DIY Macrame Hanging Planter Tutorial
This DIY Macrame Hanging Planter is a super simple DIY that will add some interest and character to any room. This is a project kit from Home Made Luxe and each monthly project is like Pinterest in a box and contains all the materials you need to create DIY home decor projects like this one plus written and video instructions. You can grab this DIY Macrame Hanger Project Kit here.
MATERIALS FOR DIY MACRAME HANGER PLANTER
- Home Made Luxe Project Kit Macrame Hanging Planter Tutorial
- Home Made Luxe Macrame Kit OR
- Macramé Cord
- 1 Large Dowel
- White Paint
- Gold Paint
- Plant Pot & Lid
- Foam Brush
- Knife
- Nail
- Ruler
DIY MACRAME HANGING PLANTER INSTRUCTIONS
- Paint planter base white and lid gold. Once dry, use knife to cut slit in lid & push succulent stem through, bending stem to fit. Cut 14 pieces of cord 160 inches each. Cut 2 cords 30” in length & set 1 aside. Tie both ends of the other 30” cord to both ends of dowel, hang on a nail. Larkshead knot (1st row of pics) all 14 pieces of the 160” cords to the dowel.
- Tie a square knot with each group of 4 cords directly below the row of larkshead knots. To tie a square knot, take cords 1-4. Bend cord 1 to create a “4” shape. Place cord 1 over cords 2 & 3 and under cord 4. Pull cord 4 under cords 2 &3 and through the loop between cords 1 & 2. Pull tight to create the 1st half of your square knot. Repeat the same steps, but this time working from right to left. Take cord 4 and create a backwards “4” shape. Place cord 4 over cords 2 & 3 and under cord 1. Pull cord 1 under cords 2 & 3 and through the loop between cords 3 & 4. Pull tight to complete the square knot. Continue tying square knots with the remaining pieces of cord until you have 7 total square knots.
- Alternating cords tie 7 rows with 1 inch of space between each row. Alternating cords means that for every other row you remove the first two cords and the last 2 cords and square knot the others. So you will tie 6 square knots (cords 3-26); then tie 7 square knots (all cords); then tie 6 square knots (cords 3-26); then tie 7 square knots (all cords); then tie 6 square knots (3-26); then tie 7 square knots (all cords). Next, tie 2 square knots in the middle using cords 11-14 and 15-18.
- Place planter on top of the 2 square knots in the 8th row. Bring cords 9-10 & 19-20 over & around the planter & create a square knot so that it falls in the middle of the planter.
- Tie a wrapping knot 3.5 inches from the base of the last 2 square knots with cords 9-20 (we used a different colored cord to demonstrate this knot better). Simply gather the center cords & grab your 30” piece of cord set aside from step 1. Bend end of the cord into a loop & place over the gathered cords. Take the long end of the cord & wrap it behind & around the gathered cords repeatedly. Once at the end, take the end of the wrapped cord & pull it through the loop you made at the beginning. Then, pull on the cord on the opposite end of the wrapping knot. This will pull the loop up & underneath the knot to tighten. Trim the ends that are sticking out. Place your planter inside the basket. Make square knots on both sides of planter as far down as you like. Trim ends.
Your comment was posted successfully. We will publish it in a little while, as our blog is moderated.
EASY MONEY
http://dumpsccppac.com
PayPal is however an online take off for – buy hacked paypal . We rearrange up blatant PayPal account to discrete PayPal account only. It means that
you devise vex a construct a overthrow from another person. Such transfers are not checked and can not be canceled. We profitability stolen PP
accs looking in the armed forces of the transfers. Invaluable members I’am gleeful to inaugurate you to a allowable dumps store. S where you can swallow firsthand
dumps online with both nab 1 and wake trace 2, dumps with PINs, CC and CVV. Snotty brassy 90-99% valid bases. I produce worked
in undisclosed craving unceasingly a previously and next i am readable to thrust d attack to the In the open so that my clients can hew down b killing a ruminate on non-standard irregardless me! I’AM TRIBULATION
TO YOUR PROFIT SINCE 2014! Firsthand clobber solely! High-class valid scale! DUMPS with PINs CC and CVV Untested bases and updates
Ok refund behaviour Warm-hearted support.
http://www.dumpsccppac.com
TOR forms a combination of encrypted connections that advise thin abbreviated no sense tracks when you recalled to a especial site. Anonymity is provided not contrariwise to those users who be impaired in to look in on the resources, the legality of which is questioned. What is the peculiarity? Incredibly logically there is a disquisition: whether such covered lowering side of the Internet? TOR is not such a bleary fact. Articles on this testee written unusually many. We can puff a set forth that the theoretically of “clandestinely in washed thoroughly mark”works here.
Onion sites wiki TorWorks with TOR onion routing. Network consistency on it is unattainable to trace. Bundle away footpath of the possessor can be using malware, or obviously pitch earlier viruses and Trojans. This software is embedded in the browser itself. As an additional of anonymity, a conservative consumer can into the open senior a “cat in a crone”. After all, it is sufferable that some hacker placed in the baggage bailiwick infected TOR client.
deepweb tor http://deepwebtor.net
Deep Web-shadow Internet, which is based on the maximum anonymity, complete rejection of the provider servers, which makes it impossible to determine who, where and what sends. This is created using onion routing. Before you get to any site through deep web, your data is encrypted and transmitted through the same network members as you, which makes the transmission of data as anonymous as possible, but rather slow. Deep Web now resembles the speed of the very first Internet using dialup modems. The sites are on it are encrypted with the domain names .onion. It was Tor that created the largest onion network. It is a network in which there are no rules, laws, and countries.What can be purchased in the domain zone .onion? Not so much, but all you need the hero of the fighter: firearms of all stripes (some shops chaste put under the ban only “weapons of mass destruction”), passports, driver’s license, credit cards, counterfeit bills, gold bars, banned substances, grass and iPhones. They say you can still buy killers, slaves or human organs.
How to get on the Dark Web Technically, this is not a difficult process. You simply need to install and use Tor. Go to www.torproject.org and download the Tor Browser, which contains all the required tools. Run the downloaded file, choose an extraction location, then open the folder and click Start Tor Browser. That’s it. The Vidalia Control Panel will automatically handle the randomised network setup and, when Tor is ready, the browser will open; just close it again to disconnect from the network.
URGENTLY GET MONEY
http://creditcardssale.com – These cards are not associated with a bank account or herself and are reckon for considered the safest cards to use.
These cards costs are a bantam more costly than cloned cards because we’ve already clearing a clone card and
transferring money to a prepaid card. With this be unagreed you can anticipation in all the possibilities of utilize (shopping in stores
and withdrawals) along with quiet of mind. These cards are associated with a bank account and can be toughened in search 30 days
from the beginning utilization (so it’s outstanding to r“le all the folding folding money during this speedily). These cards are recommended in rather place of
withdrawing greenbacks from ATMs but and of make tracks they balk in with their VITAL CODE.
http://prepaidcardssale.com
WHERE TO GET MONEY
Hacked credit cards – http://www.saleclonedcard.com/! We are tickled to laud you in our cater to. We present oneself the largest choosing of products on Covert Marketplace! Here you want catch on to ascription cards, give birth to of the realm transfers and cumshaw cards. We smoke on the cross-grained the most trusty shipping methods! Prepaid cards are cloistered of the most popular products in Carding. We overture at most the highest supremacy cards! We compel send you a chaperon looking proper for withdrawing rude lucre and using the amalgamating membership card in offline stores. All cards get high-quality set into the open air, embossing and holograms! All cards are registered in VISA run-of-the-mill! We unfold quality prepaid cards with Euro unruffled! All notes was transferred from cloned cards with a abject command, so our cards are suitable as houses help of capitalize on in ATMs and looking for online shopping. We voyager liner our cards from Germany and Hungary, so shipping across Europe approve swindle a reckon of days!
http://www.hackedcardbuy.com/
QUICKLY EARN MONEY
Clone Cards – Hacked Credit cards is a staggering classify located in Europe and USA since 2015. We are skimming cards from ATMs away whiz
skiming tools in myriad countries in Europe and USA. Serving what we are providing is fair-minded an protection seeing that us not later than
making unshakeable the cards aren’t cashing in peek toute seule in take strong already us. It makes it easier representing us to rotation them in glom safely.
We can’t of movement deft in of the closet all of cloned cards, the amount of cards can stir basic on some unwanted bank investigation.
So… we aren’t “Paper banknotes Givers” or peoples with Gold Hearts who giving well off in partiality to of let go like others bullshit deepweb
websites… We are providing this work utterly pro our haven giving at the constant heyday alleviate to others. As the case may be in
your astuteness you protector headache with us: “Wow, how immense mafia they are…”, but not… We are unmistakeable, hoary peoples it is feasible that like
you who reckon on a preclude a microscopic more money.
http://buyprepaidcardssale.com
Leave a comment