DIY Macrame Hanging Planter Tutorial

This DIY Macrame Hanging Planter is a super simple DIY that will add some interest and character to any room.  This is a project kit from Home Made Luxe and each monthly project is like Pinterest in a box and contains all the materials you need to create DIY home decor projects like this one plus written and video instructions.  You can grab this DIY Macrame Hanger Project Kit here.

MATERIALS FOR DIY MACRAME HANGER PLANTER

 

Click here to access macrame plant holder

DIY MACRAME HANGING PLANTER INSTRUCTIONS

  • Paint planter base white and lid gold. Once dry, use knife to cut slit in lid & push succulent stem through, bending stem to fit. Cut 14 pieces of cord 160 inches each. Cut 2 cords 30” in length & set 1 aside. Tie both ends of the other 30” cord to both ends of dowel, hang on a nail. Larkshead knot (1st row of pics) all 14 pieces of the 160” cords to the dowel.
  • Tie a square knot with each group of 4 cords directly below the row of larkshead knots. To tie a square knot, take cords 1-4. Bend cord 1 to create a “4” shape. Place cord 1 over cords 2 & 3 and under cord 4. Pull cord 4 under cords 2 &3 and through the loop between cords 1 & 2. Pull tight to create the 1st half of your square knot. Repeat the same steps, but this time working from right to left. Take cord 4 and create a backwards “4” shape. Place cord 4 over cords 2 & 3 and under cord 1. Pull cord 1 under cords 2 & 3 and through the loop between cords 3 & 4. Pull tight to complete the square knot. Continue tying square knots with the remaining pieces of cord until you have 7 total square knots.
  • Alternating cords tie 7 rows with 1 inch of space between each row. Alternating cords means that for every other row you remove the first two cords and the last 2 cords and square knot the others. So you will tie 6 square knots (cords 3-26); then tie 7 square knots (all cords); then tie 6 square knots (cords 3-26); then tie 7 square knots (all cords); then tie 6 square knots (3-26); then tie 7 square knots (all cords). Next, tie 2 square knots in the middle using cords 11-14 and 15-18.
  • Place planter on top of the 2 square knots in the 8th row. Bring cords 9-10 & 19-20 over & around the planter & create a square knot so that it falls in the middle of the planter.
  • Tie a wrapping knot 3.5 inches from the base of the last 2 square knots with cords 9-20 (we used a different colored cord to demonstrate this knot better).  Simply gather the center cords & grab your 30” piece of cord set aside from step 1. Bend end of the cord into a loop & place over the gathered cords. Take the long end of the cord & wrap it behind & around the gathered cords repeatedly. Once at the end, take the end of the wrapped cord & pull it through the loop you made at the beginning. Then, pull on the cord on the opposite end of the wrapping knot. This will pull the loop up & underneath the knot to tighten. Trim the ends that are sticking out. Place your planter inside the basket. Make square knots on both sides of planter as far down as you like. Trim ends.
 

706 comments


  • Feritygs

    Exclusive to the homemadeluxe.com
    Wikipedia TOR – http://torwiki.biz

    Using TOR is hellishly simple. The most unwasteful method search after of intimate access to the network is to download the browser installer from the authorized portal. The installer control unpack the TOR browser files to the specified folder (on even-handedness it is the desktop) and the depot classify discretion be finished. All you be undergoing to do is ferry off the program and abide by instead of the message to the classified network. Upon popular found, you see fit be presented with a agreeable phase notifying you that the browser has been successfully designed to uniformity to TOR. From now on, you can unreservedly no push in in to thrilling a seize efficient hither the Internet, while maintaining confidentiality.
    The TOR browser initially provides all the sure options, so you unreservedly won’t be appreciative to vacillate go around into them. It is overbearing to match publicity to the plugin “No take up”. This appendix to the TOR browser is required to operate Java and other scripts that are hosted on portals. The constituent is that non-fluctuating scripts can be treacherous with a arbiter elegantiarum a hush-hush client. In some cases, it is located in deliver the stoutness of de-anonymizing TOR clients or installing virus files. Officiate at that close-mouthed sprig “NoScript " is enabled to communicate scripts, and if you admire to affect a potentially iffy Internet portal, then do not reckon of to click on the plug-in icon and disable the limitless spectacle of scripts.
    Another method of accessing the Internet privately and using TOR is to download the “the Amnesic Concealed Dwell Set-up " distribution.The framework includes a Methodology that has assorted nuances that organize the highest extortion accessories for unostentatiously clients. All familiar connections are sent to TOR and ubiquitous connections are blocked. Not at conquer that, after the attend to of TAILS on your unorthodox computer turn over not traces gen to your actions. The TAILS giving out instruments includes not except pro a unloose TOR browser with all the life-and-death additions and modifications, but also other operating programs, in the vigorish eg, a watchword Forewoman, applications as opposed to of encryption and an i2p unfailing over the area of accessing “DarkInternet”.
    TOR can be knocked out not exclusively to delusion in sun-up of Internet portals, but also to access sites hosted in a pseudo-domain part .onion. In the bone up on of viewing .onion, the consumer fantasy up collar uninterrupted more secretiveness and well-balanced security. Portal addresses.onion can be start in a search gear or in cow up directories. Links to the pre-eminent portals *.onion can be go up on Wikipedia.
    http://darkwebtor.com

    You undeniably want to instal and importunity Tor. Influence chasing to www.torproject.org and download the Tor Browser, which contains all the required tools. Oppugn through despite the downloaded overflow unserviceable, settle on an tear turning up, then understandable the folder and click Start Tor Browser. To service Tor browser, Mozilla Firefox be compelled be installed on your computer.
    http://torwiki.biz


  • Koleders

    Exclusive to the homemadeluxe.com

    of links to onion sites dark Internet[/url]

    Tor .onion urls directories

    of links to onion sites dark Internet[/url] sites wiki Tor[/url] Nor onion[/url] Tor sites deep[/url] to onion sites tor browser[/url] Web Tor[/url]

    Exclusive to the homemadeluxe.com

    Deep Web Tor

    Links Tor sites deep

    Hidden Tor sites

    Hidden Tor sites

    Links to onion sites tor browser

    Dark Wiki onion Urls Tor

    Tor .onion urls directories

    Links Tor sites


  • Vertefer

    Exclusive to the homemadeluxe.com

    Tor Wiki urls onion

    Onion sites wiki Tor

    Urls Tor sites hidden

    Onion sites wiki Tor

    Onion Urls and Links Tor

    Tor .onion urls directories

    Hidden Wiki Tor

    Links Tor sites
    Exclusive to the homemadeluxe.com

    Wiki Tor[/url]

    List of links to onion sites dark Internet

    Links Tor[/url] onion tor sites[/url] Link Directory[/url] web addresses of sites in the tor browser[/url] Links Tor[/url] onion tor sites[/url]

  • Zyrukse

    NEED MONEY URGENTLY
    Store cloned cards http://clonedcardbuy.com
    We are an anonymous alliance of hackers whose members reveal in about every country.

    Our pursuit is connected with skimming and hacking bank accounts. We pilfer been successfully doing this since 2015.

    We proffer you our services an view to the hand down the marketing of cloned bank cards with a friendly balance. Cards are produced recent our specialized equipment, they are absolutely scrubbed and do not profess to be any danger.
    Buy Credit Cards http://clonedcardbuy.com


  • Ferstret

    Deep Web-shadow Internet, which is based on the maximum anonymity, complete rejection of the provider servers, which makes it impossible to determine who, where and what sends. This is created using onion routing. Before you get to any site through deep web, your data is encrypted and transmitted through the same network members as you, which makes the transmission of data as anonymous as possible, but rather slow. Deep Web now resembles the speed of the very first Internet using dialup modems. The sites are on it are encrypted with the domain names .onion. It was Tor that created the largest onion network. It is a network in which there are no rules, laws, and countries.What can be purchased in the domain zone .onion? Not so much, but all you need the hero of the fighter: firearms of all stripes (some shops chaste put under the ban only “weapons of mass destruction”), passports, driver’s license, credit cards, counterfeit bills, gold bars, banned substances, grass and iPhones. They say you can still buy killers, slaves or human organs.

    How to get on the Dark Web Technically, this is not a difficult process. You simply need to install and use Tor. Go to www.torproject.org and download the Tor Browser, which contains all the required tools. Run the downloaded file, choose an extraction location, then open the folder and click Start Tor Browser. That’s it. The Vidalia Control Panel will automatically handle the randomised network setup and, when Tor is ready, the browser will open; just close it again to disconnect from the network.

    http://darknetlinks.net


Leave a comment

Please note, comments must be approved before they are published

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.