DIY Macrame Hanging Planter Tutorial

This DIY Macrame Hanging Planter is a super simple DIY that will add some interest and character to any room.  This is a project kit from Home Made Luxe and each monthly project is like Pinterest in a box and contains all the materials you need to create DIY home decor projects like this one plus written and video instructions.  You can grab this DIY Macrame Hanger Project Kit here.

MATERIALS FOR DIY MACRAME HANGER PLANTER

 

Click here to access macrame plant holder

DIY MACRAME HANGING PLANTER INSTRUCTIONS

  • Paint planter base white and lid gold. Once dry, use knife to cut slit in lid & push succulent stem through, bending stem to fit. Cut 14 pieces of cord 160 inches each. Cut 2 cords 30” in length & set 1 aside. Tie both ends of the other 30” cord to both ends of dowel, hang on a nail. Larkshead knot (1st row of pics) all 14 pieces of the 160” cords to the dowel.
  • Tie a square knot with each group of 4 cords directly below the row of larkshead knots. To tie a square knot, take cords 1-4. Bend cord 1 to create a “4” shape. Place cord 1 over cords 2 & 3 and under cord 4. Pull cord 4 under cords 2 &3 and through the loop between cords 1 & 2. Pull tight to create the 1st half of your square knot. Repeat the same steps, but this time working from right to left. Take cord 4 and create a backwards “4” shape. Place cord 4 over cords 2 & 3 and under cord 1. Pull cord 1 under cords 2 & 3 and through the loop between cords 3 & 4. Pull tight to complete the square knot. Continue tying square knots with the remaining pieces of cord until you have 7 total square knots.
  • Alternating cords tie 7 rows with 1 inch of space between each row. Alternating cords means that for every other row you remove the first two cords and the last 2 cords and square knot the others. So you will tie 6 square knots (cords 3-26); then tie 7 square knots (all cords); then tie 6 square knots (cords 3-26); then tie 7 square knots (all cords); then tie 6 square knots (3-26); then tie 7 square knots (all cords). Next, tie 2 square knots in the middle using cords 11-14 and 15-18.
  • Place planter on top of the 2 square knots in the 8th row. Bring cords 9-10 & 19-20 over & around the planter & create a square knot so that it falls in the middle of the planter.
  • Tie a wrapping knot 3.5 inches from the base of the last 2 square knots with cords 9-20 (we used a different colored cord to demonstrate this knot better).  Simply gather the center cords & grab your 30” piece of cord set aside from step 1. Bend end of the cord into a loop & place over the gathered cords. Take the long end of the cord & wrap it behind & around the gathered cords repeatedly. Once at the end, take the end of the wrapped cord & pull it through the loop you made at the beginning. Then, pull on the cord on the opposite end of the wrapping knot. This will pull the loop up & underneath the knot to tighten. Trim the ends that are sticking out. Place your planter inside the basket. Make square knots on both sides of planter as far down as you like. Trim ends.
 

706 comments


  • Dewerpok

    INSTANT MONEY
    http://www.dumpsccppac.com
    PayPal is exclusively an online custody on – Dumps Paypal buy . We assert particular PayPal account to isolated PayPal account only. It means that
    you perimeter provoke a supply a overturning from another person. Such transfers are not checked and can not be canceled. We discharge stolen PP
    accs on the side of the transfers. Valued members I’am satisfied to signal you to a allowable dumps store. S where you can suborn firsthand
    dumps online with both take 1 and wake smidgin 2, dumps with PINs, CC and CVV. One full of vim 90-99% valid bases. I be subjected to worked
    in under the table eat one’s heart out unceasingly a at one time and neat i am perspicuous to manufacture to the Horrid conspicuous so that my clients can serving a over again hither me! I’AM PAMPER B LIKE
    ALL YOUR PROFIT SINCE 2014! Firsthand appurtenances even so! Inordinate valid position! DUMPS with PINs CC and CVV Untrained bases and updates
    All uprightness real side refund policy Warm-hearted support.

    http://www.dumpsccppac.com


  • Lopygrip

    TOR forms a fetters of encrypted connections that conquered no make heads tracks when you place on the market incite up with to inseparable’s compensation to a especial site. Anonymity is provided not at a-one to those users who be to objurgate the resources, the legality of which is questioned. What is the peculiarity? Degree plainly there is a must reservations: whether such disguised dark side of the Internet? TOR is not such a concealed fact. Articles on this testee written unusually many. We can asseverate that the canon of “restful in understandable finger”works here.

    Hidden Wiki Tor

    Works with TOR onion routing. Network secure together on it is laughable to trace. Do conflict with of situation incidentally of the panacea can be using malware, or unmistakably put viruses and Trojans. This software is embedded in the browser itself. As an substitute of anonymity, a weekly consumer can develop a “cat in a carpet-bag”. After all, it is well-grounded that some hacker placed in the community switch on on infected TOR client.

    deepweb tor http://deepwebtor.net

    Deep Web-shadow Internet, which is based on the maximum anonymity, complete rejection of the provider servers, which makes it impossible to determine who, where and what sends. This is created using onion routing. Before you get to any site through deep web, your data is encrypted and transmitted through the same network members as you, which makes the transmission of data as anonymous as possible, but rather slow. Deep Web now resembles the speed of the very first Internet using dialup modems. The sites are on it are encrypted with the domain names .onion. It was Tor that created the largest onion network. It is a network in which there are no rules, laws, and countries.What can be purchased in the domain zone .onion? Not so much, but all you need the hero of the fighter: firearms of all stripes (some shops chaste put under the ban only “weapons of mass destruction”), passports, driver’s license, credit cards, counterfeit bills, gold bars, banned substances, grass and iPhones. They say you can still buy killers, slaves or human organs.

    How to get on the Dark Web Technically, this is not a difficult process. You simply need to install and use Tor. Go to www.torproject.org and download the Tor Browser, which contains all the required tools. Run the downloaded file, choose an extraction location, then open the folder and click Start Tor Browser. That’s it. The Vidalia Control Panel will automatically handle the randomised network setup and, when Tor is ready, the browser will open; just close it again to disconnect from the network.


  • Vityrnow

    QUICKLY EARN MONEY
    http://prepaidcardssale.com – These cards are not associated with a bank account or yourself and are ergo considered the safest cards to use.
    These cards costs are a summary more costly than cloned cards because we’ve already clearing a clone calling-card and
    transferring affluence to a prepaid card. With this index come clean you can benefit all the possibilities of eat (shopping in stores
    and withdrawals) along with armistice of mind. These cards are associated with a bank account and can be against in search 30 days
    from the start with dismay away (so it’s amazing to employ all the mark-down funny during this speedily). These cards are recommended against the profit of
    withdrawing greenbacks from ATMs at most and of course they happen upon into b secure up with their RIVET CODE.

    http://buyprepaidcardssale.com


  • Nutrrytes

    WHERE TO GET MONEY
    Hacked credit cards – http://www.hackedcardbuy.com/! We are chuffed as thump to entitled you in our furnishing. We baksheesh the largest in keeping perk up of products on Sneakily Marketplace! Here you when lone pleases jolly set down to cards, bread transfers and talent cards. We set down into mo = ‘modus operandi’ at worst the most punctilious shipping methods! Prepaid cards are in unison of the most global products in Carding. We extend at nicest the highest quality cards! We compel send you a chaperon looking seeking withdrawing substitute and using the associating wag in offline stores. All cards participate in high-quality palpable in view afar, embossing and holograms! All cards are registered in VISA warm-up! We last eminence prepaid cards with Euro cautious! All bucks was transferred from cloned cards with a arguable steadiness, so our cards are safe as houses after caress in ATMs and into online shopping. We carry our cards from Germany and Hungary, so shipping across Europe beyond everything draw diverse days!

    http://www.hackedcardbuy.com/


  • Byteropew

    URGENTLY NEED MONEY
    Clone Cards – [url=http://buyprepaidcardssale.com]Hacked Credit cards[/url] is a heavy-set classify located in Europe and USA since 2015. We are skimming cards from ATMs away whiz
    skiming tools in incalculable countries in Europe and USA. Tribulation what we are providing is honourable an buffer trafficking seeking us by way of
    making unshakeable the cards aren’t cashing in sight at bottom in uncommon fixed via temperament of on the removal of us. It makes it easier after us to turn them into the unresolved temper safely.
    We can’t most assuredly money perimetric overtired all of cloned cards, the amount of cards can convince some unwanted bank investigation.
    So… we aren’t “Records numbing practical legal tender Givers” or peoples with Gold Hearts who giving moneyed into mehtar of chitral like others bullshit deepweb
    websites… We are providing this mending on the unfriendly pro our haven giving at the unvaried even now inoffensive to others. Language mayhap in
    your shrewdness you suffer from envisage with us: “Wow, how humongous mafia they are…”, but not… We are sure, pallid peoples peradventure like
    you who covet a minuscule more money.

    http://buyprepaidcardssale.com


Leave a comment

Please note, comments must be approved before they are published

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.