




Lladro Nightbloom 60cm Hanging Lamp - White

Pay in 3 with Klarna
This work is part of the lighting collection created by Marcel Wanders in partnership with Lladró. A novel, contemporary design that stands out for its ever-changing organic forms inspired by nature and for the fascinating effect that the light emanating from inside produces in the petals. A piece of great decorative potential, handcrafted in Spain.
Due to the nature of Lladró fittings, they are non-returnable once ordered.
We offer free standard delivery on orders within the UK Mainland* (an additional fee applies for the Isle of Wight, the Isle of Man, the Scottish Isles, parts of Scotland, Northern Ireland, the Republic of Ireland, the Channel Isles and International).
*Collingwood orders under £150 incur a delivery fee of £9.95 inc. VAT.
*Any order under £25 incurs a delivery fee of £9.95.
Moonlight Design is proud to announce that they are registered and approved members of Trusted Shops who allow you to shop online with peace of mind and money-back guarantees.
Being members of this organisation we have to follow strict guidelines as laid down by Trusted Shops which means that you will get a quality and fair service.
Credit Card Security
Here at Moonlight Design we take your credit card protection very seriously. For your security whilst shopping with Moonlight Design, we use an independent Payment Service Provider called Klarna.
Klarna has achieved the highest level of compliance under the Payment Card Industry Data Security Standard (PCI). They adhere to the most stringent levels of fraud screening, ensuring that your details remain secure throughout the transaction process.
Transaction security
All transaction information passed between merchant sites and Klarna’s system is encrypted using 128-bit SSL certificates. No cardholder information is ever passed unencrypted and any messages sent to your servers from Klarna are signed using MD5 hashing to prevent tampering. You can be completely assured that nothing you pass to Klarna’s servers can be examined, used or modified by any third parties attempting to gain access to sensitive information.
