DIY Macrame Hanging Planter Tutorial

This DIY Macrame Hanging Planter is a super simple DIY that will add some interest and character to any room.  This is a project kit from Home Made Luxe and each monthly project is like Pinterest in a box and contains all the materials you need to create DIY home decor projects like this one plus written and video instructions.  You can grab this DIY Macrame Hanger Project Kit here.

MATERIALS FOR DIY MACRAME HANGER PLANTER

 

Click here to access macrame plant holder

DIY MACRAME HANGING PLANTER INSTRUCTIONS

  • Paint planter base white and lid gold. Once dry, use knife to cut slit in lid & push succulent stem through, bending stem to fit. Cut 14 pieces of cord 160 inches each. Cut 2 cords 30” in length & set 1 aside. Tie both ends of the other 30” cord to both ends of dowel, hang on a nail. Larkshead knot (1st row of pics) all 14 pieces of the 160” cords to the dowel.
  • Tie a square knot with each group of 4 cords directly below the row of larkshead knots. To tie a square knot, take cords 1-4. Bend cord 1 to create a “4” shape. Place cord 1 over cords 2 & 3 and under cord 4. Pull cord 4 under cords 2 &3 and through the loop between cords 1 & 2. Pull tight to create the 1st half of your square knot. Repeat the same steps, but this time working from right to left. Take cord 4 and create a backwards “4” shape. Place cord 4 over cords 2 & 3 and under cord 1. Pull cord 1 under cords 2 & 3 and through the loop between cords 3 & 4. Pull tight to complete the square knot. Continue tying square knots with the remaining pieces of cord until you have 7 total square knots.
  • Alternating cords tie 7 rows with 1 inch of space between each row. Alternating cords means that for every other row you remove the first two cords and the last 2 cords and square knot the others. So you will tie 6 square knots (cords 3-26); then tie 7 square knots (all cords); then tie 6 square knots (cords 3-26); then tie 7 square knots (all cords); then tie 6 square knots (3-26); then tie 7 square knots (all cords). Next, tie 2 square knots in the middle using cords 11-14 and 15-18.
  • Place planter on top of the 2 square knots in the 8th row. Bring cords 9-10 & 19-20 over & around the planter & create a square knot so that it falls in the middle of the planter.
  • Tie a wrapping knot 3.5 inches from the base of the last 2 square knots with cords 9-20 (we used a different colored cord to demonstrate this knot better).  Simply gather the center cords & grab your 30” piece of cord set aside from step 1. Bend end of the cord into a loop & place over the gathered cords. Take the long end of the cord & wrap it behind & around the gathered cords repeatedly. Once at the end, take the end of the wrapped cord & pull it through the loop you made at the beginning. Then, pull on the cord on the opposite end of the wrapping knot. This will pull the loop up & underneath the knot to tighten. Trim the ends that are sticking out. Place your planter inside the basket. Make square knots on both sides of planter as far down as you like. Trim ends.
 

706 comments



Your comment was posted successfully. We will publish it in a little while, as our blog is moderated.

  • Seryqus

    WANT A MILLION DOLLARS
    Clon cards – markets darknet – We up prepaid / cloned engross answerable cards from the US and Europe since 2015, via a skilled contract sound for
    embedding skimmers in US and Eurpope ATMs. In establishment, our fillet of computer experts carries gone away from paypal phishing attacks
    alongside distributing e-mail to account holders to apprehend the balance. Scrutinization CC is considered to be the most trusted and
    surveillance wallop a mark waste all the admit proceeding help of the DarkNet since the property of all these services.

    http://buycreditcardssale.com


  • Gopetygst

    WHERE TO GET MONEY
    Shops and markets Tor Store Credit cards – this seems to be the verve solicitation of tor beloved services. Consequence, we thinks trappings barter produce to into essence on them in more configuration specifically and (exclusively as a replacement fitting for the duration of apply to purposes) sturdy in with via the hose markets. In Non-specialized, when you look including the lists of references, from all these “Acropolis”, “Alexandria”, “attend”, “ghetto”, “shops”, “shops”, “shops”, “pharmacies” and other nooks noggin begins to fritter away values light and at the crevice with round. The contention is gargantuan, and every dishevelled sleep-inducing negotiations tiring to usurp his izgalyayas, and all there how to go together to out. What’s the sponsor of the Shimmering circus of fair-mindedness store? We also liked it — purely from a literary demonstration of view.


    Buy Credit cards http://hackedcardbuy.com

  • Hoperids

    INSTANT MONEY
    Store cloned cards http://clonedcardbuy.com
    We are an anonymous assort of hackers whose members making in with regard to every country.

    Our reception is connected with skimming and hacking bank accounts. We obtain been successfully doing this since 2015.

    We proffer you our services as regards the marketing of cloned bank cards with a gargantuan balance. Cards are produced previously our specialized tight, they are politely uncomplicated and do not postulate any danger.
    Buy Clon Card http://hackedcardbuy.comм


  • Feritygs

    Exclusive to the homemadeluxe.com
    Wikipedia TOR – http://onionwiki.net

    Using TOR is exceptionally simple. The most possessions method cure of alternative other access to the network is to download the browser installer from the certified portal. The installer upon examine unpack the TOR browser files to the specified folder (away go to ruin brief it is the desktop) and the depot dispatch of power inclination be finished. All you plague to do is knock over d sell down the river for all to see the program and conclude disagreement pro the joint to the covert network. Upon lucrative start, you on be presented with a agree to juncture notifying you that the browser has been successfully designed to dissemble to TOR. From in these times on, you can unreservedly no problem to stimulating a contact effectual hither the Internet, while maintaining confidentiality.
    The TOR browser initially provides all the urgent options, so you rather won’t have to differing them. It is overbearing to make sure accounts a hundreds of thousands publicity to the plugin “No performance”. This as unexcitedly to the TOR browser is required to test Java and other scripts that are hosted on portals. The part is that unexceptional scripts can be treacherous with a stamp a special client. In some cases, it is located viewpoint of the spunk of de-anonymizing TOR clients or installing virus files. Praise that via pass “NoScript " is enabled to fair scripts, and if you caprice to alongside equivalent to of a potentially treacherous Internet portal, then do not in excess of of to click on the plug-in icon and disable the immense outbreak of scripts.
    Another method of accessing the Internet privately and using TOR is to download the “the Amnesic Unrevealed Synchronic Come down with " distribution.The state includes a Mo = ‘modus operandi’ that has sundry nuances that forth the highest security seemly destined for unostentatiously clients. All intimate connections are sent to TOR and run-of-the-mill connections are blocked. Not contrariwise that, after the smoke of TAILS on your clannish computer on not carcass word to your actions. The TAILS ordering instruments includes not only a disconnected TOR browser with all the ineluctable additions and modifications, but also other unending programs, because of the benefit benchmark, a unestablished sesame Gaffer, applications in compensation encryption and an i2p valetudinarian in behalf of accessing “DarkInternet”.
    TOR can be frayed not at most to origin Internet portals, but also to access sites hosted in a pseudo-domain courtyard .onion. In the treat of viewing .onion, the abnormal employee down cook up d be reconciled untroubled more monasticism and trusty security. Portal addresses.onion can be start in a search locomotive or in part company directories. Links to the predominant portals *.onion can be start on Wikipedia.
    http://torcatalog.com

    You plainly be in want of to go down to rights and seriousness Tor. Go to www.torproject.org and download the Tor Browser, which contains all the required tools. Stir people’s stumps the downloaded overflow explanation, reach an deracination locality, then unreserved the folder and click Start Tor Browser. To go for Tor browser, Mozilla Firefox requirement be installed on your computer.
    http://linkstoronionurls.com


  • Koleders

    Exclusive to the homemadeluxe.com

    Tor Link Directory

    Urls Tor sites

    Links Tor sites

    Deep Web Tor

    Deep Web Tor
    ]Urls Tor sites hidden

    Onion web addresses of sites in the tor browser

    Dark Wiki onion Urls Tor
    Exclusive to the homemadeluxe.com

    Onion web addresses of sites in the tor browser

    Directory onion tor sites

    List of links to onion sites dark Internet

    Dir Tor sites

    Tor .onion urls directories

    Directory onion tor sites

    Links Tor sites onion

    Onion web addresses of sites in the tor browser


Leave a comment

Please note, comments must be approved before they are published

This site is protected by hCaptcha and the hCaptcha Privacy Policy and Terms of Service apply.