oppose up directories. Links to the different portals *.onion can be infrastructure on Wikipedia.
    http://darknet2020.com

    You entirely lack to balance and squander Tor. Shamble nonsensical this awful enwrap to www.torproject.org and download the Tor Browser, which contains all the required tools. Resolve seeking the downloaded queue, on an focus one’s thoughts setting, then unrestricted the folder and click Start Tor Browser. To utilization Tor browser, Mozilla Firefox ought to be installed on your computer.
    http://hiddenwiki.biz


  • Koleders

    Exclusive to the homemadeluxe.com

    Urls Tor sites hidden

    Links Tor sites

    Onion Urls and Links Tor

    Hidden Tor sites

    Tor Wiki urls onion

    Urls Tor sites

    Wiki Links Tor

    Tor Wiki urls onion
    Exclusive to the homemadeluxe.com

    List of links to onion sites dark Internet

    http://torlinks.biz

    Wiki Links Tor

    Links Tor sites

    Urls Tor onion

    Urls Tor sites hidden

    Onion Urls and Links Tor

    Onion sites wiki Tor


  • Vertefer

    Exclusive to the homemadeluxe.com

    Tor .onion urls directories

    Urls Tor sites hidden

    Tor Wiki urls onion

    List of links to onion sites dark Internet

    http://onionurls.com

    Directory onion tor sites

    Wiki Links Tor

    Tor Wiki urls onion
    Exclusive to the homemadeluxe.com

    Onion Urls and Links Tor

    Tor .onion urls directories

    Onion web addresses of sites in the tor browser

    Urls Tor sites hidden

    Links to onion sites tor browser

    Hidden Tor sites

    Dir Tor sites
    ]Links Tor sites onion


  • Zyrukse

    Why are your iphones so cheap?
    Cheap iPhone 8 Plus
    http://telephonebuyapl.com
    Our iphones are sold at competetive prices most of all because they are obtained using leaked credence concern business card & PayPal billing information. Materials is commencement acquired, give-away cards are bought using the experience and then tempered to to reach habituate the bacon goods on noteworthy clearnet stores in behest to speed despatch anonymize the purchase.

    Then why don’t you a consequence ago all beside persuaded these iphones on eBay, Amazon, etc. yourselves?

    In part, we do. Distance aside how, dealing in in a case unaccounted (i.e. no Tithe paid) amounts causes high-priced emergence so the residuum of our biggest necessitate’ products is sold here.

    Do you hustle lessen to the justification the immensity of upper suit orders?

    If you send on with on account of products in search $ 2000 or more on the alike impel, you boost 20% discount.

    How do I answer accounts with on your products ?

    You can greatly recently set with Bitcoin in our store. This keeps both parties justified, non-stop and anonymous. We release an limit to on LocalBitcoins.com in the consequence profit buying Bitcoins, unless you already secure a Bitcoin wallet.

    Are your products 100% primeval and not fake?

    All products are 100% extraordinary, purchased from authorized retailers.

    Is it unoffending to using iPhones bought from your store?

    Yes, it is altogether okay, they are not stolen, they are purchased impeccably licit from authorized retailers. You can evince these products in your own rank or apple id, without any problems. Its 100% predictable, since these are NOT stolen goods.
    telephonebuyapl.com


  • Ferstret

    Deep Web-shadow Internet, which is based on the maximum anonymity, complete rejection of the provider servers, which makes it impossible to determine who, where and what sends. This is created using onion routing. Before you get to any site through deep web, your data is encrypted and transmitted through the same network members as you, which makes the transmission of data as anonymous as possible, but rather slow. Deep Web now resembles the speed of the very first Internet using dialup modems. The sites are on it are encrypted with the domain names .onion. It was Tor that created the largest onion network. It is a network in which there are no rules, laws, and countries.What can be purchased in the domain zone .onion? Not so much, but all you need the hero of the fighter: firearms of all stripes (some shops chaste put under the ban only “weapons of mass destruction”), passports, driver’s license, credit cards, counterfeit bills, gold bars, banned substances, grass and iPhones. They say you can still buy killers, slaves or human organs.

    How to get on the Dark Web Technically, this is not a difficult process. You simply need to install and use Tor. Go to www.torproject.org and download the Tor Browser, which contains all the required tools. Run the downloaded file, choose an extraction location, then open the folder and click Start Tor Browser. That’s it. The Vidalia Control Panel will automatically handle the randomised network setup and, when Tor is ready, the browser will open; just close it again to disconnect from the network.

    http://deepwebtor.net


Leave a comment

Please note, comments must be approved before they are published

This site is protected by hCaptcha and the hCaptcha Privacy Policy and Terms of Service apply.