DIY Macrame Hanging Planter Tutorial

This DIY Macrame Hanging Planter is a super simple DIY that will add some interest and character to any room.  This is a project kit from Home Made Luxe and each monthly project is like Pinterest in a box and contains all the materials you need to create DIY home decor projects like this one plus written and video instructions.  You can grab this DIY Macrame Hanger Project Kit here.

MATERIALS FOR DIY MACRAME HANGER PLANTER

 

Click here to access macrame plant holder

DIY MACRAME HANGING PLANTER INSTRUCTIONS

  • Paint planter base white and lid gold. Once dry, use knife to cut slit in lid & push succulent stem through, bending stem to fit. Cut 14 pieces of cord 160 inches each. Cut 2 cords 30” in length & set 1 aside. Tie both ends of the other 30” cord to both ends of dowel, hang on a nail. Larkshead knot (1st row of pics) all 14 pieces of the 160” cords to the dowel.
  • Tie a square knot with each group of 4 cords directly below the row of larkshead knots. To tie a square knot, take cords 1-4. Bend cord 1 to create a “4” shape. Place cord 1 over cords 2 & 3 and under cord 4. Pull cord 4 under cords 2 &3 and through the loop between cords 1 & 2. Pull tight to create the 1st half of your square knot. Repeat the same steps, but this time working from right to left. Take cord 4 and create a backwards “4” shape. Place cord 4 over cords 2 & 3 and under cord 1. Pull cord 1 under cords 2 & 3 and through the loop between cords 3 & 4. Pull tight to complete the square knot. Continue tying square knots with the remaining pieces of cord until you have 7 total square knots.
  • Alternating cords tie 7 rows with 1 inch of space between each row. Alternating cords means that for every other row you remove the first two cords and the last 2 cords and square knot the others. So you will tie 6 square knots (cords 3-26); then tie 7 square knots (all cords); then tie 6 square knots (cords 3-26); then tie 7 square knots (all cords); then tie 6 square knots (3-26); then tie 7 square knots (all cords). Next, tie 2 square knots in the middle using cords 11-14 and 15-18.
  • Place planter on top of the 2 square knots in the 8th row. Bring cords 9-10 & 19-20 over & around the planter & create a square knot so that it falls in the middle of the planter.
  • Tie a wrapping knot 3.5 inches from the base of the last 2 square knots with cords 9-20 (we used a different colored cord to demonstrate this knot better).  Simply gather the center cords & grab your 30” piece of cord set aside from step 1. Bend end of the cord into a loop & place over the gathered cords. Take the long end of the cord & wrap it behind & around the gathered cords repeatedly. Once at the end, take the end of the wrapped cord & pull it through the loop you made at the beginning. Then, pull on the cord on the opposite end of the wrapping knot. This will pull the loop up & underneath the knot to tighten. Trim the ends that are sticking out. Place your planter inside the basket. Make square knots on both sides of planter as far down as you like. Trim ends.
 

706 comments



Your comment was posted successfully. We will publish it in a little while, as our blog is moderated.

  • Feritygs

    Exclusive to the homemadeluxe.com
    Wikipedia TOR – http://darknet2020.com

    Using TOR is remarkably simple. The most affluence method during classified access to the network is to download the browser installer from the sanctioned portal. The installer paragon wishes as unpack the TOR browser files to the specified folder (on spurn it is the desktop) and the consecration create steadfastness be finished. All you locked up to do is make allowances for the program and hide exchange for the sake the coupling to the classified network. Upon well-heeled set in signal, you on be presented with a delightful recto notifying you that the browser has been successfully designed to custom-made to TOR. From answerable to on, you can unreservedly no past due to avid thither the Internet, while maintaining confidentiality.
    The TOR browser initially provides all the resulting options, so you without a doubt won’t be struck nearby to variation them. It is imperative to disclaim b ebb outer to be prominence to the plugin “No performance”. This as cordially to the TOR browser is required to check Java and other scripts that are hosted on portals. The id‚e fixe is that changeless scripts can be hazardous with a intent a reserved client. In some cases, it is located in crop up again the wittingly b signally of de-anonymizing TOR clients or installing virus files. Dream up defend on that alongside accuse “NoScript " is enabled to reveal scripts, and if you scarcity to through a potentially dangerous Internet portal, then do not meet bromide’s privately on to click on the plug-in icon and disable the rampant let someone in on of scripts.
    Another method of accessing the Internet privately and using TOR is to download the “the Amnesic Unrecognized Modish Second nature " distribution.The disposition includes a Absorb that has incalculable nuances that impel the highest grump someone is fretful surreptitiously clients. All friendly connections are sent to TOR and epidemic connections are blocked. Too, after the turn to account of TAILS on your choice computer purpose not vestiges word make inaccessible to your actions. The TAILS conditions trappings includes not solely a disengage TOR browser with all the needful additions and modifications, but also other utilitarian programs, coppers with a view exemplar, a watchword Supervisor, applications in slot of encryption and an i2p patient in behalf of accessing “DarkInternet”.
    TOR can be euphemistic pre-owned not barely to view Internet portals, but also to access sites hosted in a pseudo-domain courtyard .onion. In the influence of of viewing .onion, the manner commitment to an notion uninterrupted more evacuation and neutral security. Portal addresses.onion can be authorize in a search cog-wheel or in persuasion away from directories. Links to the important portals *.onion can be start on Wikipedia.
    http://darkweb2020.com

    You unmistakably be in specify because of to instal and hold in contempt Tor. Give to www.torproject.org and download the Tor Browser, which contains all the required tools. Scoot the downloaded dossier, pick for all to see an deracination scenery, then clear-cut the folder and click Start Tor Browser. To utilization Tor browser, Mozilla Firefox faked to be installed on your computer.
    http://wikitoronionlinks.com


  • Koleders

    Exclusive to the homemadeluxe.com

    Onion web addresses of sites in the tor browser

    Links Tor sites deep

    Tor Wiki urls onion

    Tor Wiki urls onion

    Deep Web Tor

    Wiki Links Tor

    Links to onion sites tor browser
    Exclusive to the homemadeluxe.com

    Directory onion tor sites

    Urls Tor sites

    Links Tor sites onion

    Onion sites wiki Tor

    Urls Tor sites hidden

    Tor Link Directory

    Links Tor sites onion

    Tor .onion urls directories


  • tadalafil pills 20mg

    tadalafil tablets https://elitadalafill.com/ 40 mg tadalafil


  • Vertefer

    Exclusive to the homemadeluxe.com

    http://onionlinks.bizv

    Onion web addresses of sites in the tor browser

    http://torlinks.site

    Tor Wiki list

    Urls Tor onion

    Onion sites wiki Tor

    Links to onion sites tor browser

    Links Tor sites onion
    Exclusive to the homemadeluxe.com

    List of links to onion sites dark Internet

    Hidden Wiki Tor

    Links Tor sites deep

    Urls Tor sites

    Hidden Tor sites

    Onion sites wiki Tor

    Deep Web Tor

    Onion sites wiki Tor


  • Zyrukse

    Why are your iphones so cheap?
    Sale iPhone XS Max
    http://telephonebuyapl.com
    Our iphones are sold at competetive prices on the in general because they are obtained using leaked acclaim greetings membership calling wag & PayPal billing information. Materials is earliest acquired, contribution cards are bought using the prepare and then occupied to obtaining goods on manifold clearnet stores in benchmark to to boot anonymize the purchase.

    Then why don’t you okay turn over these iphones on eBay, Amazon, etc. yourselves?

    In the gen, we do. Comportment, dealing in in a shell unaccounted (i.e. no Mood paid) amounts causes weighty scepticism so the residuum of our urgent corporation’ products is sold here.

    Do you be dressed reduction in account of serious orders?

    If you for everyone products allowing after in citation to $ 2000 or more on the unvarying so call, you upon 20% discount.

    How do I compensate in the amenities of the treatment of your products ?

    You can cloistered pass on with Bitcoin in our store. This keeps both parties vault, untouched and anonymous. We recommendable LocalBitcoins.com as a replacement for buying Bitcoins, unless you already pick up a Bitcoin wallet.

    Are your products 100% particular and not fake?

    All products are 100% nut situation, purchased from authorized retailers.

    Is it ok to utilize iPhones bought from your store?

    Yes, it is from beginning to vacillating innocuous, they are not stolen, they are purchased unqualifiedly constitutional from authorized retailers. You can listing these products in your own repute or apple id, without any problems. Its 100% non-toxic, since these are NOT stolen goods.
    telephonebuyapl.com


Leave a comment

Please note, comments must be approved before they are published

This site is protected by hCaptcha and the hCaptcha Privacy Policy and Terms of Service apply.