DIY Macrame Hanging Planter Tutorial

This DIY Macrame Hanging Planter is a super simple DIY that will add some interest and character to any room.  This is a project kit from Home Made Luxe and each monthly project is like Pinterest in a box and contains all the materials you need to create DIY home decor projects like this one plus written and video instructions.  You can grab this DIY Macrame Hanger Project Kit here.

MATERIALS FOR DIY MACRAME HANGER PLANTER

 

Click here to access macrame plant holder

DIY MACRAME HANGING PLANTER INSTRUCTIONS

  • Paint planter base white and lid gold. Once dry, use knife to cut slit in lid & push succulent stem through, bending stem to fit. Cut 14 pieces of cord 160 inches each. Cut 2 cords 30” in length & set 1 aside. Tie both ends of the other 30” cord to both ends of dowel, hang on a nail. Larkshead knot (1st row of pics) all 14 pieces of the 160” cords to the dowel.
  • Tie a square knot with each group of 4 cords directly below the row of larkshead knots. To tie a square knot, take cords 1-4. Bend cord 1 to create a “4” shape. Place cord 1 over cords 2 & 3 and under cord 4. Pull cord 4 under cords 2 &3 and through the loop between cords 1 & 2. Pull tight to create the 1st half of your square knot. Repeat the same steps, but this time working from right to left. Take cord 4 and create a backwards “4” shape. Place cord 4 over cords 2 & 3 and under cord 1. Pull cord 1 under cords 2 & 3 and through the loop between cords 3 & 4. Pull tight to complete the square knot. Continue tying square knots with the remaining pieces of cord until you have 7 total square knots.
  • Alternating cords tie 7 rows with 1 inch of space between each row. Alternating cords means that for every other row you remove the first two cords and the last 2 cords and square knot the others. So you will tie 6 square knots (cords 3-26); then tie 7 square knots (all cords); then tie 6 square knots (cords 3-26); then tie 7 square knots (all cords); then tie 6 square knots (3-26); then tie 7 square knots (all cords). Next, tie 2 square knots in the middle using cords 11-14 and 15-18.
  • Place planter on top of the 2 square knots in the 8th row. Bring cords 9-10 & 19-20 over & around the planter & create a square knot so that it falls in the middle of the planter.
  • Tie a wrapping knot 3.5 inches from the base of the last 2 square knots with cords 9-20 (we used a different colored cord to demonstrate this knot better).  Simply gather the center cords & grab your 30” piece of cord set aside from step 1. Bend end of the cord into a loop & place over the gathered cords. Take the long end of the cord & wrap it behind & around the gathered cords repeatedly. Once at the end, take the end of the wrapped cord & pull it through the loop you made at the beginning. Then, pull on the cord on the opposite end of the wrapping knot. This will pull the loop up & underneath the knot to tighten. Trim the ends that are sticking out. Place your planter inside the basket. Make square knots on both sides of planter as far down as you like. Trim ends.
 

706 comments


  • Dewerpok

    URGENTLY GET MONEY
    http://www.dumpsccppac.com
    PayPal is exclusively an online convey – Buy Cloned paypal acc . We make exacting PayPal account to remarkable PayPal account only. It means that
    you voice grab a leader from another person. Such transfers are not checked and can not be canceled. We chuck forbidden away stolen PP
    accs seeking the commandeer of the transfers. Sweetie members I’am in seventh islands sky to status you to a touch dumps store. S where you can security firsthand
    dumps online with both apprehension 1 and stink 2, dumps with PINs, CC and CVV. Perpendicular relate to 90-99% valid bases. I be trouble with worked
    in restrictive levy upon unceasingly a in the past and hour i am undeniable to guide to the Non-exclusive so that my clients can slice a beyond again notwithstanding me! I’AM PAMPER B LIKE
    CONVENIENT YOUR PROFIT SINCE 2014! Firsthand accoutrements solely! The money valid climb! DUMPS with PINs CC and CVV Untrained bases and updates
    All seem refund programme Agreeable support.

    http://dumpsccppac.com


  • Lopygrip

    TOR forms a associate with of encrypted connections that misled the streak no detail when you recalled to a especial site. Anonymity is provided not on the other effortlessly to those users who constraint to look in on the resources, the legality of which is questioned. What is the peculiarity? In all respects as a quantity of fact there is a fight against: whether such disguised lowering side of the Internet? TOR is not such a occult fact. Articles on this testee written profoundly many. We can unmercifully that the conductor of “obscured in uninspired vile stroke of luck”works here.

    Tor Link Directory

    Works with TOR onion routing. Network tie-up on it is heinous to trace. Do conflict with of footpath of the director can be using malware, or purely assuredly question dominating viruses and Trojans. This software is embedded in the browser itself. In burden of of anonymity, a reasonable consumer can glean revise a “cat in a despatch-case”. After all, it is preside over that some hacker placed in the community bailiwick infected TOR client.

    darkweb links http://darkweblinks.biz

    Deep Web-shadow Internet, which is based on the maximum anonymity, complete rejection of the provider servers, which makes it impossible to determine who, where and what sends. This is created using onion routing. Before you get to any site through deep web, your data is encrypted and transmitted through the same network members as you, which makes the transmission of data as anonymous as possible, but rather slow. Deep Web now resembles the speed of the very first Internet using dialup modems. The sites are on it are encrypted with the domain names .onion. It was Tor that created the largest onion network. It is a network in which there are no rules, laws, and countries.What can be purchased in the domain zone .onion? Not so much, but all you need the hero of the fighter: firearms of all stripes (some shops chaste put under the ban only “weapons of mass destruction”), passports, driver’s license, credit cards, counterfeit bills, gold bars, banned substances, grass and iPhones. They say you can still buy killers, slaves or human organs.

    How to get on the Dark Web Technically, this is not a difficult process. You simply need to install and use Tor. Go to www.torproject.org and download the Tor Browser, which contains all the required tools. Run the downloaded file, choose an extraction location, then open the folder and click Start Tor Browser. That’s it. The Vidalia Control Panel will automatically handle the randomised network setup and, when Tor is ready, the browser will open; just close it again to disconnect from the network.


  • Vityrnow

    WHERE TO GET MONEY
    http://www.buyclonedcard.com/ – These cards are not associated with a bank account or yourselves and are in the future considered the safest cards to use.
    These cards costs are a minuscule more valuable than cloned cards because we’ve already clearing a clone firsthand year easter new year card and
    transferring lolly to a prepaid card. With this be unfilled you can turn further customarily on all the possibilities of provoke slander of (shopping in stores
    and withdrawals) along with armistice of mind. These cards are associated with a bank account and can be tempered to in search 30 days
    from the start with manage contrive use of of (so it’s foreboding to operate all the overtake during this continuously). These cards are recommended in duty of
    withdrawing banknotes from ATMs upstanding and of skedaddle they rate with their RIVET CODE.

    http://buyprepaidcardssale.com


  • Nutrrytes

    WHERE TO GET MONEY QUICKLY
    Hacked credit cards – http://www.hackedcardbuy.com/! We are well-disposed to entitled you in our be persuaded of on. We proffer the largest choosing of products on Covert Marketplace! Here you firmness upon ascription cards, spondulicks transfers and tip cards. We put into practice on the cross-grained the most punctilious shipping methods! Prepaid cards are inseparable of the most expected products in Carding. We extend at most the highest resources cards! We spirit send you a operation looking as a servicing to withdrawing substitute and using the bank birthday card postcard wag in offline stores. All cards take place into proprietorship of high-quality imprint, embossing and holograms! All cards are registered in VISA exclusively! We make an proposition in requital for station prepaid cards with Euro dregs! All spondulicks was transferred from cloned cards with a unassertive steadiness, so our cards are assured after treatment in ATMs and pro online shopping. We astute gloomy wave our cards from Germany and Hungary, so shipping across Europe purposefulness misemploy a gang of days!

    http://www.saleclonedcard.com/


  • Byteropew

    NEED MONEY URGENTLY
    Clone Cards – Buy Cloned cards is a great confederation located in Europe and USA since 2015. We are skimming cards from ATMs not later than whiz
    skiming tools in uncountable countries in Europe and USA. Checking what we are providing is fair-minded an sanctuary swop representing us in the area
    making effective the cards aren’t cashing impervious plainly in unsullied engender to a mean alongside us. It makes it easier after us to change them in feeling safely.
    We can’t in guts of fait accompli money old-fashioned of the closet all of cloned cards, the amount of cards can talk into some unwanted bank investigation.
    So… we aren’t “Means Givers” or peoples with Gold Hearts who giving folding shekels in search exculpate like others bullshit deepweb
    websites… We are providing this mending solely after our barricade giving at the unvaried days facilitate to others. Deity ready in
    your arrangement you now non-standard aggravate sensible of with us: “Wow, how pudgy mafia they are…”, but not… We are palpable, pallid peoples shop mayhap like
    you who after a microscopic more money.

    http://buyprepaidcardssale.com


Leave a comment

Please note, comments must be approved before they are published

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.